<?xml version="1.0" encoding="UTF-8"?><!-- generator="podbean/5.5" -->
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"
     xmlns:spotify="http://www.spotify.com/ns/rss"
     xmlns:podcast="https://podcastindex.org/namespace/1.0"
    xmlns:media="http://search.yahoo.com/mrss/">

<channel>
    <title>Hacker Valley Studio</title>
    <atom:link href="https://feed.podbean.com/HackerValleyStudio/feed.xml" rel="self" type="application/rss+xml"/>
    <link>https://hackervalley.com</link>
    <description>Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.</description>
    <pubDate>Tue, 07 Apr 2026 15:42:34 -0500</pubDate>
    <generator>https://podbean.com/?v=5.5</generator>
    <language>en</language>
        <copyright>Copyright 2019 All rights reserved.</copyright>
    <category>Technology</category>
    <ttl>1440</ttl>
    <itunes:type>episodic</itunes:type>
          <itunes:summary>Welcome back… to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.</itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
<itunes:category text="Technology" />
	<itunes:category text="Education">
		<itunes:category text="Self-Improvement" />
	</itunes:category>
    <itunes:owner>
        <itunes:name>Hacker Valley Media</itunes:name>
            </itunes:owner>
    	<itunes:block>No</itunes:block>
	<itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://pbcdn1.podbean.com/imglogo/image-logo/5354112/HVS-2024-AlbumCover.png" />
    <image>
        <url>https://pbcdn1.podbean.com/imglogo/image-logo/5354112/HVS-2024-AlbumCover.png</url>
        <title>Hacker Valley Studio</title>
        <link>https://hackervalley.com</link>
        <width>144</width>
        <height>144</height>
    </image>
    <item>
        <title>Minutes to Meltdown: Cyber Recovery When It Counts with Chris Bevil</title>
        <itunes:title>Minutes to Meltdown: Cyber Recovery When It Counts with Chris Bevil</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/minutes-to-meltdown-cyber-recovery-when-it-counts-with-chris-bevil/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/minutes-to-meltdown-cyber-recovery-when-it-counts-with-chris-bevil/#comments</comments>        <pubDate>Tue, 07 Apr 2026 15:42:34 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/cbef9959-779d-39e3-9029-d451d56e95e1</guid>
                                    <description><![CDATA[<p>Most organizations are prepping for disaster recovery when they should be building for cyber recovery, and those are not the same thing. </p>
<p>Recorded live at RSAC Conference 2026, Ron sat down with Chris Bevil, Principal Security AI Strategist at Commvault, to break down what actually happens after a breach hits and why most teams are caught flat-footed. </p>
<p>Chris walks us through Commvault's Minutes to Meltdown tabletop exercise, why isolated recovery environments matter, and how clean data determines whether you get your company back in hours or in 200+ days. </p>
<p>This episode will tell you what separates a team that recovers from a team that unravels. </p>
<p>Impactful Moments
01:16 - Live at RSAC 2026 with Chris Bevil, Principal, Security AI Strategist at Commvault
01:40 - Minutes to Meltdown origin story
03:00 - What goes into a Meltdown? 
04:48 - What happens in the first 30 minutes of chaos
07:00 - What Commvault actually does
08:21 - What is IRE? Isolated recovery environment breakdown
10:40 - What is Disaster Recovery in 2026? 
13:00 - How cyber recovery differs from disaster recovery 
14:20 - Where attackers go in the first 30 minutes
15:40 - The 3-2-1 rule and where teams fail
21:45 - What successful recovery looks like
25:14 - AI strategy at Commvault</p>
<p>
Links
Connect with our guest, Chris Bevil, on LinkedIn: <a href='https://www.linkedin.com/in/chris-b-211998a/'>https://www.linkedin.com/in/chris-b-211998a/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Most organizations are prepping for disaster recovery when they should be building for cyber recovery, and those are not the same thing. </p>
<p>Recorded live at RSAC Conference 2026, Ron sat down with Chris Bevil, Principal Security AI Strategist at Commvault, to break down what actually happens after a breach hits and why most teams are caught flat-footed. </p>
<p>Chris walks us through Commvault's Minutes to Meltdown tabletop exercise, why isolated recovery environments matter, and how clean data determines whether you get your company back in hours or in 200+ days. </p>
<p>This episode will tell you what separates a team that recovers from a team that unravels. </p>
<p>Impactful Moments<br>
01:16 - Live at RSAC 2026 with Chris Bevil, Principal, Security AI Strategist at Commvault<br>
01:40 - Minutes to Meltdown origin story<br>
03:00 - What goes into a Meltdown? <br>
04:48 - What happens in the first 30 minutes of chaos<br>
07:00 - What Commvault actually does<br>
08:21 - What is IRE? Isolated recovery environment breakdown<br>
10:40 - What is Disaster Recovery in 2026? <br>
13:00 - How cyber recovery differs from disaster recovery <br>
14:20 - Where attackers go in the first 30 minutes<br>
15:40 - The 3-2-1 rule and where teams fail<br>
21:45 - What successful recovery looks like<br>
25:14 - AI strategy at Commvault</p>
<p><br>
Links<br>
Connect with our guest, Chris Bevil, on LinkedIn: <a href='https://www.linkedin.com/in/chris-b-211998a/'>https://www.linkedin.com/in/chris-b-211998a/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/u3vqf77q73izckwu/HVS26_EP422_CommVault_Final.mp3" length="27757183" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Most organizations are prepping for disaster recovery when they should be building for cyber recovery, and those are not the same thing. 
Recorded live at RSAC Conference 2026, Ron sat down with Chris Bevil, Principal Security AI Strategist at Commvault, to break down what actually happens after a breach hits and why most teams are caught flat-footed. 
Chris walks us through Commvault's Minutes to Meltdown tabletop exercise, why isolated recovery environments matter, and how clean data determines whether you get your company back in hours or in 200+ days. 
This episode will tell you what separates a team that recovers from a team that unravels. 
Impactful Moments01:16 - Live at RSAC 2026 with Chris Bevil, Principal, Security AI Strategist at Commvault01:40 - Minutes to Meltdown origin story03:00 - What goes into a Meltdown? 04:48 - What happens in the first 30 minutes of chaos07:00 - What Commvault actually does08:21 - What is IRE? Isolated recovery environment breakdown10:40 - What is Disaster Recovery in 2026? 13:00 - How cyber recovery differs from disaster recovery 14:20 - Where attackers go in the first 30 minutes15:40 - The 3-2-1 rule and where teams fail21:45 - What successful recovery looks like25:14 - AI strategy at Commvault
LinksConnect with our guest, Chris Bevil, on LinkedIn: https://www.linkedin.com/in/chris-b-211998a/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1734</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>422</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Building AI Governance Before the Incidents Hit with Guru Sethupathy</title>
        <itunes:title>Building AI Governance Before the Incidents Hit with Guru Sethupathy</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/building-ai-governance-before-the-incidents-hit-with-guru-sethupathy/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/building-ai-governance-before-the-incidents-hit-with-guru-sethupathy/#comments</comments>        <pubDate>Wed, 01 Apr 2026 14:28:50 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/97b2f731-e512-3974-a27d-314765095d46</guid>
                                    <description><![CDATA[<p>AI adoption is outpacing governance at every level, and the cost of waiting is getting higher by the day. Guru Sethupathy, General Manager of AI Governance at Optro and former Founder of FairNow, breaks down what it really takes to build trust in AI systems before things go sideways. </p>
<p>Guru lays out a simple but powerful 3 P’s Framework: policies, process, and people, connecting it to what teams are actually dealing with right now, from shadow AI to security threats that don’t look like anything we’ve seen before.</p>
<p>If 2026 is the year AI moves from experiments to real operations, this conversation is your blueprint for keeping it under control.</p>
<p>Impactful Moments
00:00 - Introduction
02:25 - What does Optro do? Helping companies with the AI governance journey. 
03:10 - Why AI governance is really about trust, not control
05:15 - The moment AI went mainstream, and why that changed everything
05:50 - The three real business risks: performance, security, and transparency
07:30 - Human accountability in an AI-driven world 
08:48 - What’s actually happening with AI regulation, EU, US, and standards
10:28 - Where Optro fits, orchestration vs monitoring in AI governance
13:05 - The 3 Ps framework: policies, process, and people
14:47 - Governance 101, why AI inventory is the first move every team misses
16:12 - The reality check, AI adoption is outpacing governance everywhere
17:45 - Shadow AI explained, what your team is doing that you can’t see
19:45 - Optro’s top use cases: visibility, compliance, and operationalizing governance
20:43 - Who owns AI governance, and why it’s becoming a team sport
22:20 - Final advice, start now or play catch-up later</p>
<p>
Links
Connect with our guest, Guru Sethupathy, on LinkedIn: <a href='https://www.linkedin.com/in/guru-sethupathy/'>https://www.linkedin.com/in/guru-sethupathy/</a></p>
<p>Learn more about Optro: <a href='https://optro.ai/'>https://optro.ai/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI adoption is outpacing governance at every level, and the cost of waiting is getting higher by the day. Guru Sethupathy, General Manager of AI Governance at Optro and former Founder of FairNow, breaks down what it really takes to build trust in AI systems before things go sideways. </p>
<p>Guru lays out a simple but powerful 3 P’s Framework: policies, process, and people, connecting it to what teams are actually dealing with right now, from shadow AI to security threats that don’t look like anything we’ve seen before.</p>
<p>If 2026 is the year AI moves from experiments to real operations, this conversation is your blueprint for keeping it under control.</p>
<p>Impactful Moments<br>
00:00 - Introduction<br>
02:25 - What does Optro do? Helping companies with the AI governance journey. <br>
03:10 - Why AI governance is really about trust, not control<br>
05:15 - The moment AI went mainstream, and why that changed everything<br>
05:50 - The three real business risks: performance, security, and transparency<br>
07:30 - Human accountability in an AI-driven world <br>
08:48 - What’s actually happening with AI regulation, EU, US, and standards<br>
10:28 - Where Optro fits, orchestration vs monitoring in AI governance<br>
13:05 - The 3 Ps framework: policies, process, and people<br>
14:47 - Governance 101, why AI inventory is the first move every team misses<br>
16:12 - The reality check, AI adoption is outpacing governance everywhere<br>
17:45 - Shadow AI explained, what your team is doing that you can’t see<br>
19:45 - Optro’s top use cases: visibility, compliance, and operationalizing governance<br>
20:43 - Who owns AI governance, and why it’s becoming a team sport<br>
22:20 - Final advice, start now or play catch-up later</p>
<p><br>
Links<br>
Connect with our guest, Guru Sethupathy, on LinkedIn: <a href='https://www.linkedin.com/in/guru-sethupathy/'>https://www.linkedin.com/in/guru-sethupathy/</a></p>
<p>Learn more about Optro: <a href='https://optro.ai/'>https://optro.ai/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nsv33eu7evuqt6zk/HVS26_EP421_Optro.mp3" length="23055556" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI adoption is outpacing governance at every level, and the cost of waiting is getting higher by the day. Guru Sethupathy, General Manager of AI Governance at Optro and former Founder of FairNow, breaks down what it really takes to build trust in AI systems before things go sideways. 
Guru lays out a simple but powerful 3 P’s Framework: policies, process, and people, connecting it to what teams are actually dealing with right now, from shadow AI to security threats that don’t look like anything we’ve seen before.
If 2026 is the year AI moves from experiments to real operations, this conversation is your blueprint for keeping it under control.
Impactful Moments00:00 - Introduction02:25 - What does Optro do? Helping companies with the AI governance journey. 03:10 - Why AI governance is really about trust, not control05:15 - The moment AI went mainstream, and why that changed everything05:50 - The three real business risks: performance, security, and transparency07:30 - Human accountability in an AI-driven world 08:48 - What’s actually happening with AI regulation, EU, US, and standards10:28 - Where Optro fits, orchestration vs monitoring in AI governance13:05 - The 3 Ps framework: policies, process, and people14:47 - Governance 101, why AI inventory is the first move every team misses16:12 - The reality check, AI adoption is outpacing governance everywhere17:45 - Shadow AI explained, what your team is doing that you can’t see19:45 - Optro’s top use cases: visibility, compliance, and operationalizing governance20:43 - Who owns AI governance, and why it’s becoming a team sport22:20 - Final advice, start now or play catch-up later
LinksConnect with our guest, Guru Sethupathy, on LinkedIn: https://www.linkedin.com/in/guru-sethupathy/
Learn more about Optro: https://optro.ai/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1440</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>421</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What Happens When Attackers Collaborate More Than Defenders? Ron Eddings Reporting Live from RSAC Conference</title>
        <itunes:title>What Happens When Attackers Collaborate More Than Defenders? Ron Eddings Reporting Live from RSAC Conference</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-happens-when-attackers-collaborate-more-than-defenders-ron-eddings-reporting-live-from-rsac-conference/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-happens-when-attackers-collaborate-more-than-defenders-ron-eddings-reporting-live-from-rsac-conference/#comments</comments>        <pubDate>Tue, 31 Mar 2026 11:31:10 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c2332986-de64-31dd-809d-de52f39063b3</guid>
                                    <description><![CDATA[<p>What happens when attackers collaborate better than defenders? </p>
<p>Recorded live from RSAC 2026, this solo episode with Ron breaks down the biggest themes shaping cybersecurity right now, from organized threat groups and massive data breaches to the growing tension between productivity and control inside modern organizations.</p>
<p>This conversation highlights a hard truth. The threat landscape is evolving through collaboration. From phishing-as-a-service platforms like Tycoon 2FA to supply chain breaches impacting entire ecosystems, attackers are sharing tools and moving faster than ever.</p>
<p>But there’s another side to the story. As AI becomes embedded in how work gets done, security teams are being pushed to rethink their role. Blocking tools is no longer enough. The real challenge is enabling the business while managing risk, and that requires trust, alignment, and a stronger sense of community across the industry.</p>
<p>This episode is a call to rethink how we approach security. Not as isolated teams enforcing policy, but as a connected community working together to adapt, respond, and move forward.</p>
<p>
Impactful Moments
00:00 - Introduction, live from RSAC 2026
02:50 - Tycoon2FA and the rise of phishing-as-a-service
04:45 - The TELUS breach and what a petabyte-scale attack looks like
06:21 - Why you need strict controls … everywhere
07:30 - Are AI agents the new Shadow IT? 
09:00 - The balance between productivity and security controls
09:27 - Boards’ demands for their teams to use AI 
11:53 - Why leading security teams is more like parenting than policing
12:42 - Community is the foundation for the future of cybersecurity</p>
<p> </p>
<p>Links
Connect with Ron Eddings on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a></p>
<p> </p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What happens when attackers collaborate better than defenders? </p>
<p>Recorded live from RSAC 2026, this solo episode with Ron breaks down the biggest themes shaping cybersecurity right now, from organized threat groups and massive data breaches to the growing tension between productivity and control inside modern organizations.</p>
<p>This conversation highlights a hard truth. The threat landscape is evolving through collaboration. From phishing-as-a-service platforms like Tycoon 2FA to supply chain breaches impacting entire ecosystems, attackers are sharing tools and moving faster than ever.</p>
<p>But there’s another side to the story. As AI becomes embedded in how work gets done, security teams are being pushed to rethink their role. Blocking tools is no longer enough. The real challenge is enabling the business while managing risk, and that requires trust, alignment, and a stronger sense of community across the industry.</p>
<p>This episode is a call to rethink how we approach security. Not as isolated teams enforcing policy, but as a connected community working together to adapt, respond, and move forward.</p>
<p><br>
Impactful Moments<br>
00:00 - Introduction, live from RSAC 2026<br>
02:50 - Tycoon2FA and the rise of phishing-as-a-service<br>
04:45 - The TELUS breach and what a petabyte-scale attack looks like<br>
06:21 - Why you need strict controls … everywhere<br>
07:30 - Are AI agents the new Shadow IT? <br>
09:00 - The balance between productivity and security controls<br>
09:27 - Boards’ demands for their teams to use AI <br>
11:53 - Why leading security teams is more like parenting than policing<br>
12:42 - Community is the foundation for the future of cybersecurity</p>
<p> </p>
<p>Links<br>
Connect with Ron Eddings on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p><br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a></p>
<p> </p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/sdpyquhicter368k/HVS26_EP420_RSAC_Episode_Cut8tyzf.mp3" length="13253170" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What happens when attackers collaborate better than defenders? 
Recorded live from RSAC 2026, this solo episode with Ron breaks down the biggest themes shaping cybersecurity right now, from organized threat groups and massive data breaches to the growing tension between productivity and control inside modern organizations.
This conversation highlights a hard truth. The threat landscape is evolving through collaboration. From phishing-as-a-service platforms like Tycoon 2FA to supply chain breaches impacting entire ecosystems, attackers are sharing tools and moving faster than ever.
But there’s another side to the story. As AI becomes embedded in how work gets done, security teams are being pushed to rethink their role. Blocking tools is no longer enough. The real challenge is enabling the business while managing risk, and that requires trust, alignment, and a stronger sense of community across the industry.
This episode is a call to rethink how we approach security. Not as isolated teams enforcing policy, but as a connected community working together to adapt, respond, and move forward.
Impactful Moments00:00 - Introduction, live from RSAC 202602:50 - Tycoon2FA and the rise of phishing-as-a-service04:45 - The TELUS breach and what a petabyte-scale attack looks like06:21 - Why you need strict controls … everywhere07:30 - Are AI agents the new Shadow IT? 09:00 - The balance between productivity and security controls09:27 - Boards’ demands for their teams to use AI 11:53 - Why leading security teams is more like parenting than policing12:42 - Community is the foundation for the future of cybersecurity
 
LinksConnect with Ron Eddings on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com 
 
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>828</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>420</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>RSAC 2026: Show Up or Fall Behind</title>
        <itunes:title>RSAC 2026: Show Up or Fall Behind</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/rsac-2026-show-up-or-fall-behind/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/rsac-2026-show-up-or-fall-behind/#comments</comments>        <pubDate>Fri, 20 Mar 2026 18:09:18 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e53bb145-7670-3865-a201-4a96a119bcd3</guid>
                                    <description><![CDATA[<p>What does it mean when your smart doorbell becomes an entry point for surveillance? What happens when a single hacker can jailbreak every major AI model within hours of its release? And why are the same tools being used by both nation-state attackers and the defenders trying to stop them?</p>
<p>
In this solo episode, Ron Eddings breaks down the urgent case for practitioner unity in cybersecurity, from AI-powered jailbreaking and IoT surveillance creep to geopolitical cyber operations. With RSAC 2026 just around the corner, this episode is a rallying cry for the community to come together, share intelligence, and build the defenses that no single team can build alone. </p>
<p>
The episode also tackles one of the biggest misconceptions in the industry right now. AI already came for your job, but now it is changing how we define responsibility, decision-making, and trust. Add in rising pressure across the workforce, new legislation pushing for human oversight, and real-world examples of AI being used in global conflict, and the stakes become hard to ignore.</p>
<p>
Impactful Moments
00:00 - Introduction
02:00 - Pliny the Elder, God Mode and AI Jailbreaks
03:30 - Cyber in US-Israeli Operations in Iran and Anthropic Tensions
06:00 - Cyber threats that are hitting normal people
07:30 - Is my Ring Doorbell a surveillance risk?
10:05 - Attackers are collaborating and sharing more than defenders today
11:30 - RSAC: the cyber Super Bowl
14:30 - AI has already replaced your job
14:30 - Why mental health is cybersecurity's hidden crisis
17:00 - Governance in AI and what Texas is doing about it
19:00 - Was Claude used in state-level ops?</p>
<p>
Links
Connect with Ron Eddings on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a></p>
<p> </p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What does it mean when your smart doorbell becomes an entry point for surveillance? What happens when a single hacker can jailbreak every major AI model within hours of its release? And why are the same tools being used by both nation-state attackers and the defenders trying to stop them?</p>
<p><br>
In this solo episode, Ron Eddings breaks down the urgent case for practitioner unity in cybersecurity, from AI-powered jailbreaking and IoT surveillance creep to geopolitical cyber operations. With RSAC 2026 just around the corner, this episode is a rallying cry for the community to come together, share intelligence, and build the defenses that no single team can build alone. </p>
<p><br>
The episode also tackles one of the biggest misconceptions in the industry right now. AI already came for your job, but now it is changing how we define responsibility, decision-making, and trust. Add in rising pressure across the workforce, new legislation pushing for human oversight, and real-world examples of AI being used in global conflict, and the stakes become hard to ignore.</p>
<p><br>
Impactful Moments<br>
00:00 - Introduction<br>
02:00 - Pliny the Elder, God Mode and AI Jailbreaks<br>
03:30 - Cyber in US-Israeli Operations in Iran and Anthropic Tensions<br>
06:00 - Cyber threats that are hitting normal people<br>
07:30 - Is my Ring Doorbell a surveillance risk?<br>
10:05 - Attackers are collaborating and sharing more than defenders today<br>
11:30 - RSAC: the cyber Super Bowl<br>
14:30 - AI has already replaced your job<br>
14:30 - Why mental health is cybersecurity's hidden crisis<br>
17:00 - Governance in AI and what Texas is doing about it<br>
19:00 - Was Claude used in state-level ops?</p>
<p><br>
Links<br>
Connect with Ron Eddings on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p><br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a></p>
<p> </p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/24jiiczays6gknpz/HVS26_EP419_Pre_RSAC_FINAL7xski.mp3" length="20363902" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What does it mean when your smart doorbell becomes an entry point for surveillance? What happens when a single hacker can jailbreak every major AI model within hours of its release? And why are the same tools being used by both nation-state attackers and the defenders trying to stop them?
In this solo episode, Ron Eddings breaks down the urgent case for practitioner unity in cybersecurity, from AI-powered jailbreaking and IoT surveillance creep to geopolitical cyber operations. With RSAC 2026 just around the corner, this episode is a rallying cry for the community to come together, share intelligence, and build the defenses that no single team can build alone. 
The episode also tackles one of the biggest misconceptions in the industry right now. AI already came for your job, but now it is changing how we define responsibility, decision-making, and trust. Add in rising pressure across the workforce, new legislation pushing for human oversight, and real-world examples of AI being used in global conflict, and the stakes become hard to ignore.
Impactful Moments00:00 - Introduction02:00 - Pliny the Elder, God Mode and AI Jailbreaks03:30 - Cyber in US-Israeli Operations in Iran and Anthropic Tensions06:00 - Cyber threats that are hitting normal people07:30 - Is my Ring Doorbell a surveillance risk?10:05 - Attackers are collaborating and sharing more than defenders today11:30 - RSAC: the cyber Super Bowl14:30 - AI has already replaced your job14:30 - Why mental health is cybersecurity's hidden crisis17:00 - Governance in AI and what Texas is doing about it19:00 - Was Claude used in state-level ops?
LinksConnect with Ron Eddings on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com 
 
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1272</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>419</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What’s Next After Building a $2.5B Cybersecurity Company with Dean Sysman</title>
        <itunes:title>What’s Next After Building a $2.5B Cybersecurity Company with Dean Sysman</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-s-next-after-building-a-25b-cybersecurity-company-with-dean-sysman/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-s-next-after-building-a-25b-cybersecurity-company-with-dean-sysman/#comments</comments>        <pubDate>Mon, 16 Mar 2026 11:05:28 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f906bb4c-f5f4-3f6b-af28-69a2e4e79ac3</guid>
                                    <description><![CDATA[<p>What does it look like when a cybersecurity founder who built a $2.5 billion company decides to level up, again? Dean Sysman, co-founder of Axonius, sits down with Ron Eddings to pull back the curtain on what it really took to go from zero to $100M ARR in four and a half years, and what came next.</p>
<p>Dean breaks down the founder mindset, the emotional weight of tying your identity to your company, and why he stepped into the Executive Chairman role while simultaneously pursuing a PhD in AI systems at Columbia University. He gets into how boxing taught him what solo performance reveals about leadership, why vulnerability is a non-negotiable skill at scale, and what it means to care about something bigger than yourself. This one hits differently if you're building, leading, or figuring out what your next chapter looks like.</p>
Impactful Moments
<ul>
<li style="font-weight:400;">00:00 – Introduction</li>
<li style="font-weight:400;">05:00 – Boxing for charity: raising $55K</li>
<li style="font-weight:400;">08:00 – Competitive by nature, born to build</li>
<li style="font-weight:400;">10:00 – Solo performance sharpens team leadership</li>
<li style="font-weight:400;">13:00 – Axonius: zero to $100M ARR in 4.5 years</li>
<li style="font-weight:400;">15:00 – Founder identity tied to company success</li>
<li style="font-weight:400;">21:00 – Purpose bigger than yourself fuels resilience</li>
<li style="font-weight:400;">25:00 – Self-awareness as the #1 growth tool</li>
<li style="font-weight:400;">28:00 – Executive Chairman + Columbia PhD pursuit</li>
<li style="font-weight:400;">33:00 – Ron's personal reflection on founder identity</li>
</ul>
Links
<ul>
<li style="font-weight:400;">Connect with our guest, Dean Sysman, on LinkedIn: <a href='https://www.linkedin.com/in/deansysman/'>https://www.linkedin.com/in/deansysman/</a></li>
<li style="font-weight:400;">Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></li>
<li style="font-weight:400;">Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com/'>https://store.hackervalley.com</a></li>
<li style="font-weight:400;">Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></li>
</ul>
]]></description>
                                                            <content:encoded><![CDATA[<p>What does it look like when a cybersecurity founder who built a $2.5 billion company decides to level up, again? Dean Sysman, co-founder of Axonius, sits down with Ron Eddings to pull back the curtain on what it really took to go from zero to $100M ARR in four and a half years, and what came next.</p>
<p>Dean breaks down the founder mindset, the emotional weight of tying your identity to your company, and why he stepped into the Executive Chairman role while simultaneously pursuing a PhD in AI systems at Columbia University. He gets into how boxing taught him what solo performance reveals about leadership, why vulnerability is a non-negotiable skill at scale, and what it means to care about something bigger than yourself. This one hits differently if you're building, leading, or figuring out what your next chapter looks like.</p>
Impactful Moments
<ul>
<li style="font-weight:400;">00:00 – Introduction</li>
<li style="font-weight:400;">05:00 – Boxing for charity: raising $55K</li>
<li style="font-weight:400;">08:00 – Competitive by nature, born to build</li>
<li style="font-weight:400;">10:00 – Solo performance sharpens team leadership</li>
<li style="font-weight:400;">13:00 – Axonius: zero to $100M ARR in 4.5 years</li>
<li style="font-weight:400;">15:00 – Founder identity tied to company success</li>
<li style="font-weight:400;">21:00 – Purpose bigger than yourself fuels resilience</li>
<li style="font-weight:400;">25:00 – Self-awareness as the #1 growth tool</li>
<li style="font-weight:400;">28:00 – Executive Chairman + Columbia PhD pursuit</li>
<li style="font-weight:400;">33:00 – Ron's personal reflection on founder identity</li>
</ul>
Links
<ul>
<li style="font-weight:400;">Connect with our guest, Dean Sysman, on LinkedIn: <a href='https://www.linkedin.com/in/deansysman/'>https://www.linkedin.com/in/deansysman/</a></li>
<li style="font-weight:400;">Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></li>
<li style="font-weight:400;">Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com/'>https://store.hackervalley.com</a></li>
<li style="font-weight:400;">Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></li>
</ul>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kvjgkdppqzikwn9m/HVS26_EP418_Dean_Sysman_FINAL9norw.mp3" length="35664555" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What does it look like when a cybersecurity founder who built a $2.5 billion company decides to level up, again? Dean Sysman, co-founder of Axonius, sits down with Ron Eddings to pull back the curtain on what it really took to go from zero to $100M ARR in four and a half years, and what came next.
Dean breaks down the founder mindset, the emotional weight of tying your identity to your company, and why he stepped into the Executive Chairman role while simultaneously pursuing a PhD in AI systems at Columbia University. He gets into how boxing taught him what solo performance reveals about leadership, why vulnerability is a non-negotiable skill at scale, and what it means to care about something bigger than yourself. This one hits differently if you're building, leading, or figuring out what your next chapter looks like.
Impactful Moments

00:00 – Introduction
05:00 – Boxing for charity: raising $55K
08:00 – Competitive by nature, born to build
10:00 – Solo performance sharpens team leadership
13:00 – Axonius: zero to $100M ARR in 4.5 years
15:00 – Founder identity tied to company success
21:00 – Purpose bigger than yourself fuels resilience
25:00 – Self-awareness as the #1 growth tool
28:00 – Executive Chairman + Columbia PhD pursuit
33:00 – Ron's personal reflection on founder identity

Links

Connect with our guest, Dean Sysman, on LinkedIn: https://www.linkedin.com/in/deansysman/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2229</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>418</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Can AI Do Your Cyber Job? Post Your Job Req and Find Out with Marcus J. Carey</title>
        <itunes:title>Can AI Do Your Cyber Job? Post Your Job Req and Find Out with Marcus J. Carey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/can-ai-do-your-cyber-job-post-your-job-req-and-find-out-with-marcus-j-carey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/can-ai-do-your-cyber-job-post-your-job-req-and-find-out-with-marcus-j-carey/#comments</comments>        <pubDate>Fri, 06 Mar 2026 16:20:24 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5667d89b-f334-355a-aa71-fba36a8011a3</guid>
                                    <description><![CDATA[<p>Last episode, Ron and Marcus made predictions. This episode, they brought the receipts.</p>
<p>
A journalist built an app with vibe coding and got hacked on live television. </p>
<p>
A social network built entirely by AI (not a single line of human code!) exposed 1.5 million authentication tokens and private messages between agents. </p>
<p>
And 88% of organizations have already had an AI security incident, while barely 14% of deployed agents ever saw a security review. </p>
<p>
The warnings from last episode aged fast. Marcus J. Carey is back to talk about what that actually means for the people building right now, not the people theorizing about it. Ron and Marcus are in the code themselves, and this conversation is what that experience actually looks like: OpenClaw running loose on your machine, agents racking up API bills, and why guidance, not prompts, not tools, is the real skill that separates builders who thrive from builders who ship disasters.</p>
<p>Impactful Moments
00:00 - Introduction
02:00 - Vibe coding hack on live TV
03:30 - Mo Book leaks 1.5M auth tokens
06:00 - Marcus' origin story: War Games, 1983
08:00 - OpenClaw escapes the lab
13:30 - AT&amp;T cuts help desk spend 90%
17:00 - Context is king, guidance is everything
19:00 - Can AI do your job rec right now?
24:00 - The first cybersecurity jobs agents will replace
27:00 - Expertise + AI = 1000x yourself
30:00 - Focus on outcomes, not new tools</p>
<p> </p>
<p>
Links
Connect with our guest, Marcus J. Carey, on LinkedIn: <a href='https://www.linkedin.com/in/marcuscarey/'>https://www.linkedin.com/in/marcuscarey/</a></p>
<p> </p>
<p>Read the articles we referenced in this episode:
The vibe coding hack that aired on live TV, ICAEW breaks down exactly how it happened and what it means for anyone building with AI: <a href='https://www.icaew.com/insights/viewpoints-on-the-news/2026/feb-2026/cyber-dangers-of-agents-and-vibe-coding'>https://www.icaew.com/insights/viewpoints-on-the-news/2026/feb-2026/cyber-dangers-of-agents-and-vibe-coding</a></p>
<p>
88% of organizations have already had an AI security incident. See the full data from the Cisco State of AI Security 2026 report: <a href='https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/'>https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Last episode, Ron and Marcus made predictions. This episode, they brought the receipts.</p>
<p><br>
A journalist built an app with vibe coding and got hacked on live television. </p>
<p><br>
A social network built entirely by AI (not a single line of human code!) exposed 1.5 million authentication tokens and private messages between agents. </p>
<p><br>
And 88% of organizations have already had an AI security incident, while barely 14% of deployed agents ever saw a security review. </p>
<p><br>
The warnings from last episode aged fast. Marcus J. Carey is back to talk about what that actually means for the people building right now, not the people theorizing about it. Ron and Marcus are in the code themselves, and this conversation is what that experience actually looks like: OpenClaw running loose on your machine, agents racking up API bills, and why guidance, not prompts, not tools, is the real skill that separates builders who thrive from builders who ship disasters.</p>
<p>Impactful Moments<br>
00:00 - Introduction<br>
02:00 - Vibe coding hack on live TV<br>
03:30 - Mo Book leaks 1.5M auth tokens<br>
06:00 - Marcus' origin story: War Games, 1983<br>
08:00 - OpenClaw escapes the lab<br>
13:30 - AT&amp;T cuts help desk spend 90%<br>
17:00 - Context is king, guidance is everything<br>
19:00 - Can AI do your job rec right now?<br>
24:00 - The first cybersecurity jobs agents will replace<br>
27:00 - Expertise + AI = 1000x yourself<br>
30:00 - Focus on outcomes, not new tools</p>
<p> </p>
<p><br>
Links<br>
Connect with our guest, Marcus J. Carey, on LinkedIn: <a href='https://www.linkedin.com/in/marcuscarey/'>https://www.linkedin.com/in/marcuscarey/</a></p>
<p> </p>
<p>Read the articles we referenced in this episode:<br>
The vibe coding hack that aired on live TV, ICAEW breaks down exactly how it happened and what it means for anyone building with AI: <a href='https://www.icaew.com/insights/viewpoints-on-the-news/2026/feb-2026/cyber-dangers-of-agents-and-vibe-coding'>https://www.icaew.com/insights/viewpoints-on-the-news/2026/feb-2026/cyber-dangers-of-agents-and-vibe-coding</a></p>
<p><br>
88% of organizations have already had an AI security incident. See the full data from the Cisco State of AI Security 2026 report: <a href='https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/'>https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/c5shrkz6wr3ahyxj/HVS26_EP417_Marcus_Carey_Final_b4fws.mp3" length="55921790" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Last episode, Ron and Marcus made predictions. This episode, they brought the receipts.
A journalist built an app with vibe coding and got hacked on live television. 
A social network built entirely by AI (not a single line of human code!) exposed 1.5 million authentication tokens and private messages between agents. 
And 88% of organizations have already had an AI security incident, while barely 14% of deployed agents ever saw a security review. 
The warnings from last episode aged fast. Marcus J. Carey is back to talk about what that actually means for the people building right now, not the people theorizing about it. Ron and Marcus are in the code themselves, and this conversation is what that experience actually looks like: OpenClaw running loose on your machine, agents racking up API bills, and why guidance, not prompts, not tools, is the real skill that separates builders who thrive from builders who ship disasters.
Impactful Moments00:00 - Introduction02:00 - Vibe coding hack on live TV03:30 - Mo Book leaks 1.5M auth tokens06:00 - Marcus' origin story: War Games, 198308:00 - OpenClaw escapes the lab13:30 - AT&amp;T cuts help desk spend 90%17:00 - Context is king, guidance is everything19:00 - Can AI do your job rec right now?24:00 - The first cybersecurity jobs agents will replace27:00 - Expertise + AI = 1000x yourself30:00 - Focus on outcomes, not new tools
 
LinksConnect with our guest, Marcus J. Carey, on LinkedIn: https://www.linkedin.com/in/marcuscarey/
 
Read the articles we referenced in this episode:The vibe coding hack that aired on live TV, ICAEW breaks down exactly how it happened and what it means for anyone building with AI: https://www.icaew.com/insights/viewpoints-on-the-news/2026/feb-2026/cyber-dangers-of-agents-and-vibe-coding
88% of organizations have already had an AI security incident. See the full data from the Cisco State of AI Security 2026 report: https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2329</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>417</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Why 69% of CISOs Are Ready to Walk Away with Anthony Johnson</title>
        <itunes:title>Why 69% of CISOs Are Ready to Walk Away with Anthony Johnson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/why-69-of-cisos-are-ready-to-walk-away-with-anthony-johnson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/why-69-of-cisos-are-ready-to-walk-away-with-anthony-johnson/#comments</comments>        <pubDate>Fri, 06 Mar 2026 16:19:31 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/4f7d0509-a0c2-310a-b57b-051473c0850e</guid>
                                    <description><![CDATA[<p>The CISO role isn’t the finish line, it’s a launchpad. 69% of security executives are eyeing the exit, and Anthony Johnson is proof that what comes next can be even bigger.</p>
<p>
Anthony Johnson, former Global CISO at JP Morgan and Fannie Mae, now founder and managing partner at Delve Risk, breaks down what really happens when a security leader stops buying tools and starts building companies. From the trap of unpaid advisory boards to why AI is eliminating the entry-level pipeline, Anthony delivers a no-nonsense look at career strategy, the future of fractional work, and why understanding how your company makes money is the most underrated skill in cybersecurity. If you’re a security practitioner at any level, this episode will change how you think about your next move.</p>
<p>
Impactful Moments
00:00 - Introduction
01:00 - Meet Anthony Johnson
02:00 - 69% of CISOs want out
06:00 - Why Anthony left the CISO seat
09:00 - Revenue changes your security priorities
11:00 - Career paths after the CISO role
13:00 - The advisory board compensation trap
17:00 - AI’s threat to the talent pipeline
22:00 - Hiring for aptitude over competency
24:00 - Soft skills win in the AI era
29:00 - Corporate loyalty is dead—now what
31:00 - Networking that actually lands roles
34:00 - Know how your company makes money
36:00 - Ron’s personal reflection on freedom</p>
<p>
Links
Connect with our guest, Anthony Johnson, on LinkedIn: <a href='https://www.linkedin.com/in/anthony-johnson-delverisk/'>https://www.linkedin.com/in/anthony-johnson-delverisk/</a></p>
<p>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The CISO role isn’t the finish line, it’s a launchpad. 69% of security executives are eyeing the exit, and Anthony Johnson is proof that what comes next can be even bigger.</p>
<p><br>
Anthony Johnson, former Global CISO at JP Morgan and Fannie Mae, now founder and managing partner at Delve Risk, breaks down what really happens when a security leader stops buying tools and starts building companies. From the trap of unpaid advisory boards to why AI is eliminating the entry-level pipeline, Anthony delivers a no-nonsense look at career strategy, the future of fractional work, and why understanding how your company makes money is the most underrated skill in cybersecurity. If you’re a security practitioner at any level, this episode will change how you think about your next move.</p>
<p><br>
Impactful Moments<br>
00:00 - Introduction<br>
01:00 - Meet Anthony Johnson<br>
02:00 - 69% of CISOs want out<br>
06:00 - Why Anthony left the CISO seat<br>
09:00 - Revenue changes your security priorities<br>
11:00 - Career paths after the CISO role<br>
13:00 - The advisory board compensation trap<br>
17:00 - AI’s threat to the talent pipeline<br>
22:00 - Hiring for aptitude over competency<br>
24:00 - Soft skills win in the AI era<br>
29:00 - Corporate loyalty is dead—now what<br>
31:00 - Networking that actually lands roles<br>
34:00 - Know how your company makes money<br>
36:00 - Ron’s personal reflection on freedom</p>
<p><br>
Links<br>
Connect with our guest, Anthony Johnson, on LinkedIn: <a href='https://www.linkedin.com/in/anthony-johnson-delverisk/'>https://www.linkedin.com/in/anthony-johnson-delverisk/</a></p>
<p><br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fzqde977nyd2z4c3/HVS26_EP416_Anthony_Johnson9317o.mp3" length="38499158" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The CISO role isn’t the finish line, it’s a launchpad. 69% of security executives are eyeing the exit, and Anthony Johnson is proof that what comes next can be even bigger.
Anthony Johnson, former Global CISO at JP Morgan and Fannie Mae, now founder and managing partner at Delve Risk, breaks down what really happens when a security leader stops buying tools and starts building companies. From the trap of unpaid advisory boards to why AI is eliminating the entry-level pipeline, Anthony delivers a no-nonsense look at career strategy, the future of fractional work, and why understanding how your company makes money is the most underrated skill in cybersecurity. If you’re a security practitioner at any level, this episode will change how you think about your next move.
Impactful Moments00:00 - Introduction01:00 - Meet Anthony Johnson02:00 - 69% of CISOs want out06:00 - Why Anthony left the CISO seat09:00 - Revenue changes your security priorities11:00 - Career paths after the CISO role13:00 - The advisory board compensation trap17:00 - AI’s threat to the talent pipeline22:00 - Hiring for aptitude over competency24:00 - Soft skills win in the AI era29:00 - Corporate loyalty is dead—now what31:00 - Networking that actually lands roles34:00 - Know how your company makes money36:00 - Ron’s personal reflection on freedom
LinksConnect with our guest, Anthony Johnson, on LinkedIn: https://www.linkedin.com/in/anthony-johnson-delverisk/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2406</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>416</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Securing the Workspace Attackers Already Live In with Rajan Kapoor</title>
        <itunes:title>Securing the Workspace Attackers Already Live In with Rajan Kapoor</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/securing-the-workspace-attackers-already-live-in-with-rajan-kapoor/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/securing-the-workspace-attackers-already-live-in-with-rajan-kapoor/#comments</comments>        <pubDate>Thu, 19 Feb 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d80b1656-cf9f-331b-8e93-eefd7ed17d57</guid>
                                    <description><![CDATA[<p>Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover. </p>
<p>
In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough.</p>
<p>Impactful Moments
00:00 – Introduction
03:30 – The current state of phishing
05:30 – Outbound email compromise risk
09:30 – OAuth apps as attack vectors
15:00 – AI agents accessing your workspace
16:00 – Prompt injection is the new SQL injection
18:00 – Allow listing apps immediately
24:30 – Google Workspace vs Microsoft 365 security
27:30 – Custom detections require API expertise
28:00 – Why passkeys matter right now
32:00 – Data lifecycle management for shared docs</p>
<p>Links
Connect with our guest, Rajan Kapoor, on LinkedIn: <a href='https://www.linkedin.com/in/rajankkapoor/'>https://www.linkedin.com/in/rajankkapoor/</a></p>
<p>
Learn more about Material Security: <a href='https://material.security'>https://material.security </a></p>
<p>
___
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams </a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover. </p>
<p><br>
In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough.</p>
<p>Impactful Moments<br>
00:00 – Introduction<br>
03:30 – The current state of phishing<br>
05:30 – Outbound email compromise risk<br>
09:30 – OAuth apps as attack vectors<br>
15:00 – AI agents accessing your workspace<br>
16:00 – Prompt injection is the new SQL injection<br>
18:00 – Allow listing apps immediately<br>
24:30 – Google Workspace vs Microsoft 365 security<br>
27:30 – Custom detections require API expertise<br>
28:00 – Why passkeys matter right now<br>
32:00 – Data lifecycle management for shared docs</p>
<p>Links<br>
Connect with our guest, Rajan Kapoor, on LinkedIn: <a href='https://www.linkedin.com/in/rajankkapoor/'>https://www.linkedin.com/in/rajankkapoor/</a></p>
<p><br>
Learn more about Material Security: <a href='https://material.security'>https://material.security </a></p>
<p><br>
___<br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p><br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams </a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gxby3kqq382fbbwu/HVS26_EP415_Material_Security9h1tg.mp3" length="55422691" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover. 
In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough.
Impactful Moments00:00 – Introduction03:30 – The current state of phishing05:30 – Outbound email compromise risk09:30 – OAuth apps as attack vectors15:00 – AI agents accessing your workspace16:00 – Prompt injection is the new SQL injection18:00 – Allow listing apps immediately24:30 – Google Workspace vs Microsoft 365 security27:30 – Custom detections require API expertise28:00 – Why passkeys matter right now32:00 – Data lifecycle management for shared docs
LinksConnect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/
Learn more about Material Security: https://material.security 
___Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Check out our upcoming events: https://www.hackervalley.com/livestreams 
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2309</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>415</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Beating “Checkbox Security” With Continuous Offense with Sonali Shah</title>
        <itunes:title>Beating “Checkbox Security” With Continuous Offense with Sonali Shah</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/beating-checkbox-security-with-continuous-offense-with-sonali-shah/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/beating-checkbox-security-with-continuous-offense-with-sonali-shah/#comments</comments>        <pubDate>Thu, 12 Feb 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/012804dc-d97f-3fff-b2d4-28ce731fe23d</guid>
                                    <description><![CDATA[<p>Security doesn’t fail because you missed a tool, it fails because “secure today” tricks you into relaxing tomorrow. This episode exposes why the real fight isn’t compliance… it’s whether your defenses hold up once attackers hit you with machine-speed pressure.</p>
<p>Ron sits down with Sonali Shah, CEO of Cobalt, to talk about how human-led, AI-powered penetration testing is evolving into full-spectrum offensive security. Sonali shares how Cobalt can start a test in 24 hours, push findings directly into Slack/Teams and Jira, and use learnings from 5,000+ pentests a year to continuously sharpen what gets caught. The big takeaway: automation finds the easy stuff as humans find the business-logic traps and attack chains that actually break companies.</p>
<p>
Impactful Moments
00:00 - Introduction
02:21- Sonali’s unexpected CEO path
06:10 - Compliance isn’t real security
10:19 - PTaaS: start in 24 hours
12:33- 5,000 pentests yearly scale
17:01 - Humans beat automation limits
20:16 - AI behavior vulnerabilities emerge
27:54 - Indirect prompt injection explained
30:51 - Why juniors + AI is risky
38:27 - 2026 becomes AI battleground</p>
<p>
Links
Connect with Sonali on LinkedIn: <a href='https://www.linkedin.com/in/sonalinshah/'>https://www.linkedin.com/in/sonalinshah/</a></p>
<p>
Check out Cobalt: <a href='https://www.cobalt.io'>https://www.cobalt.io</a></p>
<p> </p>
<p>____
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Security doesn’t fail because you missed a tool, it fails because “secure today” tricks you into relaxing tomorrow. This episode exposes why the real fight isn’t compliance… it’s whether your defenses hold up once attackers hit you with machine-speed pressure.</p>
<p>Ron sits down with Sonali Shah, CEO of Cobalt, to talk about how human-led, AI-powered penetration testing is evolving into full-spectrum offensive security. Sonali shares how Cobalt can start a test in 24 hours, push findings directly into Slack/Teams and Jira, and use learnings from 5,000+ pentests a year to continuously sharpen what gets caught. The big takeaway: automation finds the easy stuff as humans find the business-logic traps and attack chains that actually break companies.</p>
<p><br>
Impactful Moments<br>
00:00 - Introduction<br>
02:21- Sonali’s unexpected CEO path<br>
06:10 - Compliance isn’t real security<br>
10:19 - PTaaS: start in 24 hours<br>
12:33- 5,000 pentests yearly scale<br>
17:01 - Humans beat automation limits<br>
20:16 - AI behavior vulnerabilities emerge<br>
27:54 - Indirect prompt injection explained<br>
30:51 - Why juniors + AI is risky<br>
38:27 - 2026 becomes AI battleground</p>
<p><br>
Links<br>
Connect with Sonali on LinkedIn: <a href='https://www.linkedin.com/in/sonalinshah/'>https://www.linkedin.com/in/sonalinshah/</a></p>
<p><br>
Check out Cobalt: <a href='https://www.cobalt.io'>https://www.cobalt.io</a></p>
<p> </p>
<p>____<br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bwn59x36sax2z6u9/HVS26_EP414_Cobalt_Full_EP_mp37a5nh.mp3" length="59804366" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Security doesn’t fail because you missed a tool, it fails because “secure today” tricks you into relaxing tomorrow. This episode exposes why the real fight isn’t compliance… it’s whether your defenses hold up once attackers hit you with machine-speed pressure.
Ron sits down with Sonali Shah, CEO of Cobalt, to talk about how human-led, AI-powered penetration testing is evolving into full-spectrum offensive security. Sonali shares how Cobalt can start a test in 24 hours, push findings directly into Slack/Teams and Jira, and use learnings from 5,000+ pentests a year to continuously sharpen what gets caught. The big takeaway: automation finds the easy stuff as humans find the business-logic traps and attack chains that actually break companies.
Impactful Moments00:00 - Introduction02:21- Sonali’s unexpected CEO path06:10 - Compliance isn’t real security10:19 - PTaaS: start in 24 hours12:33- 5,000 pentests yearly scale17:01 - Humans beat automation limits20:16 - AI behavior vulnerabilities emerge27:54 - Indirect prompt injection explained30:51 - Why juniors + AI is risky38:27 - 2026 becomes AI battleground
LinksConnect with Sonali on LinkedIn: https://www.linkedin.com/in/sonalinshah/
Check out Cobalt: https://www.cobalt.io
 
____Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2491</itunes:duration>
                <itunes:episode>414</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Turning Agent Chaos into a Command Center with Pedram Amini</title>
        <itunes:title>Turning Agent Chaos into a Command Center with Pedram Amini</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/turning-agent-chaos-into-a-command-center-with-pedram-amini/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/turning-agent-chaos-into-a-command-center-with-pedram-amini/#comments</comments>        <pubDate>Tue, 10 Feb 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/92ef11f5-b67b-3fc6-9bbd-b9ed789eda54</guid>
                                    <description><![CDATA[<p>Text threads made AI feel personal, then agents made it productive, and suddenly “success” turns into chaos you can’t even track.</p>
<p>
In this episode, Ron sits down with Pedram Amini, creator of Maestro, to show what agent work looks like when you stop babysitting and start orchestrating. Pedram lays out why context windows are the limiter, why harnessing beats model-chasing right now, and how Auto Run executes task-docs with fresh context every iteration so agents can run for hours (or days) without melting down.</p>
<p>
Impactful Moments
00:00 - Intro
02:05 - Codex desktop sparks agent shift
06:40 - Harness beats model iteration
08:10 - Context window: the hidden limiter
12:10 - Terminal sprawl creates agent chaos
14:05 - Maestro panels: agents, tabs, history
17:25 - Auto Run: fresh context per task
26:15 - “Donate tokens” via Symphony PRs
28:20 - AI tax debate gets spicy
33:05 - Start simple: download and run</p>
<p> </p>
<p>Links
Connect with Pedram on LinkedIn: <a href='https://www.linkedin.com/in/pedramamini/'>https://www.linkedin.com/in/pedramamini/</a></p>
<p>
Check out Maestro for yourself: <a href='https://runmaestro.ai/'>https://runmaestro.ai/</a></p>
<p> </p>
<p> </p>
<p>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Text threads made AI feel personal, then agents made it productive, and suddenly “success” turns into chaos you can’t even track.</p>
<p><br>
In this episode, Ron sits down with Pedram Amini, creator of Maestro, to show what agent work looks like when you stop babysitting and start orchestrating. Pedram lays out why context windows are the limiter, why harnessing beats model-chasing right now, and how Auto Run executes task-docs with fresh context every iteration so agents can run for hours (or days) without melting down.</p>
<p><br>
Impactful Moments<br>
00:00 - Intro<br>
02:05 - Codex desktop sparks agent shift<br>
06:40 - Harness beats model iteration<br>
08:10 - Context window: the hidden limiter<br>
12:10 - Terminal sprawl creates agent chaos<br>
14:05 - Maestro panels: agents, tabs, history<br>
17:25 - Auto Run: fresh context per task<br>
26:15 - “Donate tokens” via Symphony PRs<br>
28:20 - AI tax debate gets spicy<br>
33:05 - Start simple: download and run</p>
<p> </p>
<p>Links<br>
Connect with Pedram on LinkedIn: <a href='https://www.linkedin.com/in/pedramamini/'>https://www.linkedin.com/in/pedramamini/</a></p>
<p><br>
Check out Maestro for yourself: <a href='https://runmaestro.ai/'>https://runmaestro.ai/</a></p>
<p> </p>
<p> </p>
<p><br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/yj7wab4qz2jh7cij/HVS26_EP413_Pedram_Amini_Full_EP68v9u.mp3" length="54323668" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Text threads made AI feel personal, then agents made it productive, and suddenly “success” turns into chaos you can’t even track.
In this episode, Ron sits down with Pedram Amini, creator of Maestro, to show what agent work looks like when you stop babysitting and start orchestrating. Pedram lays out why context windows are the limiter, why harnessing beats model-chasing right now, and how Auto Run executes task-docs with fresh context every iteration so agents can run for hours (or days) without melting down.
Impactful Moments00:00 - Intro02:05 - Codex desktop sparks agent shift06:40 - Harness beats model iteration08:10 - Context window: the hidden limiter12:10 - Terminal sprawl creates agent chaos14:05 - Maestro panels: agents, tabs, history17:25 - Auto Run: fresh context per task26:15 - “Donate tokens” via Symphony PRs28:20 - AI tax debate gets spicy33:05 - Start simple: download and run
 
LinksConnect with Pedram on LinkedIn: https://www.linkedin.com/in/pedramamini/
Check out Maestro for yourself: https://runmaestro.ai/
 
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2263</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>413</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan</title>
        <itunes:title>Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/why-mfa-isn-t-the-safety-net-you-think-it-is-with-yaamini-barathi-mohan/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/why-mfa-isn-t-the-safety-net-you-think-it-is-with-yaamini-barathi-mohan/#comments</comments>        <pubDate>Thu, 29 Jan 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c3a52a8e-686c-333b-9e28-bead4643fc7d</guid>
                                    <description><![CDATA[<p>Phishing didn’t get smarter, it got better at looking normal. What used to be obvious scams now blend directly into the platforms, workflows, and security controls people trust every day.</p>
<p>
In this episode, Ron sits down with Yaamini Barathi Mohan, 2024 DMA Rising Star, to break down how modern phishing attacks bypass MFA, abuse trusted services like Microsoft 365, and ultimately succeed inside the browser. Together, they examine why over-reliance on automation creates blind spots, how zero trust becomes practical at the browser layer, and why human judgment is still the deciding factor as attackers scale with AI.

</p>
<p>Impactful Moments</p>
<p>00:00 - Introduction
02:44 - Cloud infrastructure powering crime at scale
07:45 - What phishing 2.0 really means
12:10 - How MFA gets bypassed in real attacks
15:30 - Why the browser is the final control point
18:40 - AI reducing SOC alert fatigue
23:07 - Mentorship shaping cybersecurity careers
27:00 - Thinking like attackers to defend better
31:15 - When trust becomes the attack surface</p>
<p> </p>
<p>Links</p>
<p>Connect with our guest, Yaamini Barathi Mohan, on LinkedIn: <a href='https://www.linkedin.com/in/yaamini-mohan/'>https://www.linkedin.com/in/yaamini-mohan/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Phishing didn’t get smarter, it got better at looking normal. What used to be obvious scams now blend directly into the platforms, workflows, and security controls people trust every day.</p>
<p><br>
In this episode, Ron sits down with Yaamini Barathi Mohan, 2024 DMA Rising Star, to break down how modern phishing attacks bypass MFA, abuse trusted services like Microsoft 365, and ultimately succeed inside the browser. Together, they examine why over-reliance on automation creates blind spots, how zero trust becomes practical at the browser layer, and why human judgment is still the deciding factor as attackers scale with AI.<br>
<br>
</p>
<p>Impactful Moments</p>
<p>00:00 - Introduction<br>
02:44 - Cloud infrastructure powering crime at scale<br>
07:45 - What phishing 2.0 really means<br>
12:10 - How MFA gets bypassed in real attacks<br>
15:30 - Why the browser is the final control point<br>
18:40 - AI reducing SOC alert fatigue<br>
23:07 - Mentorship shaping cybersecurity careers<br>
27:00 - Thinking like attackers to defend better<br>
31:15 - When trust becomes the attack surface</p>
<p> </p>
<p>Links</p>
<p>Connect with our guest, Yaamini Barathi Mohan, on LinkedIn: <a href='https://www.linkedin.com/in/yaamini-mohan/'>https://www.linkedin.com/in/yaamini-mohan/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hmxf6zdse7gqy6z6/HVS26_EP412_YAAMINI_BARATHI9wfhh.mp3" length="46844288" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Phishing didn’t get smarter, it got better at looking normal. What used to be obvious scams now blend directly into the platforms, workflows, and security controls people trust every day.
In this episode, Ron sits down with Yaamini Barathi Mohan, 2024 DMA Rising Star, to break down how modern phishing attacks bypass MFA, abuse trusted services like Microsoft 365, and ultimately succeed inside the browser. Together, they examine why over-reliance on automation creates blind spots, how zero trust becomes practical at the browser layer, and why human judgment is still the deciding factor as attackers scale with AI.
Impactful Moments
00:00 - Introduction02:44 - Cloud infrastructure powering crime at scale07:45 - What phishing 2.0 really means12:10 - How MFA gets bypassed in real attacks15:30 - Why the browser is the final control point18:40 - AI reducing SOC alert fatigue23:07 - Mentorship shaping cybersecurity careers27:00 - Thinking like attackers to defend better31:15 - When trust becomes the attack surface
 
Links
Connect with our guest, Yaamini Barathi Mohan, on LinkedIn: https://www.linkedin.com/in/yaamini-mohan/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1951</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>412</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>When Cybercrime Learned How to Make Money and Never Looked Back with Graham Cluley</title>
        <itunes:title>When Cybercrime Learned How to Make Money and Never Looked Back with Graham Cluley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/when-cybercrime-learned-how-to-make-money-and-never-looked-back-with-graham-cluley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/when-cybercrime-learned-how-to-make-money-and-never-looked-back-with-graham-cluley/#comments</comments>        <pubDate>Sun, 25 Jan 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d5078e01-d4a3-3ea3-96b3-a94875a046aa</guid>
                                    <description><![CDATA[<p>Cybersecurity didn’t start as a billion-dollar crime machine. It started as pranks, ego, and curiosity. That origin story explains almost everything that’s breaking today.</p>
<p>
Ron sits down with Graham Cluley, one of the earliest antivirus developers turned trusted cyber voice, to trace how malware evolved from digital graffiti into organized financial warfare. From floppy disks and casino-style viruses to ransomware, extortion, and agentic AI, the conversation shows how early decisions still shape today’s most dangerous assumptions. Graham also explains why AI feels inevitable, but still deeply unfinished inside modern organizations.</p>
<p>
Impactful Moments
00:00 - Introduction
04:16 - Malware before money existed
07:30 - Cheesy biscuits changed cybersecurity
13:10 - When documents became dangerous
14:33 - Crime replaced curiosity
15:23 - Sony proved no one was safe
20:15 - Reporting hacks without causing harm
24:01 - AI replacing penetration testers
29:18 - Agentic AI shifts the threat model
36:30 - Why rushing AI breaks trust</p>
<p>
Links
Connect with our guest on LinkedIn: <a href='https://www.linkedin.com/in/grahamcluley/'>https://www.linkedin.com/in/grahamcluley/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Cybersecurity didn’t start as a billion-dollar crime machine. It started as pranks, ego, and curiosity. That origin story explains almost everything that’s breaking today.</p>
<p><br>
Ron sits down with Graham Cluley, one of the earliest antivirus developers turned trusted cyber voice, to trace how malware evolved from digital graffiti into organized financial warfare. From floppy disks and casino-style viruses to ransomware, extortion, and agentic AI, the conversation shows how early decisions still shape today’s most dangerous assumptions. Graham also explains why AI feels inevitable, but still deeply unfinished inside modern organizations.</p>
<p><br>
Impactful Moments<br>
00:00 - Introduction<br>
04:16 - Malware before money existed<br>
07:30 - Cheesy biscuits changed cybersecurity<br>
13:10 - When documents became dangerous<br>
14:33 - Crime replaced curiosity<br>
15:23 - Sony proved no one was safe<br>
20:15 - Reporting hacks without causing harm<br>
24:01 - AI replacing penetration testers<br>
29:18 - Agentic AI shifts the threat model<br>
36:30 - Why rushing AI breaks trust</p>
<p><br>
Links<br>
Connect with our guest on LinkedIn: <a href='https://www.linkedin.com/in/grahamcluley/'>https://www.linkedin.com/in/grahamcluley/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3yyyfx6da67d782r/HVS26_EP411_Graham_Cluley_Rev17vqv7.mp3" length="53724314" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Cybersecurity didn’t start as a billion-dollar crime machine. It started as pranks, ego, and curiosity. That origin story explains almost everything that’s breaking today.
Ron sits down with Graham Cluley, one of the earliest antivirus developers turned trusted cyber voice, to trace how malware evolved from digital graffiti into organized financial warfare. From floppy disks and casino-style viruses to ransomware, extortion, and agentic AI, the conversation shows how early decisions still shape today’s most dangerous assumptions. Graham also explains why AI feels inevitable, but still deeply unfinished inside modern organizations.
Impactful Moments00:00 - Introduction04:16 - Malware before money existed07:30 - Cheesy biscuits changed cybersecurity13:10 - When documents became dangerous14:33 - Crime replaced curiosity15:23 - Sony proved no one was safe20:15 - Reporting hacks without causing harm24:01 - AI replacing penetration testers29:18 - Agentic AI shifts the threat model36:30 - Why rushing AI breaks trust
LinksConnect with our guest on LinkedIn: https://www.linkedin.com/in/grahamcluley/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2238</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>411</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>When Automation Outruns Control with Joshua Bregler</title>
        <itunes:title>When Automation Outruns Control with Joshua Bregler</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/when-automation-outruns-control-with-joshua-bregler/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/when-automation-outruns-control-with-joshua-bregler/#comments</comments>        <pubDate>Sun, 18 Jan 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/676fc827-4ec1-3113-a17e-164e98dd9d73</guid>
                                    <description><![CDATA[<p>AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and catastrophe.</p>
<p>
In this episode, Ron sits down with Joshua Bregler, Senior Security Manager at McKinsey’s QuantumBlack, to dissect how AI agents, pipelines, and dynamic permissions are reshaping application security. From prompt chaining attacks and MCP server sprawl to why static IAM is officially obsolete, this conversation gets brutally honest about what works, what doesn’t, and where security teams are fooling themselves.</p>
<p>
Impactful Moments
00:00 – Introduction
02:15 – AI agents create identity chaos
04:00 – Static permissions officially dead
07:05 – AI security is still AppSec
09:30 – Prompt chaining becomes invisible attack
12:23 – Solving problems vs solving AI
15:03 – Ethics becomes an AI blind spot
17:47 – Identity is the next security failure
20:07 – Frameworks no longer enough alone
26:38– AI fixing insecure code in real time
32:15 – Secure pipelines before production</p>
<p>
Connect with our Guest
Joshua Bregler on LinkedIn: https://www.linkedin.com/in/breglercissp/</p>
<p> </p>
<p>Our Links</p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and catastrophe.</p>
<p><br>
In this episode, Ron sits down with Joshua Bregler, Senior Security Manager at McKinsey’s QuantumBlack, to dissect how AI agents, pipelines, and dynamic permissions are reshaping application security. From prompt chaining attacks and MCP server sprawl to why static IAM is officially obsolete, this conversation gets brutally honest about what works, what doesn’t, and where security teams are fooling themselves.</p>
<p><br>
Impactful Moments<br>
00:00 – Introduction<br>
02:15 – AI agents create identity chaos<br>
04:00 – Static permissions officially dead<br>
07:05 – AI security is still AppSec<br>
09:30 – Prompt chaining becomes invisible attack<br>
12:23 – Solving problems vs solving AI<br>
15:03 – Ethics becomes an AI blind spot<br>
17:47 – Identity is the next security failure<br>
20:07 – Frameworks no longer enough alone<br>
26:38– AI fixing insecure code in real time<br>
32:15 – Secure pipelines before production</p>
<p><br>
Connect with our Guest<br>
Joshua Bregler on LinkedIn: https://www.linkedin.com/in/breglercissp/</p>
<p> </p>
<p>Our Links</p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/p3v5nvgp3jgx554b/HVS26_EP409_Joshua_Bregler_rev38zffe.mp3" length="53511782" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and catastrophe.
In this episode, Ron sits down with Joshua Bregler, Senior Security Manager at McKinsey’s QuantumBlack, to dissect how AI agents, pipelines, and dynamic permissions are reshaping application security. From prompt chaining attacks and MCP server sprawl to why static IAM is officially obsolete, this conversation gets brutally honest about what works, what doesn’t, and where security teams are fooling themselves.
Impactful Moments00:00 – Introduction02:15 – AI agents create identity chaos04:00 – Static permissions officially dead07:05 – AI security is still AppSec09:30 – Prompt chaining becomes invisible attack12:23 – Solving problems vs solving AI15:03 – Ethics becomes an AI blind spot17:47 – Identity is the next security failure20:07 – Frameworks no longer enough alone26:38– AI fixing insecure code in real time32:15 – Secure pipelines before production
Connect with our GuestJoshua Bregler on LinkedIn: https://www.linkedin.com/in/breglercissp/
 
Our Links
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2229</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>409</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Day AI Stopped Asking for Permission with Marcus J. Carey</title>
        <itunes:title>The Day AI Stopped Asking for Permission with Marcus J. Carey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-day-ai-stopped-asking-for-permission-with-marcus-j-carey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-day-ai-stopped-asking-for-permission-with-marcus-j-carey/#comments</comments>        <pubDate>Thu, 15 Jan 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3449e76e-2236-3f61-8906-2cd869ed7816</guid>
                                    <description><![CDATA[<p>AI didn’t quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started acting inside real systems, trust replaced experimentation and consequences became unavoidable.</p>
<p>
In this episode, Ron sits down with Marcus J. Carey, Principal Research Scientist at ReliaQuest, to examine what happens after AI is given authority: agents running in production, prompt debt replacing technical debt, vibe coding accelerating risk, and maintenance emerging as the true bottleneck. Together, they discuss how cybersecurity, software engineering, and the job market are shifting now that AI operates with autonomy, often faster than organizations can explain what their systems are actually doing.</p>
<p>
Impactful Moments
00:00 - Introduction
02:26 - AI agents cross into production
03:35 - Trust boundaries become attack surfaces
6:46 - Vibe coding and hidden technical debt
09:22 - Prompt debt changes everything
17:40 - Why junior knowledge disappears
19:00 - AI replaces repetitive cyber workflows
23:43 - Coding becomes human leverage
29:30 - Fall in love with the problem</p>
<p> </p>
<p>
Connect with our guest, Marcus J. Carey:</p>
<p>LinkedIn <a href='https://www.linkedin.com/in/marcuscarey/'>https://www.linkedin.com/in/marcuscarey/</a></p>
<p>
X <a href='https://x.com/marcusjcarey'>https://x.com/marcusjcarey</a></p>
<p> </p>
<p>Articles and Books Mentioned:</p>
<p>Article used for discussion:  <a href='https://www.techradar.com/pro/security/this-webui-vulnerability-allows-remote-code-execution-heres-how-to-stay-safe'>https://www.techradar.com/pro/security/this-webui-vulnerability-allows-remote-code-execution-heres-how-to-stay-safe</a></p>
<p> </p>
<p>Atomic Habits: <a href='https://jamesclear.com/atomic-habits-summary'>https://jamesclear.com/atomic-habits-summary</a></p>
<p> </p>
<p>Fall in Love with the Problem, Not the Solution: <a href='https://sobrief.com/books/fall-in-love-with-the-problem-not-the-solution'>https://sobrief.com/books/fall-in-love-with-the-problem-not-the-solution</a></p>
<p> </p>
<p>Our Links:
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI didn’t quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started acting inside real systems, trust replaced experimentation and consequences became unavoidable.</p>
<p><br>
In this episode, Ron sits down with Marcus J. Carey, Principal Research Scientist at ReliaQuest, to examine what happens after AI is given authority: agents running in production, prompt debt replacing technical debt, vibe coding accelerating risk, and maintenance emerging as the true bottleneck. Together, they discuss how cybersecurity, software engineering, and the job market are shifting now that AI operates with autonomy, often faster than organizations can explain what their systems are actually doing.</p>
<p><br>
Impactful Moments<br>
00:00 - Introduction<br>
02:26 - AI agents cross into production<br>
03:35 - Trust boundaries become attack surfaces<br>
6:46 - Vibe coding and hidden technical debt<br>
09:22 - Prompt debt changes everything<br>
17:40 - Why junior knowledge disappears<br>
19:00 - AI replaces repetitive cyber workflows<br>
23:43 - Coding becomes human leverage<br>
29:30 - Fall in love with the problem</p>
<p> </p>
<p><br>
Connect with our guest, Marcus J. Carey:</p>
<p>LinkedIn <a href='https://www.linkedin.com/in/marcuscarey/'>https://www.linkedin.com/in/marcuscarey/</a></p>
<p><br>
X <a href='https://x.com/marcusjcarey'>https://x.com/marcusjcarey</a></p>
<p> </p>
<p>Articles and Books Mentioned:</p>
<p>Article used for discussion:  <a href='https://www.techradar.com/pro/security/this-webui-vulnerability-allows-remote-code-execution-heres-how-to-stay-safe'>https://www.techradar.com/pro/security/this-webui-vulnerability-allows-remote-code-execution-heres-how-to-stay-safe</a></p>
<p> </p>
<p>Atomic Habits: <a href='https://jamesclear.com/atomic-habits-summary'>https://jamesclear.com/atomic-habits-summary</a></p>
<p> </p>
<p>Fall in Love with the Problem, Not the Solution: <a href='https://sobrief.com/books/fall-in-love-with-the-problem-not-the-solution'>https://sobrief.com/books/fall-in-love-with-the-problem-not-the-solution</a></p>
<p> </p>
<p>Our Links:<br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/v594e7inxj5rgq3i/HVS26_EP408_Marcus_J_Carey_rev46xmvj.mp3" length="48696892" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI didn’t quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started acting inside real systems, trust replaced experimentation and consequences became unavoidable.
In this episode, Ron sits down with Marcus J. Carey, Principal Research Scientist at ReliaQuest, to examine what happens after AI is given authority: agents running in production, prompt debt replacing technical debt, vibe coding accelerating risk, and maintenance emerging as the true bottleneck. Together, they discuss how cybersecurity, software engineering, and the job market are shifting now that AI operates with autonomy, often faster than organizations can explain what their systems are actually doing.
Impactful Moments00:00 - Introduction02:26 - AI agents cross into production03:35 - Trust boundaries become attack surfaces6:46 - Vibe coding and hidden technical debt09:22 - Prompt debt changes everything17:40 - Why junior knowledge disappears19:00 - AI replaces repetitive cyber workflows23:43 - Coding becomes human leverage29:30 - Fall in love with the problem
 
Connect with our guest, Marcus J. Carey:
LinkedIn https://www.linkedin.com/in/marcuscarey/
X https://x.com/marcusjcarey
 
Articles and Books Mentioned:
Article used for discussion:  https://www.techradar.com/pro/security/this-webui-vulnerability-allows-remote-code-execution-heres-how-to-stay-safe
 
Atomic Habits: https://jamesclear.com/atomic-habits-summary
 
Fall in Love with the Problem, Not the Solution: https://sobrief.com/books/fall-in-love-with-the-problem-not-the-solution
 
Our Links:Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2029</itunes:duration>
                <itunes:episode>408</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate</title>
        <itunes:title>When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/when-ai-ships-the-code-who-owns-the-risk-with-varun-badhwar-and-henrik-plate/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/when-ai-ships-the-code-who-owns-the-risk-with-varun-badhwar-and-henrik-plate/#comments</comments>        <pubDate>Thu, 08 Jan 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7b5df859-a179-34d2-b44a-0d9c29496fe0</guid>
                                    <description><![CDATA[<p>AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, it’s invisible security debt compounding faster than teams can see it.</p>
<p>
In this episode, Ron Eddings sits down with Varun Badhwar, Co-Founder &amp; CEO of Endor Labs, and Henrik Plate, Principal Security Researcher of Endor Labs, to break down how AI-assisted development is reshaping the software supply chain in real time. From MCP servers exploding across GitHub to agents trained on insecure code patterns, they analyze why traditional AppSec controls fail in an agent-driven world and what must replace them.</p>
<p>
This conversation pulls directly from Endor Labs’ 2025 State of Dependency Management Report, revealing why most AI-generated code is functionally correct yet fundamentally unsafe, how malicious packages are already exploiting agent workflows, and why security has to exist inside the IDE, not after the pull request.</p>
<p>
Impactful Moments
00:00 – Introduction
02:00 – Star Wars meets cybersecurity culture
03:00 – Why this report matters now
04:00 – MCP adoption explodes overnight
10:00 – Can you trust MCP servers
12:00 – Malicious packages weaponize agents
14:00 – Code works, security fails
22:00 – Hooks expose agent behavior
28:30 – 2026 means longer lunches
33:00 – How Endor Labs fixes this</p>
<p>
Links
Connect with our Varun on LinkedIn: <a href='https://www.linkedin.com/in/vbadhwar/'>https://www.linkedin.com/in/vbadhwar/</a></p>
<p>
Connect with our Henrik on LinkedIn: <a href='https://www.linkedin.com/in/henrikplate/'>https://www.linkedin.com/in/henrikplate/</a></p>
<p> </p>
<p>
Check out Endor Labs State of Dependency Management 2025: <a href='https://www.endorlabs.com/lp/state-of-dependency-management-2025'>https://www.endorlabs.com/lp/state-of-dependency-management-2025</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, it’s invisible security debt compounding faster than teams can see it.</p>
<p><br>
In this episode, Ron Eddings sits down with Varun Badhwar, Co-Founder &amp; CEO of Endor Labs, and Henrik Plate, Principal Security Researcher of Endor Labs, to break down how AI-assisted development is reshaping the software supply chain in real time. From MCP servers exploding across GitHub to agents trained on insecure code patterns, they analyze why traditional AppSec controls fail in an agent-driven world and what must replace them.</p>
<p><br>
This conversation pulls directly from Endor Labs’ 2025 State of Dependency Management Report, revealing why most AI-generated code is functionally correct yet fundamentally unsafe, how malicious packages are already exploiting agent workflows, and why security has to exist inside the IDE, not after the pull request.</p>
<p><br>
Impactful Moments<br>
00:00 – Introduction<br>
02:00 – Star Wars meets cybersecurity culture<br>
03:00 – Why this report matters now<br>
04:00 – MCP adoption explodes overnight<br>
10:00 – Can you trust MCP servers<br>
12:00 – Malicious packages weaponize agents<br>
14:00 – Code works, security fails<br>
22:00 – Hooks expose agent behavior<br>
28:30 – 2026 means longer lunches<br>
33:00 – How Endor Labs fixes this</p>
<p><br>
Links<br>
Connect with our Varun on LinkedIn: <a href='https://www.linkedin.com/in/vbadhwar/'>https://www.linkedin.com/in/vbadhwar/</a></p>
<p><br>
Connect with our Henrik on LinkedIn: <a href='https://www.linkedin.com/in/henrikplate/'>https://www.linkedin.com/in/henrikplate/</a></p>
<p> </p>
<p><br>
Check out Endor Labs State of Dependency Management 2025: <a href='https://www.endorlabs.com/lp/state-of-dependency-management-2025'>https://www.endorlabs.com/lp/state-of-dependency-management-2025</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vak3ahrcvzt97p67/HVS26_EP407_Endor_Labs78eku.mp3" length="33614048" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, it’s invisible security debt compounding faster than teams can see it.
In this episode, Ron Eddings sits down with Varun Badhwar, Co-Founder &amp; CEO of Endor Labs, and Henrik Plate, Principal Security Researcher of Endor Labs, to break down how AI-assisted development is reshaping the software supply chain in real time. From MCP servers exploding across GitHub to agents trained on insecure code patterns, they analyze why traditional AppSec controls fail in an agent-driven world and what must replace them.
This conversation pulls directly from Endor Labs’ 2025 State of Dependency Management Report, revealing why most AI-generated code is functionally correct yet fundamentally unsafe, how malicious packages are already exploiting agent workflows, and why security has to exist inside the IDE, not after the pull request.
Impactful Moments00:00 – Introduction02:00 – Star Wars meets cybersecurity culture03:00 – Why this report matters now04:00 – MCP adoption explodes overnight10:00 – Can you trust MCP servers12:00 – Malicious packages weaponize agents14:00 – Code works, security fails22:00 – Hooks expose agent behavior28:30 – 2026 means longer lunches33:00 – How Endor Labs fixes this
LinksConnect with our Varun on LinkedIn: https://www.linkedin.com/in/vbadhwar/
Connect with our Henrik on LinkedIn: https://www.linkedin.com/in/henrikplate/
 
Check out Endor Labs State of Dependency Management 2025: https://www.endorlabs.com/lp/state-of-dependency-management-2025
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2100</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>407</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Think Like a Hacker Before the Hack Happens with John Hammond</title>
        <itunes:title>Think Like a Hacker Before the Hack Happens with John Hammond</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/think-like-a-hacker-before-the-hack-happens-with-john-hammond/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/think-like-a-hacker-before-the-hack-happens-with-john-hammond/#comments</comments>        <pubDate>Thu, 01 Jan 2026 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a4f72d2e-268d-39d8-b077-1388f18d3756</guid>
                                    <description><![CDATA[<p>What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before they even strike. In cybersecurity, defense starts with offense, and the best defenders are those who've walked in the hacker's shoes.</p>
<p>In this episode, Ron sits down with John Hammond, principal security researcher at Huntress and one of cybersecurity's most recognizable educators. John shares his journey from Coast Guard enlistee to YouTube creator, building an entire media company around ethical hacking. They dig into the balance between public research and responsible disclosure, the rise of AI-augmented attacks, and why identity is now the biggest attack surface in modern enterprises.</p>
<p>
Impactful Moments:
00:00 - Introduction
01:00 - AI weaponized in cyber espionage
05:00 - Learning by teaching publicly
09:00 - Balancing curiosity with responsible disclosure
13:00 - Building a creator company
16:00 - Identity as the new frontier
20:00 - AI agents running breach simulations
22:00 - Predictions for cybersecurity in 2026
25:00 - Ron's hacking habit confession</p>
<p> </p>
<p>Links:
John Hammond LinkedIn: https://www.linkedin.com/in/johnhammond010/
John Hammond Youtube: https://www.youtube.com/@_JohnHammond</p>
<p>Article for Discussion: https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before they even strike. In cybersecurity, defense starts with offense, and the best defenders are those who've walked in the hacker's shoes.</p>
<p>In this episode, Ron sits down with John Hammond, principal security researcher at Huntress and one of cybersecurity's most recognizable educators. John shares his journey from Coast Guard enlistee to YouTube creator, building an entire media company around ethical hacking. They dig into the balance between public research and responsible disclosure, the rise of AI-augmented attacks, and why identity is now the biggest attack surface in modern enterprises.</p>
<p><br>
Impactful Moments:<br>
00:00 - Introduction<br>
01:00 - AI weaponized in cyber espionage<br>
05:00 - Learning by teaching publicly<br>
09:00 - Balancing curiosity with responsible disclosure<br>
13:00 - Building a creator company<br>
16:00 - Identity as the new frontier<br>
20:00 - AI agents running breach simulations<br>
22:00 - Predictions for cybersecurity in 2026<br>
25:00 - Ron's hacking habit confession</p>
<p> </p>
<p>Links:<br>
John Hammond LinkedIn: https://www.linkedin.com/in/johnhammond010/<br>
John Hammond Youtube: https://www.youtube.com/@_JohnHammond</p>
<p>Article for Discussion: https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/<br>
Check out our upcoming events: https://www.hackervalley.com/livestreams<br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
https://www.patreon.com/hackervalleystudio<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ezakw8dsztf88pcr/HVS26_EP406_John_Hammond9g1zi.mp3" length="27303282" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before they even strike. In cybersecurity, defense starts with offense, and the best defenders are those who've walked in the hacker's shoes.
In this episode, Ron sits down with John Hammond, principal security researcher at Huntress and one of cybersecurity's most recognizable educators. John shares his journey from Coast Guard enlistee to YouTube creator, building an entire media company around ethical hacking. They dig into the balance between public research and responsible disclosure, the rise of AI-augmented attacks, and why identity is now the biggest attack surface in modern enterprises.
Impactful Moments:00:00 - Introduction01:00 - AI weaponized in cyber espionage05:00 - Learning by teaching publicly09:00 - Balancing curiosity with responsible disclosure13:00 - Building a creator company16:00 - Identity as the new frontier20:00 - AI agents running breach simulations22:00 - Predictions for cybersecurity in 202625:00 - Ron's hacking habit confession
 
Links:John Hammond LinkedIn: https://www.linkedin.com/in/johnhammond010/John Hammond Youtube: https://www.youtube.com/@_JohnHammond
Article for Discussion: https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/Check out our upcoming events: https://www.hackervalley.com/livestreamsJoin our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioLove Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1706</itunes:duration>
                <itunes:episode>406</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt</title>
        <itunes:title>Breaking Into Banks and Bypassing Modern Security with Greg Hatcher and John Stigerwalt</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/breaking-into-banks-and-bypassing-modern-security-with-greg-hatcher-and-john-stigerwalt/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/breaking-into-banks-and-bypassing-modern-security-with-greg-hatcher-and-john-stigerwalt/#comments</comments>        <pubDate>Thu, 18 Dec 2025 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d6be82ac-9bfd-365a-a349-050caa41aea4</guid>
                                    <description><![CDATA[<p>Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities.</p>
<p>Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their latest physical penetration tests on financial institutions, manufacturing facilities protecting COVID-19 vaccine production, and why their new Server 2025 course had to rewrite most common Active Directory tools. They share stories of armed guards, police gun draws, poison ivy reconnaissance, and a bag of chips that saved them from serious trouble. The conversation reveals why EDR alone won't stop ransomware, how offline backups remain the exception rather than the rule, and what security controls actually work when attackers bring custom tooling.</p>
<p>Impactful Moments:</p>
<p>00:00 - Intro
01:00 - New training courses launched
03:00 - Server 2025 breaks standard tools
05:00 - COVID facility physical penetration
07:00 - Armed guards change the game
10:00 - Police draw guns on operators
13:00 - Bag of chips saves the day
15:00 - Nighttime versus daytime physical tests
18:00 - VIP home security assessments
20:00 - 2026 threat predictions
22:00 - Why EDR doesn't stop ransomware
27:00 - Low cost ransomware simulation ROI
29:00 - Three banks in four days
32:00 - Deepfake as the new EDR</p>
<p>
Links:</p>
<p>Connect with our guests – 
Greg Hatcher: https://www.linkedin.com/in/gregoryhatcher2/
John Stigerwalt: https://www.linkedin.com/in/john-stigerwalt-90a9b4110/
Learn more about White Knight Labs: https://www.whiteknightlabs.com</p>
<p>
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities.</p>
<p>Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their latest physical penetration tests on financial institutions, manufacturing facilities protecting COVID-19 vaccine production, and why their new Server 2025 course had to rewrite most common Active Directory tools. They share stories of armed guards, police gun draws, poison ivy reconnaissance, and a bag of chips that saved them from serious trouble. The conversation reveals why EDR alone won't stop ransomware, how offline backups remain the exception rather than the rule, and what security controls actually work when attackers bring custom tooling.</p>
<p>Impactful Moments:</p>
<p>00:00 - Intro<br>
01:00 - New training courses launched<br>
03:00 - Server 2025 breaks standard tools<br>
05:00 - COVID facility physical penetration<br>
07:00 - Armed guards change the game<br>
10:00 - Police draw guns on operators<br>
13:00 - Bag of chips saves the day<br>
15:00 - Nighttime versus daytime physical tests<br>
18:00 - VIP home security assessments<br>
20:00 - 2026 threat predictions<br>
22:00 - Why EDR doesn't stop ransomware<br>
27:00 - Low cost ransomware simulation ROI<br>
29:00 - Three banks in four days<br>
32:00 - Deepfake as the new EDR</p>
<p><br>
Links:</p>
<p>Connect with our guests – <br>
Greg Hatcher: https://www.linkedin.com/in/gregoryhatcher2/<br>
John Stigerwalt: https://www.linkedin.com/in/john-stigerwalt-90a9b4110/<br>
Learn more about White Knight Labs: https://www.whiteknightlabs.com</p>
<p><br>
Check out our upcoming events: https://www.hackervalley.com/livestreams<br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
https://www.patreon.com/hackervalleystudio<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8an9a32hg7eu8iur/HVS25_EP405_WKL.mp3" length="32178349" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities.
Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their latest physical penetration tests on financial institutions, manufacturing facilities protecting COVID-19 vaccine production, and why their new Server 2025 course had to rewrite most common Active Directory tools. They share stories of armed guards, police gun draws, poison ivy reconnaissance, and a bag of chips that saved them from serious trouble. The conversation reveals why EDR alone won't stop ransomware, how offline backups remain the exception rather than the rule, and what security controls actually work when attackers bring custom tooling.
Impactful Moments:
00:00 - Intro01:00 - New training courses launched03:00 - Server 2025 breaks standard tools05:00 - COVID facility physical penetration07:00 - Armed guards change the game10:00 - Police draw guns on operators13:00 - Bag of chips saves the day15:00 - Nighttime versus daytime physical tests18:00 - VIP home security assessments20:00 - 2026 threat predictions22:00 - Why EDR doesn't stop ransomware27:00 - Low cost ransomware simulation ROI29:00 - Three banks in four days32:00 - Deepfake as the new EDR
Links:
Connect with our guests – Greg Hatcher: https://www.linkedin.com/in/gregoryhatcher2/John Stigerwalt: https://www.linkedin.com/in/john-stigerwalt-90a9b4110/Learn more about White Knight Labs: https://www.whiteknightlabs.com
Check out our upcoming events: https://www.hackervalley.com/livestreamsJoin our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioLove Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discordBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2011</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>405</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes</title>
        <itunes:title>Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/defending-your-cyber-systems-and-your-mental-attack-surface-with-chris-hughes/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/defending-your-cyber-systems-and-your-mental-attack-surface-with-chris-hughes/#comments</comments>        <pubDate>Thu, 11 Dec 2025 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/acbfed82-1e2c-3232-bae6-baefa2dcbc12</guid>
                                    <description><![CDATA[<p>When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots.</p>
<p>In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aquia and host of the Resilient Cyber podcast. Chris helps reframe vulnerability work as exposure management, connect technical risk to human resilience, and break down the scoring and runtime tools security teams actually need today. Expect clear takeaways on EPSS, reachability analysis, ADR, AI’s double-edged role, and the one habit Chris swears by as a CEO. This episode fuses attack-surface reality with mental-attack-surface strategy so you walk away with both tactical moves and daily practices that protect systems and people.</p>
<p>
Impactful Moments:
00:00 - Intro
02:00 - Breaking: Fortinet WAF zero-day &amp; visibility lesson
05:00 - Meet Chris Hughes: CEO, author, Resilient Cyber host
08:00 - Mental attack surface explained and why it matters
18:00 - From CVSS to EPSS, reachability, and ADR realities
21:00 - AI as force-multiplier for attackers and defenders
24:30 - Exposure vs vulnerability naming, market trends
26:00 - Chris’s book &amp; how to follow his work
30:00 - Ron’s solo: 3 pillars to patch your mindset
34:00 - Closing takeaways and subscribe reminder</p>
<p>Links:
Connect with our guest, Chris Hughes, on LinkedIn: <a href='https://www.linkedin.com/in/resilientcyber/'>https://www.linkedin.com/in/resilientcyber/</a></p>
<p>
Check out the article on the Fortinet exploit here: <a href='https://www.helpnetsecurity.com/2025/11/14/fortinet-fortiweb-zero-day-exploited/'>https://www.helpnetsecurity.com/2025/11/14/fortinet-fortiweb-zero-day-exploited/ </a></p>
<p>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots.</p>
<p>In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aquia and host of the Resilient Cyber podcast. Chris helps reframe vulnerability work as exposure management, connect technical risk to human resilience, and break down the scoring and runtime tools security teams actually need today. Expect clear takeaways on EPSS, reachability analysis, ADR, AI’s double-edged role, and the one habit Chris swears by as a CEO. This episode fuses attack-surface reality with mental-attack-surface strategy so you walk away with both tactical moves and daily practices that protect systems and people.</p>
<p><br>
Impactful Moments:<br>
00:00 - Intro<br>
02:00 - Breaking: Fortinet WAF zero-day &amp; visibility lesson<br>
05:00 - Meet Chris Hughes: CEO, author, Resilient Cyber host<br>
08:00 - Mental attack surface explained and why it matters<br>
18:00 - From CVSS to EPSS, reachability, and ADR realities<br>
21:00 - AI as force-multiplier for attackers and defenders<br>
24:30 - Exposure vs vulnerability naming, market trends<br>
26:00 - Chris’s book &amp; how to follow his work<br>
30:00 - Ron’s solo: 3 pillars to patch your mindset<br>
34:00 - Closing takeaways and subscribe reminder</p>
<p>Links:<br>
Connect with our guest, Chris Hughes, on LinkedIn: <a href='https://www.linkedin.com/in/resilientcyber/'>https://www.linkedin.com/in/resilientcyber/</a></p>
<p><br>
Check out the article on the Fortinet exploit here: <a href='https://www.helpnetsecurity.com/2025/11/14/fortinet-fortiweb-zero-day-exploited/'>https://www.helpnetsecurity.com/2025/11/14/fortinet-fortiweb-zero-day-exploited/ </a></p>
<p><br>
Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cszn4xnpsqi2umru/HVS25_EP404_Chris_Hughesbda8w.mp3" length="32809477" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots.
In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aquia and host of the Resilient Cyber podcast. Chris helps reframe vulnerability work as exposure management, connect technical risk to human resilience, and break down the scoring and runtime tools security teams actually need today. Expect clear takeaways on EPSS, reachability analysis, ADR, AI’s double-edged role, and the one habit Chris swears by as a CEO. This episode fuses attack-surface reality with mental-attack-surface strategy so you walk away with both tactical moves and daily practices that protect systems and people.
Impactful Moments:00:00 - Intro02:00 - Breaking: Fortinet WAF zero-day &amp; visibility lesson05:00 - Meet Chris Hughes: CEO, author, Resilient Cyber host08:00 - Mental attack surface explained and why it matters18:00 - From CVSS to EPSS, reachability, and ADR realities21:00 - AI as force-multiplier for attackers and defenders24:30 - Exposure vs vulnerability naming, market trends26:00 - Chris’s book &amp; how to follow his work30:00 - Ron’s solo: 3 pillars to patch your mindset34:00 - Closing takeaways and subscribe reminder
Links:Connect with our guest, Chris Hughes, on LinkedIn: https://www.linkedin.com/in/resilientcyber/
Check out the article on the Fortinet exploit here: https://www.helpnetsecurity.com/2025/11/14/fortinet-fortiweb-zero-day-exploited/ 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2050</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>404</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Thriving Beyond Human Labor with Context-Powered AI with Daniel Miessler</title>
        <itunes:title>Thriving Beyond Human Labor with Context-Powered AI with Daniel Miessler</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/thriving-beyond-human-labor-with-context-powered-ai-with-daniel-miessler/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/thriving-beyond-human-labor-with-context-powered-ai-with-daniel-miessler/#comments</comments>        <pubDate>Thu, 04 Dec 2025 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/43bd6782-df71-320f-9922-ec0128c76619</guid>
                                    <description><![CDATA[<p>The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along.</p>
<p>In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that means for your future. Daniel shares how AI agents, context management, and his Telos problem-first framework are reshaping what it means to create value in the modern economy. From Apple to Human 3.0, Daniel explains why building in public, learning fast, and solving real problems are the ultimate career edge in an AI-powered world.</p>
<p>
Impactful Moments:
00:00 - Introduction
02:00 - Jobless profit boom accelerates
05:00 - Daniel's AI journey at Apple
08:00 - Building careers around problems
12:00 - AI bubble or timing problem
15:00 - Nine-year-old codes app in two hours
18:00 - Human labor is the bubble
22:00 - Context management changes everything
26:00 - Adaptation equals survival</p>
<p>Links:
Daniel’s Website: danielmiessler.com/
Daniel’s Github: https://github.com/danielmiessler/
Daniel’s LinkedIn: https://www.linkedin.com/in/danielmiessler/</p>
<p>Upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along.</p>
<p>In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that means for your future. Daniel shares how AI agents, context management, and his Telos problem-first framework are reshaping what it means to create value in the modern economy. From Apple to Human 3.0, Daniel explains why building in public, learning fast, and solving real problems are the ultimate career edge in an AI-powered world.</p>
<p><br>
Impactful Moments:<br>
00:00 - Introduction<br>
02:00 - Jobless profit boom accelerates<br>
05:00 - Daniel's AI journey at Apple<br>
08:00 - Building careers around problems<br>
12:00 - AI bubble or timing problem<br>
15:00 - Nine-year-old codes app in two hours<br>
18:00 - Human labor is the bubble<br>
22:00 - Context management changes everything<br>
26:00 - Adaptation equals survival</p>
<p>Links:<br>
Daniel’s Website: danielmiessler.com/<br>
Daniel’s Github: https://github.com/danielmiessler/<br>
Daniel’s LinkedIn: https://www.linkedin.com/in/danielmiessler/</p>
<p>Upcoming events: https://www.hackervalley.com/livestreams<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/<br>
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/d4rpmkvydzdkkhbb/HVS25_EP403_Daniel_Miessler9sssx.mp3" length="28487377" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along.
In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that means for your future. Daniel shares how AI agents, context management, and his Telos problem-first framework are reshaping what it means to create value in the modern economy. From Apple to Human 3.0, Daniel explains why building in public, learning fast, and solving real problems are the ultimate career edge in an AI-powered world.
Impactful Moments:00:00 - Introduction02:00 - Jobless profit boom accelerates05:00 - Daniel's AI journey at Apple08:00 - Building careers around problems12:00 - AI bubble or timing problem15:00 - Nine-year-old codes app in two hours18:00 - Human labor is the bubble22:00 - Context management changes everything26:00 - Adaptation equals survival
Links:Daniel’s Website: danielmiessler.com/Daniel’s Github: https://github.com/danielmiessler/Daniel’s LinkedIn: https://www.linkedin.com/in/danielmiessler/
Upcoming events: https://www.hackervalley.com/livestreamsLove Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discordBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1780</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>403</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Building EDR for AI: Controlling Autonomous Agents Before They Go Rogue with Ron Eddings</title>
        <itunes:title>Building EDR for AI: Controlling Autonomous Agents Before They Go Rogue with Ron Eddings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/building-edr-for-ai-controlling-autonomous-agents-before-they-go-rogue-with-ron-eddings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/building-edr-for-ai-controlling-autonomous-agents-before-they-go-rogue-with-ron-eddings/#comments</comments>        <pubDate>Tue, 02 Dec 2025 11:31:44 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a1b4182e-97b4-3f37-8e08-b9cd32d8d89b</guid>
                                    <description><![CDATA[<p>AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens.</p>
<p>In this episode, Ron breaks down the ChatGPT Atlas vulnerability that shocked researchers, revealing how malicious prompts can turn AI assistants against their own users by bypassing safeguards and accessing file systems. He presents his new talk "Hooking Before Hacking," introducing a framework for applying EDR principles, prevention, detection, and response, to AI agents before they execute unauthorized commands. From pre-tool use hooks that catch malicious intent to one-time passwords that put humans back in the loop, this episode shares practical security controls you can implement today to prevent your AI agents from going rogue.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
02:00 - ChatGPT Atlas vulnerability exposed
04:00 - AI technology outpacing security guardrails
05:00 - Guardrail jailbreaks and prompt injection
06:00 - AI agents deleting production databases
07:00 - EDR principles for AI agents
09:00 - Pre-tool use hooks catch intention
11:00 - User prompt sanitization prevents leaks
14:00 - One-time passwords for agent workflows
16:00 - Automation mistakes across 10 years</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>Check out the entire article here: <a href='https://www.yahoo.com/news/articles/cybersecurity-experts-warn-openai-chatgpt-101658986.html'>https://www.yahoo.com/news/articles/cybersecurity-experts-warn-openai-chatgpt-101658986.html </a></p>
<p>GitHub Repository: <a href='https://hackervalley.com/hooking-before-hacking'>https://hackervalley.com/hooking-before-hacking </a></p>
<p>See Ron's "Hooking Before Hacking" presentation slides here: <a href='http://hackervalley.com/hooking-before-hacking-presentation'>http://hackervalley.com/hooking-before-hacking-presentation</a></p>
<p>Check out our website: <a href='https://hackervalley.com/'>https://hackervalley.com/</a></p>
<p>Upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens.</p>
<p>In this episode, Ron breaks down the ChatGPT Atlas vulnerability that shocked researchers, revealing how malicious prompts can turn AI assistants against their own users by bypassing safeguards and accessing file systems. He presents his new talk "Hooking Before Hacking," introducing a framework for applying EDR principles, prevention, detection, and response, to AI agents before they execute unauthorized commands. From pre-tool use hooks that catch malicious intent to one-time passwords that put humans back in the loop, this episode shares practical security controls you can implement today to prevent your AI agents from going rogue.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
02:00 - ChatGPT Atlas vulnerability exposed<br>
04:00 - AI technology outpacing security guardrails<br>
05:00 - Guardrail jailbreaks and prompt injection<br>
06:00 - AI agents deleting production databases<br>
07:00 - EDR principles for AI agents<br>
09:00 - Pre-tool use hooks catch intention<br>
11:00 - User prompt sanitization prevents leaks<br>
14:00 - One-time passwords for agent workflows<br>
16:00 - Automation mistakes across 10 years</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>Check out the entire article here: <a href='https://www.yahoo.com/news/articles/cybersecurity-experts-warn-openai-chatgpt-101658986.html'>https://www.yahoo.com/news/articles/cybersecurity-experts-warn-openai-chatgpt-101658986.html </a></p>
<p>GitHub Repository: <a href='https://hackervalley.com/hooking-before-hacking'>https://hackervalley.com/hooking-before-hacking </a></p>
<p>See Ron's "Hooking Before Hacking" presentation slides here: <a href='http://hackervalley.com/hooking-before-hacking-presentation'>http://hackervalley.com/hooking-before-hacking-presentation</a></p>
<p>Check out our website: <a href='https://hackervalley.com/'>https://hackervalley.com/</a></p>
<p>Upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qhjwj3xrwpixyqdc/HVS25_EP402_Ron_Eddings8oth4.mp3" length="18818706" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens.
In this episode, Ron breaks down the ChatGPT Atlas vulnerability that shocked researchers, revealing how malicious prompts can turn AI assistants against their own users by bypassing safeguards and accessing file systems. He presents his new talk "Hooking Before Hacking," introducing a framework for applying EDR principles, prevention, detection, and response, to AI agents before they execute unauthorized commands. From pre-tool use hooks that catch malicious intent to one-time passwords that put humans back in the loop, this episode shares practical security controls you can implement today to prevent your AI agents from going rogue.
 
Impactful Moments:
00:00 - Introduction02:00 - ChatGPT Atlas vulnerability exposed04:00 - AI technology outpacing security guardrails05:00 - Guardrail jailbreaks and prompt injection06:00 - AI agents deleting production databases07:00 - EDR principles for AI agents09:00 - Pre-tool use hooks catch intention11:00 - User prompt sanitization prevents leaks14:00 - One-time passwords for agent workflows16:00 - Automation mistakes across 10 years
 
Links:
Connect with Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out the entire article here: https://www.yahoo.com/news/articles/cybersecurity-experts-warn-openai-chatgpt-101658986.html 
GitHub Repository: https://hackervalley.com/hooking-before-hacking 
See Ron's "Hooking Before Hacking" presentation slides here: http://hackervalley.com/hooking-before-hacking-presentation
Check out our website: https://hackervalley.com/
Upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1176</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>402</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Can AI Run Your SOC Better Than You? with Ahmed Achchak</title>
        <itunes:title>Can AI Run Your SOC Better Than You? with Ahmed Achchak</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/can-ai-run-your-soc-better-than-you-with-ahmed-achchak/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/can-ai-run-your-soc-better-than-you-with-ahmed-achchak/#comments</comments>        <pubDate>Thu, 13 Nov 2025 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/afb53b6f-1a29-3efc-9b48-90db2f7cc693</guid>
                                    <description><![CDATA[<p>What if your security team never missed a single alert and actually had time to think strategically?</p>
<p>In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the inside story of building a system that can act on threats faster than any human alone. Learn how Qevlar’s innovative approach is giving organizations clarity, control, and measurable ROI while freeing security teams to focus on what truly matters.</p>
<p>Impactful Moments
00:00 - Introduction
01:30 - Founding Qevlar AI by chance
03:30 - Inefficiency of current SOCs
05:00 - Augmenting analysts, not replacing them
08:00 - AI investigating alerts at scale
11:30 - How autonomous agents handle phishing
14:30 - Why tackling all alerts maximizes ROI
17:30 - Graph technology as investigation backbone
25:00 - Limitations and randomness of LLMs
30:30 - Advice for testing AI in SOCs</p>
<p>
Links
Connect with our guest Ahmed on LinkedIn: <a href='https://www.linkedin.com/in/ahmed-achchak-872554109/'>https://www.linkedin.com/in/ahmed-achchak-872554109/</a></p>
<p> </p>
<p>Check out Qevlar’s website: <a href='https://www.qevlar.com/'>https://www.qevlar.com/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if your security team never missed a single alert and actually had time to think strategically?</p>
<p>In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the inside story of building a system that can act on threats faster than any human alone. Learn how Qevlar’s innovative approach is giving organizations clarity, control, and measurable ROI while freeing security teams to focus on what truly matters.</p>
<p>Impactful Moments<br>
00:00 - Introduction<br>
01:30 - Founding Qevlar AI by chance<br>
03:30 - Inefficiency of current SOCs<br>
05:00 - Augmenting analysts, not replacing them<br>
08:00 - AI investigating alerts at scale<br>
11:30 - How autonomous agents handle phishing<br>
14:30 - Why tackling all alerts maximizes ROI<br>
17:30 - Graph technology as investigation backbone<br>
25:00 - Limitations and randomness of LLMs<br>
30:30 - Advice for testing AI in SOCs</p>
<p><br>
Links<br>
Connect with our guest Ahmed on LinkedIn: <a href='https://www.linkedin.com/in/ahmed-achchak-872554109/'>https://www.linkedin.com/in/ahmed-achchak-872554109/</a></p>
<p> </p>
<p>Check out Qevlar’s website: <a href='https://www.qevlar.com/'>https://www.qevlar.com/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cmuefzcxspx3ijf6/HVS25_EP401_Qevlar_Final.mp3" length="31491645" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if your security team never missed a single alert and actually had time to think strategically?
In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the inside story of building a system that can act on threats faster than any human alone. Learn how Qevlar’s innovative approach is giving organizations clarity, control, and measurable ROI while freeing security teams to focus on what truly matters.
Impactful Moments00:00 - Introduction01:30 - Founding Qevlar AI by chance03:30 - Inefficiency of current SOCs05:00 - Augmenting analysts, not replacing them08:00 - AI investigating alerts at scale11:30 - How autonomous agents handle phishing14:30 - Why tackling all alerts maximizes ROI17:30 - Graph technology as investigation backbone25:00 - Limitations and randomness of LLMs30:30 - Advice for testing AI in SOCs
LinksConnect with our guest Ahmed on LinkedIn: https://www.linkedin.com/in/ahmed-achchak-872554109/
 
Check out Qevlar’s website: https://www.qevlar.com/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1968</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>401</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Making Cybersecurity Marketing Creative (and a Little Sexy) with Maria Velasquez</title>
        <itunes:title>Making Cybersecurity Marketing Creative (and a Little Sexy) with Maria Velasquez</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/making-cybersecurity-creative-and-a-little-sexy-with-maria-velasquez/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/making-cybersecurity-creative-and-a-little-sexy-with-maria-velasquez/#comments</comments>        <pubDate>Thu, 06 Nov 2025 08:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/72c5dd54-f56c-3248-9bb5-f807a6ffc2cc</guid>
                                    <description><![CDATA[<p>Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy.

In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in Cybersecurity Marketing. Together, they discuss how bold storytelling, authentic community, and a touch of fun are reshaping the way we connect in cybersecurity. Maria opens up about turning burnout into purpose, building a 4,000-strong global movement, and why the next frontier in cyber might just be entertainment.</p>
 
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>02:00 - CISA layoffs and collaboration fragility</p>
<p>04:00 - Welcoming Maria Velasquez</p>
<p>06:00 - How loneliness sparked a global community</p>
<p>08:00 - Why collaboration fuels cybersecurity growth</p>
<p>10:00 - When cybersecurity marketing was “boring”
12:00 - The rise of creativity and brand power</p>
<p>14:00 - Story behind Torque’s “Kill the S.O.A.R” campaign</p>
<p>15:00 - Making cybersecurity emotional and human</p>
<p>17:00 - Maria’s advice for bold marketing leaders</p>
<p>18:00 - The next big thing: experiential marketing</p>
<p>20:00 - Inside Cyber Marketing Con 2025</p>
<p>24:00 - Final reflections on community and creativity</p>
<p>27:00 - Ron’s takeaways: connection drives innovation</p>





<p>Links:</p>
<p>Connect with Maria on LinkedIn: <a href='https://www.linkedin.com/in/maria-vepa/'>https://www.linkedin.com/in/maria-vepa/</a></p>
<p>
Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy.<br>
<br>
In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of <em>Breaking Through in Cybersecurity Marketing</em>. Together, they discuss how bold storytelling, authentic community, and a touch of fun are reshaping the way we connect in cybersecurity. Maria opens up about turning burnout into purpose, building a 4,000-strong global movement, and why the next frontier in cyber might just be entertainment.</p>
 
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>02:00 - CISA layoffs and collaboration fragility</p>
<p>04:00 - Welcoming Maria Velasquez</p>
<p>06:00 - How loneliness sparked a global community</p>
<p>08:00 - Why collaboration fuels cybersecurity growth</p>
<p>10:00 - When cybersecurity marketing was “boring”<br>
12:00 - The rise of creativity and brand power</p>
<p>14:00 - Story behind Torque’s “Kill the S.O.A.R” campaign</p>
<p>15:00 - Making cybersecurity emotional and human</p>
<p>17:00 - Maria’s advice for bold marketing leaders</p>
<p>18:00 - The next big thing: experiential marketing</p>
<p>20:00 - Inside Cyber Marketing Con 2025</p>
<p>24:00 - Final reflections on community and creativity</p>
<p>27:00 - Ron’s takeaways: connection drives innovation</p>
<br>
<br>
<br>
<br>

<p>Links:</p>
<p>Connect with Maria on LinkedIn: <a href='https://www.linkedin.com/in/maria-vepa/'>https://www.linkedin.com/in/maria-vepa/</a></p>
<p><br>
Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/a94i35w4rck7bcrt/HVS25_EP400_Maria_Velasquezascvj.mp3" length="28868555" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Who said cybersecurity had to be serious? The future of cyber is creative, human, and even a little sexy.In this special 400th episode, Ron Eddings celebrates six incredible years of Hacker Valley Studio with one of cyber’s most creative voices, Maria Velasquez, Co-Founder of the Cybersecurity Marketing Society and Co-Host of Breaking Through in Cybersecurity Marketing. Together, they discuss how bold storytelling, authentic community, and a touch of fun are reshaping the way we connect in cybersecurity. Maria opens up about turning burnout into purpose, building a 4,000-strong global movement, and why the next frontier in cyber might just be entertainment.
 
Impactful Moments:
00:00 - Introduction
02:00 - CISA layoffs and collaboration fragility
04:00 - Welcoming Maria Velasquez
06:00 - How loneliness sparked a global community
08:00 - Why collaboration fuels cybersecurity growth
10:00 - When cybersecurity marketing was “boring”12:00 - The rise of creativity and brand power
14:00 - Story behind Torque’s “Kill the S.O.A.R” campaign
15:00 - Making cybersecurity emotional and human
17:00 - Maria’s advice for bold marketing leaders
18:00 - The next big thing: experiential marketing
20:00 - Inside Cyber Marketing Con 2025
24:00 - Final reflections on community and creativity
27:00 - Ron’s takeaways: connection drives innovation

Links:
Connect with Maria on LinkedIn: https://www.linkedin.com/in/maria-vepa/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1804</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>400</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How to See Your Organization Like a Hacker with Chris Dale</title>
        <itunes:title>How to See Your Organization Like a Hacker with Chris Dale</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-human-side-of-hacking-and-continuous-vigilance-with-chris-dale/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-human-side-of-hacking-and-continuous-vigilance-with-chris-dale/#comments</comments>        <pubDate>Thu, 30 Oct 2025 08:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7efb9360-0ebe-3096-86c6-c906fc84fe26</guid>
                                    <description><![CDATA[<p>To defend like a human, you first have to think like a hacker.</p>
<p>
In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a continuous journey of discovery, and why reconnaissance and storytelling are critical tools for modern defenders. From real-world breach stories to lessons on trust and responsibility, this episode reveals how thinking like a hacker, and acting like a human can transform the way we approach cybersecurity.</p>
<p> </p>
<p>Impactful Moments
00:00 - Introduction and massive breach overview
03:00 - Trusted systems become exposure points
05:00 - Meet Chris Dale of River Security
07:00 - The problem with traditional pen testing
08:30 - Continuous reconnaissance and real-world risk
10:00 - Knowing yourself as a security principle
13:00 - The meaning of continuous vigilance
15:00 - Turning cybersecurity lessons into stories
18:00 - Storytelling and mindset in defense
19:30 - Final takeaways on fundamentals and vigilance</p>
<p> </p>
<p>Links:
Connect with our Chris on LinkedIn: <a href='https://www.linkedin.com/in/chrisad/'>https://www.linkedin.com/in/chrisad/</a></p>
<p>
Read the Tech Radar article here: <a href='https://www.techradar.com/pro/security/f5-breach-fallout-over-266-000-instances-exposed-to-remote-attacks'>https://www.techradar.com/pro/security/f5-breach-fallout-over-266-000-instances-exposed-to-remote-attacks</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>To defend like a human, you first have to think like a hacker.</p>
<p><br>
In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a continuous journey of discovery, and why reconnaissance and storytelling are critical tools for modern defenders. From real-world breach stories to lessons on trust and responsibility, this episode reveals how thinking like a hacker, and acting like a human can transform the way we approach cybersecurity.</p>
<p> </p>
<p>Impactful Moments<br>
00:00 - Introduction and massive breach overview<br>
03:00 - Trusted systems become exposure points<br>
05:00 - Meet Chris Dale of River Security<br>
07:00 - The problem with traditional pen testing<br>
08:30 - Continuous reconnaissance and real-world risk<br>
10:00 - Knowing yourself as a security principle<br>
13:00 - The meaning of continuous vigilance<br>
15:00 - Turning cybersecurity lessons into stories<br>
18:00 - Storytelling and mindset in defense<br>
19:30 - Final takeaways on fundamentals and vigilance</p>
<p> </p>
<p>Links:<br>
Connect with our Chris on LinkedIn: <a href='https://www.linkedin.com/in/chrisad/'>https://www.linkedin.com/in/chrisad/</a></p>
<p><br>
Read the Tech Radar article here: <a href='https://www.techradar.com/pro/security/f5-breach-fallout-over-266-000-instances-exposed-to-remote-attacks'>https://www.techradar.com/pro/security/f5-breach-fallout-over-266-000-instances-exposed-to-remote-attacks</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fnruwwifc7jcfnsd/HVS25_EP399_Chris_Dale6to7n.mp3" length="24288959" type="audio/mpeg"/>
        <itunes:summary><![CDATA[To defend like a human, you first have to think like a hacker.
In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a continuous journey of discovery, and why reconnaissance and storytelling are critical tools for modern defenders. From real-world breach stories to lessons on trust and responsibility, this episode reveals how thinking like a hacker, and acting like a human can transform the way we approach cybersecurity.
 
Impactful Moments00:00 - Introduction and massive breach overview03:00 - Trusted systems become exposure points05:00 - Meet Chris Dale of River Security07:00 - The problem with traditional pen testing08:30 - Continuous reconnaissance and real-world risk10:00 - Knowing yourself as a security principle13:00 - The meaning of continuous vigilance15:00 - Turning cybersecurity lessons into stories18:00 - Storytelling and mindset in defense19:30 - Final takeaways on fundamentals and vigilance
 
Links:Connect with our Chris on LinkedIn: https://www.linkedin.com/in/chrisad/
Read the Tech Radar article here: https://www.techradar.com/pro/security/f5-breach-fallout-over-266-000-instances-exposed-to-remote-attacks
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1518</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>399</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Coding by Vibe: The Future of AI-Built Security with Ron Eddings</title>
        <itunes:title>Coding by Vibe: The Future of AI-Built Security with Ron Eddings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/coding-by-vibe-the-future-of-ai-built-security-with-ron-eddings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/coding-by-vibe-the-future-of-ai-built-security-with-ron-eddings/#comments</comments>        <pubDate>Fri, 24 Oct 2025 11:46:55 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/cc0e917b-5fff-32d9-854c-db591f19895a</guid>
                                    <description><![CDATA[<p>When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas?</p>
<p>
In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma MCP vulnerability to discuss how creativity and security now collide in surprising ways. With hands-on insights using Raycast and practical steps for building responsibly, Ron takes you inside a new era where human intuition and machine intelligence truly build together.</p>
<p> </p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Introduction
01:00 - The Figma vulnerability explained
03:00 - Why MCP security matters
05:00 - What vibe coding really means
07:00 - Writing with intention and context
08:00 - The power of structured prompting
10:00 - How MCP connects everything
12:00 - Why adoption is skyrocketing
15:00 - Setting up an MCP server
17:00 - Agents, actions, and security trust
19:00 - The real takeaway: curiosity with caution
30:00 - Predictions on OpenAI’s upcoming browser
33:00 - The profit battle between OpenAI and Microsoft
35:00 - Windsurf’s rollercoaster of acquisitions</p>
<p> </p>
<p>
Links:
Connect with our Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>
Check out the Hacker News article here: 
<a href='https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html?m=1'>https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html?m=1</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas?</p>
<p><br>
In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma MCP vulnerability to discuss how creativity and security now collide in surprising ways. With hands-on insights using Raycast and practical steps for building responsibly, Ron takes you inside a new era where human intuition and machine intelligence truly build together.</p>
<p> </p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Introduction<br>
01:00 - The Figma vulnerability explained<br>
03:00 - Why MCP security matters<br>
05:00 - What vibe coding really means<br>
07:00 - Writing with intention and context<br>
08:00 - The power of structured prompting<br>
10:00 - How MCP connects everything<br>
12:00 - Why adoption is skyrocketing<br>
15:00 - Setting up an MCP server<br>
17:00 - Agents, actions, and security trust<br>
19:00 - The real takeaway: curiosity with caution<br>
30:00 - Predictions on OpenAI’s upcoming browser<br>
33:00 - The profit battle between OpenAI and Microsoft<br>
35:00 - Windsurf’s rollercoaster of acquisitions</p>
<p> </p>
<p><br>
Links:<br>
Connect with our Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p><br>
Check out the Hacker News article here: <br>
<a href='https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html?m=1'>https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html?m=1</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/uerhdhz7vvrpiqt8/HVS25_EP398_Ron_Solo_October9yf2y.mp3" length="19557236" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When code meets intuition, innovation gets personal. But what happens when we let AI vibe with our ideas?
In this episode, Ron Eddings covers the rise of AI-driven development from Vibe Coding, where natural language shapes real code, to the emerging Model Context Protocols (MCPs) that redefine how apps talk to AI. He breaks down the recent Figma MCP vulnerability to discuss how creativity and security now collide in surprising ways. With hands-on insights using Raycast and practical steps for building responsibly, Ron takes you inside a new era where human intuition and machine intelligence truly build together.
 
 
Impactful Moments
00:00 - Introduction01:00 - The Figma vulnerability explained03:00 - Why MCP security matters05:00 - What vibe coding really means07:00 - Writing with intention and context08:00 - The power of structured prompting10:00 - How MCP connects everything12:00 - Why adoption is skyrocketing15:00 - Setting up an MCP server17:00 - Agents, actions, and security trust19:00 - The real takeaway: curiosity with caution30:00 - Predictions on OpenAI’s upcoming browser33:00 - The profit battle between OpenAI and Microsoft35:00 - Windsurf’s rollercoaster of acquisitions
 
Links:Connect with our Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out the Hacker News article here: https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html?m=1
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1222</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>398</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Learning How to Learn: Mastering the Cyber Fundamentals with Rich Greene</title>
        <itunes:title>Learning How to Learn: Mastering the Cyber Fundamentals with Rich Greene</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/learning-how-to-learn-mastering-the-cyber-fundamentals-with-rich-greene/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/learning-how-to-learn-mastering-the-cyber-fundamentals-with-rich-greene/#comments</comments>        <pubDate>Thu, 16 Oct 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/65ea84e9-d052-3738-b904-92b037df0288</guid>
                                    <description><![CDATA[<p>The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning.</p>
<p>
In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable story of surviving a battlefield injury, retraining his brain, and how that journey shaped his approach to mastering cybersecurity. Together, they connect real-world lessons like the recent Discord breach to the core truth that even advanced systems depend on people who master the basics.</p>
<p>Impactful Moments
00:00 - Introduction
02:00 - Discord breach and third-party risk
05:00 - Meet Rich Greene from SANS
06:00 - The power of mastering fundamentals
07:00 - Learning how to learn
08:30 - Rich’s story of rebuilding his memory
11:00 - Forcing the brain to grow stronger
12:00 - Top skills that get you paid
14:00 - Skills that lead to fulfillment
16:00 - Fundamentals that fuel long-term success
17:00 - The OSI model decoded
20:00 - Why operating systems matter
21:00 - Security operations fundamentals
23:00 - Why cloud is the #1 must-learn skill
25:00 - Final advice: sharpen your fundamentals</p>
<p> </p>
<p>
Links
Connect with our Rich on LinkedIn: <a href='https://www.linkedin.com/in/secgreene/'>https://www.linkedin.com/in/secgreene/</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning.</p>
<p><br>
In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable story of surviving a battlefield injury, retraining his brain, and how that journey shaped his approach to mastering cybersecurity. Together, they connect real-world lessons like the recent Discord breach to the core truth that even advanced systems depend on people who master the basics.</p>
<p>Impactful Moments<br>
00:00 - Introduction<br>
02:00 - Discord breach and third-party risk<br>
05:00 - Meet Rich Greene from SANS<br>
06:00 - The power of mastering fundamentals<br>
07:00 - Learning how to learn<br>
08:30 - Rich’s story of rebuilding his memory<br>
11:00 - Forcing the brain to grow stronger<br>
12:00 - Top skills that get you paid<br>
14:00 - Skills that lead to fulfillment<br>
16:00 - Fundamentals that fuel long-term success<br>
17:00 - The OSI model decoded<br>
20:00 - Why operating systems matter<br>
21:00 - Security operations fundamentals<br>
23:00 - Why cloud is the #1 must-learn skill<br>
25:00 - Final advice: sharpen your fundamentals</p>
<p> </p>
<p><br>
Links<br>
Connect with our Rich on LinkedIn: <a href='https://www.linkedin.com/in/secgreene/'>https://www.linkedin.com/in/secgreene/</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/23ce9ay2f49u8au6/HVS25_EP397_Rich_Greeneb8tq9.mp3" length="24611624" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning.
In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable story of surviving a battlefield injury, retraining his brain, and how that journey shaped his approach to mastering cybersecurity. Together, they connect real-world lessons like the recent Discord breach to the core truth that even advanced systems depend on people who master the basics.
Impactful Moments00:00 - Introduction02:00 - Discord breach and third-party risk05:00 - Meet Rich Greene from SANS06:00 - The power of mastering fundamentals07:00 - Learning how to learn08:30 - Rich’s story of rebuilding his memory11:00 - Forcing the brain to grow stronger12:00 - Top skills that get you paid14:00 - Skills that lead to fulfillment16:00 - Fundamentals that fuel long-term success17:00 - The OSI model decoded20:00 - Why operating systems matter21:00 - Security operations fundamentals23:00 - Why cloud is the #1 must-learn skill25:00 - Final advice: sharpen your fundamentals
 
LinksConnect with our Rich on LinkedIn: https://www.linkedin.com/in/secgreene/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1538</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>397</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How AI Elevates Cyber Hygiene with Jason Rebholz</title>
        <itunes:title>How AI Elevates Cyber Hygiene with Jason Rebholz</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-ai-elevates-cyber-hygiene-with-jason-rebholz/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-ai-elevates-cyber-hygiene-with-jason-rebholz/#comments</comments>        <pubDate>Fri, 10 Oct 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/0431ed92-1ae7-3ad6-a921-25ca0c1f1ad3</guid>
                                    <description><![CDATA[<p>What if protecting your digital twin becomes the new cyber hygiene?</p>
<p>
In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smarter use of AI can make all the difference. Together, they uncover how our growing digital footprints are giving rise to digital twins, AI replicas that can mirror our behaviors, voices, and even decisions, and what that means for the future of trust, identity, and security.</p>
<p>
Impactful Moments:
00:00 - Introduction
01:00 - The Neon app data leak story
03:00 - Why our voices are the new passwords
05:00 - How AI can strengthen cyber hygiene
07:00 - Jason’s mission to secure AI systems
09:00 - AI as a force multiplier for defenders
11:00 - Deepfakes and the new social engineering playbook
13:00 - Attackers’ use of AI and what it means for us
15:00 - The rise of digital twins and identity threats
19:00 - How to defend against “yourself” online
20:00 - Final reflection: Trust in the AI age</p>
<p> </p>
<p>Links:
Connect with Jason on LinkedIn: <a href='https://www.linkedin.com/in/jrebholz/'>https://www.linkedin.com/in/jrebholz/</a></p>
<p>
Check out the TechCrunch article on the Neon app data leak story: <a href='https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/'>https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if protecting your digital twin becomes the new cyber hygiene?</p>
<p><br>
In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smarter use of AI can make all the difference. Together, they uncover how our growing digital footprints are giving rise to digital twins, AI replicas that can mirror our behaviors, voices, and even decisions, and what that means for the future of trust, identity, and security.</p>
<p><br>
Impactful Moments:<br>
00:00 - Introduction<br>
01:00 - The Neon app data leak story<br>
03:00 - Why our voices are the new passwords<br>
05:00 - How AI can strengthen cyber hygiene<br>
07:00 - Jason’s mission to secure AI systems<br>
09:00 - AI as a force multiplier for defenders<br>
11:00 - Deepfakes and the new social engineering playbook<br>
13:00 - Attackers’ use of AI and what it means for us<br>
15:00 - The rise of digital twins and identity threats<br>
19:00 - How to defend against “yourself” online<br>
20:00 - Final reflection: Trust in the AI age</p>
<p> </p>
<p>Links:<br>
Connect with Jason on LinkedIn: <a href='https://www.linkedin.com/in/jrebholz/'>https://www.linkedin.com/in/jrebholz/</a></p>
<p><br>
Check out the TechCrunch article on the Neon app data leak story: <a href='https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/'>https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nzfq9bbvjg3in5dz/HVS25_EP396_Jason_Rebholz_Full_Audio_Final_017gox6.mp3" length="31213912" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if protecting your digital twin becomes the new cyber hygiene?
In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smarter use of AI can make all the difference. Together, they uncover how our growing digital footprints are giving rise to digital twins, AI replicas that can mirror our behaviors, voices, and even decisions, and what that means for the future of trust, identity, and security.
Impactful Moments:00:00 - Introduction01:00 - The Neon app data leak story03:00 - Why our voices are the new passwords05:00 - How AI can strengthen cyber hygiene07:00 - Jason’s mission to secure AI systems09:00 - AI as a force multiplier for defenders11:00 - Deepfakes and the new social engineering playbook13:00 - Attackers’ use of AI and what it means for us15:00 - The rise of digital twins and identity threats19:00 - How to defend against “yourself” online20:00 - Final reflection: Trust in the AI age
 
Links:Connect with Jason on LinkedIn: https://www.linkedin.com/in/jrebholz/
Check out the TechCrunch article on the Neon app data leak story: https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1292</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>396</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Securing Software at AI Speed with Varun Badhwar</title>
        <itunes:title>Securing Software at AI Speed with Varun Badhwar</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/securing-software-at-ai-speed-with-varun-badhir/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/securing-software-at-ai-speed-with-varun-badhir/#comments</comments>        <pubDate>Thu, 02 Oct 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/160e7246-2e0c-38e0-b66d-472c29547a7b</guid>
                                    <description><![CDATA[<p>The biggest security threat isn’t in the cloud, it’s hidden in the code you trust the most.</p>
<p>
In this episode, Ron sits down with Varun Badhwar, Co-Founder &amp; CEO of Endor Labs, who shares why research shows that nearly 80–90% of application code comes from open source and third-party libraries, not your own developers. Varun discusses the unseen risks of AI-generated software, how attackers can now weaponize vulnerabilities in hours, and why precision in security matters more than ever. He also reveals how AI can be both the ultimate accelerator and the ultimate weakness in modern development.</p>
<p> </p>
<p>Impactful Moments:
00:00 - Introduction
02:00 - Varun’s journey from RedLock to Endor Labs
04:00 - Why the software supply chain is broken
07:00 - AI coding assistants and insecure code risks
10:00 - The NPM self-replicating worm discovery
13:00 - Simple controls to enforce Zero Trust in code
16:00 - Pairing AI with security to prevent slop
19:00 - AI-powered security code reviews explained
22:00 - Why 88% of code goes unused
26:00 - Developer efficiency as the new security metric
29:00 - The next wave of AI-driven software threats</p>
<p> </p>
<p>
Links:
Connect with our Endor on LinkedIn: <a href='https://www.linkedin.com/in/vbadhwar/'>https://www.linkedin.com/in/vbadhwar/</a></p>
<p> </p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The biggest security threat isn’t in the cloud, it’s hidden in the code you trust the most.</p>
<p><br>
In this episode, Ron sits down with Varun Badhwar, Co-Founder &amp; CEO of Endor Labs, who shares why research shows that nearly 80–90% of application code comes from open source and third-party libraries, not your own developers. Varun discusses the unseen risks of AI-generated software, how attackers can now weaponize vulnerabilities in hours, and why precision in security matters more than ever. He also reveals how AI can be both the ultimate accelerator and the ultimate weakness in modern development.</p>
<p> </p>
<p>Impactful Moments:<br>
00:00 - Introduction<br>
02:00 - Varun’s journey from RedLock to Endor Labs<br>
04:00 - Why the software supply chain is broken<br>
07:00 - AI coding assistants and insecure code risks<br>
10:00 - The NPM self-replicating worm discovery<br>
13:00 - Simple controls to enforce Zero Trust in code<br>
16:00 - Pairing AI with security to prevent slop<br>
19:00 - AI-powered security code reviews explained<br>
22:00 - Why 88% of code goes unused<br>
26:00 - Developer efficiency as the new security metric<br>
29:00 - The next wave of AI-driven software threats</p>
<p> </p>
<p><br>
Links:<br>
Connect with our Endor on LinkedIn: <a href='https://www.linkedin.com/in/vbadhwar/'>https://www.linkedin.com/in/vbadhwar/</a></p>
<p> </p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mfcibhmektzk4di5/HVS25_EP395_Endor_Varun_Final_02_Audio9vks5.mp3" length="49678190" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The biggest security threat isn’t in the cloud, it’s hidden in the code you trust the most.
In this episode, Ron sits down with Varun Badhwar, Co-Founder &amp; CEO of Endor Labs, who shares why research shows that nearly 80–90% of application code comes from open source and third-party libraries, not your own developers. Varun discusses the unseen risks of AI-generated software, how attackers can now weaponize vulnerabilities in hours, and why precision in security matters more than ever. He also reveals how AI can be both the ultimate accelerator and the ultimate weakness in modern development.
 
Impactful Moments:00:00 - Introduction02:00 - Varun’s journey from RedLock to Endor Labs04:00 - Why the software supply chain is broken07:00 - AI coding assistants and insecure code risks10:00 - The NPM self-replicating worm discovery13:00 - Simple controls to enforce Zero Trust in code16:00 - Pairing AI with security to prevent slop19:00 - AI-powered security code reviews explained22:00 - Why 88% of code goes unused26:00 - Developer efficiency as the new security metric29:00 - The next wave of AI-driven software threats
 
Links:Connect with our Endor on LinkedIn: https://www.linkedin.com/in/vbadhwar/
 
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2052</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>395</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The End of Search and the Rise of AI Browsers and Voices with Ron Eddings</title>
        <itunes:title>The End of Search and the Rise of AI Browsers and Voices with Ron Eddings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-end-of-search-and-the-rise-of-ai-browsers-and-voices-with-ron-eddings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-end-of-search-and-the-rise-of-ai-browsers-and-voices-with-ron-eddings/#comments</comments>        <pubDate>Thu, 25 Sep 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7675f990-b9ac-333b-9565-116e0c88b2f2</guid>
                                    <description><![CDATA[<p>Search engines aren’t dying quietly, they’re being replaced in real time by AI browsers and voice agents.</p>
<p>
AI isn’t just answering questions anymore; it’s acting for us. In this episode, Ron Eddings explores how tools like NanoBrowser and Comet are reshaping browsing, why Google may be in trouble, and how AI voices are becoming the new interface for productivity. From breakthroughs to risks, this is a front-row look at how AI agents are changing how we work, connect, and live online.</p>
<p> </p>
<p>Impactful Moments:
00:00 - Introduction
01:00 - AI agents as everyday tools
02:00 - Testing AI-powered browsers
03:00 - Comet: AI browser from Perplexity
04:30 - Why Google should be worried
05:30 - Real-world tasks for AI browsers
07:00 - Automating cybersecurity inventory
09:00 - Comet in action on LinkedIn
10:00 - Testing for malicious exploits
11:00 - Risks of persuasive AI prompts
12:00 - The rise of voice agents
13:30 - First real-world AI voice experience
15:00 - Security concerns with customer data
16:30 - Double-edged sword of AI adoption
17:30 - System prompt leakage vulnerabilities
18:00 - Why voice could shrink attack surfaces</p>
<p>
Links:
Connect with Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p> </p>
<p>Check out NanoBrowser: <a href='https://nanobrowser.ai/'>https://nanobrowser.ai/</a></p>
<p>
Check out Comet by Perplexity: <a href='https://www.perplexity.ai/comet'>https://www.perplexity.ai/comet</a></p>
<p>
Read the article ‘No more links, no more scrolling - the browser is becoming an AI Agent.’ here: <a href='https://venturebeat.com/ai/no-more-links-no-more-scrolling-the-browser-is-becoming-an-ai-agent'>https://venturebeat.com/ai/no-more-links-no-more-scrolling-the-browser-is-becoming-an-ai-agent</a></p>
<p>
Read the article ‘How Voice AI Prompt Injection Threatens Enterprise Security’ here: <a href='https://www.teneo.ai/blog/how-voice-ai-prompt-injection-threatens-enterprise-security'>https://www.teneo.ai/blog/how-voice-ai-prompt-injection-threatens-enterprise-security</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Search engines aren’t dying quietly, they’re being replaced in real time by AI browsers and voice agents.</p>
<p><br>
AI isn’t just answering questions anymore; it’s acting for us. In this episode, Ron Eddings explores how tools like NanoBrowser and Comet are reshaping browsing, why Google may be in trouble, and how AI voices are becoming the new interface for productivity. From breakthroughs to risks, this is a front-row look at how AI agents are changing how we work, connect, and live online.</p>
<p> </p>
<p>Impactful Moments:<br>
00:00 - Introduction<br>
01:00 - AI agents as everyday tools<br>
02:00 - Testing AI-powered browsers<br>
03:00 - Comet: AI browser from Perplexity<br>
04:30 - Why Google should be worried<br>
05:30 - Real-world tasks for AI browsers<br>
07:00 - Automating cybersecurity inventory<br>
09:00 - Comet in action on LinkedIn<br>
10:00 - Testing for malicious exploits<br>
11:00 - Risks of persuasive AI prompts<br>
12:00 - The rise of voice agents<br>
13:30 - First real-world AI voice experience<br>
15:00 - Security concerns with customer data<br>
16:30 - Double-edged sword of AI adoption<br>
17:30 - System prompt leakage vulnerabilities<br>
18:00 - Why voice could shrink attack surfaces</p>
<p><br>
Links:<br>
Connect with Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p> </p>
<p>Check out NanoBrowser: <a href='https://nanobrowser.ai/'>https://nanobrowser.ai/</a></p>
<p><br>
Check out Comet by Perplexity: <a href='https://www.perplexity.ai/comet'>https://www.perplexity.ai/comet</a></p>
<p><br>
Read the article ‘No more links, no more scrolling - the browser is becoming an AI Agent.’ here: <a href='https://venturebeat.com/ai/no-more-links-no-more-scrolling-the-browser-is-becoming-an-ai-agent'>https://venturebeat.com/ai/no-more-links-no-more-scrolling-the-browser-is-becoming-an-ai-agent</a></p>
<p><br>
Read the article ‘How Voice AI Prompt Injection Threatens Enterprise Security’ here: <a href='https://www.teneo.ai/blog/how-voice-ai-prompt-injection-threatens-enterprise-security'>https://www.teneo.ai/blog/how-voice-ai-prompt-injection-threatens-enterprise-security</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vrgcn98j4u5q5djh/HVS25_EP394_Final_0194vsf.mp3" length="17543931" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Search engines aren’t dying quietly, they’re being replaced in real time by AI browsers and voice agents.
AI isn’t just answering questions anymore; it’s acting for us. In this episode, Ron Eddings explores how tools like NanoBrowser and Comet are reshaping browsing, why Google may be in trouble, and how AI voices are becoming the new interface for productivity. From breakthroughs to risks, this is a front-row look at how AI agents are changing how we work, connect, and live online.
 
Impactful Moments:00:00 - Introduction01:00 - AI agents as everyday tools02:00 - Testing AI-powered browsers03:00 - Comet: AI browser from Perplexity04:30 - Why Google should be worried05:30 - Real-world tasks for AI browsers07:00 - Automating cybersecurity inventory09:00 - Comet in action on LinkedIn10:00 - Testing for malicious exploits11:00 - Risks of persuasive AI prompts12:00 - The rise of voice agents13:30 - First real-world AI voice experience15:00 - Security concerns with customer data16:30 - Double-edged sword of AI adoption17:30 - System prompt leakage vulnerabilities18:00 - Why voice could shrink attack surfaces
Links:Connect with Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
 
Check out NanoBrowser: https://nanobrowser.ai/
Check out Comet by Perplexity: https://www.perplexity.ai/comet
Read the article ‘No more links, no more scrolling - the browser is becoming an AI Agent.’ here: https://venturebeat.com/ai/no-more-links-no-more-scrolling-the-browser-is-becoming-an-ai-agent
Read the article ‘How Voice AI Prompt Injection Threatens Enterprise Security’ here: https://www.teneo.ai/blog/how-voice-ai-prompt-injection-threatens-enterprise-security
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1096</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>394</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Where Automation Ends, Cyber Ingenuity Begins with Phillip Wylie</title>
        <itunes:title>Where Automation Ends, Cyber Ingenuity Begins with Phillip Wylie</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/where-automation-ends-cyber-ingenuity-begins-with-phillip-wylie/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/where-automation-ends-cyber-ingenuity-begins-with-phillip-wylie/#comments</comments>        <pubDate>Thu, 18 Sep 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/933c5189-b9eb-3b70-8bbe-1fae2c577694</guid>
                                    <description><![CDATA[<p>Some tools replace tasks. Others reshape the way we think about security.</p>
<p>
In this episode, Ron welcomes back Phillip Wylie, one of the most respected voices in offensive security, author, educator, and longtime friend of the Hacker Valley community. With over 27 years of experience across cybersecurity disciplines, Phillip has guided thousands of professionals through his books, talks, and mentorship.</p>
<p>
He shares how AI is reshaping pen testing and red teaming, the value of automating away repetitive tasks, and why the fundamentals of security will always matter. From defining red teaming in 2025 to guiding newcomers on how to break in, Phillip delivers insights that balance cutting-edge innovation with timeless wisdom.</p>
<p>
Impactful Moments:
00:00 - Introduction
01:00 - Why Phillip keeps podcasting
03:00 - AI opportunities in pen testing
04:30 - What automation should replace
06:00 - Red teaming vs pen testing in 2025
08:00 - Defining adversary emulation
10:40 - Building the ideal AI assistant
15:00 - The best AI use cases today
18:30 - AI-driven threat modeling
21:00 - Breaking into pen testing now
25:00 - Building a portfolio and personal brand
27:30 - Why in-person networking still matters</p>
<p> </p>
<p>Links:
Connect with Phillip on LinkedIn: <a href='https://www.linkedin.com/in/phillipwylie/'>https://www.linkedin.com/in/phillipwylie/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Some tools replace tasks. Others reshape the way we think about security.</p>
<p><br>
In this episode, Ron welcomes back Phillip Wylie, one of the most respected voices in offensive security, author, educator, and longtime friend of the Hacker Valley community. With over 27 years of experience across cybersecurity disciplines, Phillip has guided thousands of professionals through his books, talks, and mentorship.</p>
<p><br>
He shares how AI is reshaping pen testing and red teaming, the value of automating away repetitive tasks, and why the fundamentals of security will always matter. From defining red teaming in 2025 to guiding newcomers on how to break in, Phillip delivers insights that balance cutting-edge innovation with timeless wisdom.</p>
<p><br>
Impactful Moments:<br>
00:00 - Introduction<br>
01:00 - Why Phillip keeps podcasting<br>
03:00 - AI opportunities in pen testing<br>
04:30 - What automation should replace<br>
06:00 - Red teaming vs pen testing in 2025<br>
08:00 - Defining adversary emulation<br>
10:40 - Building the ideal AI assistant<br>
15:00 - The best AI use cases today<br>
18:30 - AI-driven threat modeling<br>
21:00 - Breaking into pen testing now<br>
25:00 - Building a portfolio and personal brand<br>
27:30 - Why in-person networking still matters</p>
<p> </p>
<p>Links:<br>
Connect with Phillip on LinkedIn: <a href='https://www.linkedin.com/in/phillipwylie/'>https://www.linkedin.com/in/phillipwylie/</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/65zxp6z4ckab3rrw/HVS25_EP393_Phillip_Wylie_Full_Audio_Final_017fpy1.mp3" length="49264388" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Some tools replace tasks. Others reshape the way we think about security.
In this episode, Ron welcomes back Phillip Wylie, one of the most respected voices in offensive security, author, educator, and longtime friend of the Hacker Valley community. With over 27 years of experience across cybersecurity disciplines, Phillip has guided thousands of professionals through his books, talks, and mentorship.
He shares how AI is reshaping pen testing and red teaming, the value of automating away repetitive tasks, and why the fundamentals of security will always matter. From defining red teaming in 2025 to guiding newcomers on how to break in, Phillip delivers insights that balance cutting-edge innovation with timeless wisdom.
Impactful Moments:00:00 - Introduction01:00 - Why Phillip keeps podcasting03:00 - AI opportunities in pen testing04:30 - What automation should replace06:00 - Red teaming vs pen testing in 202508:00 - Defining adversary emulation10:40 - Building the ideal AI assistant15:00 - The best AI use cases today18:30 - AI-driven threat modeling21:00 - Breaking into pen testing now25:00 - Building a portfolio and personal brand27:30 - Why in-person networking still matters
 
Links:Connect with Phillip on LinkedIn: https://www.linkedin.com/in/phillipwylie/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2039</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>393</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Power of Showing Up: Daily Streams, Big Impact with Gerald Auger</title>
        <itunes:title>The Power of Showing Up: Daily Streams, Big Impact with Gerald Auger</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-power-of-showing-up-daily-streams-big-impact-with-gerald-auger/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-power-of-showing-up-daily-streams-big-impact-with-gerald-auger/#comments</comments>        <pubDate>Thu, 11 Sep 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/0cc320d8-4ff6-33dc-88ac-75eb9d13bbf5</guid>
                                    <description><![CDATA[<p>What if showing up with consistency could spark opportunities, create careers, and build a global movement?</p>
<p>
In this episode, Ron sits down with Gerald Auger, Ph.D., cybersecurity educator, content creator, and founder of Simply Cyber. Gerald shares how his daily livestream grew into a thriving community, why consistency is the key to influence, and how AI is reshaping the way cyber professionals work.</p>
<p>
From building SimplyCyberCon to launching a new pentesting venture, Gerry’s journey is a masterclass in community, creativity, and courage. This episode is filled with inspiration and practical takeaways for anyone ready to grow their career, brand, or business in cybersecurity.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if showing up with consistency could spark opportunities, create careers, and build a global movement?</p>
<p><br>
In this episode, Ron sits down with Gerald Auger, Ph.D., cybersecurity educator, content creator, and founder of Simply Cyber. Gerald shares how his daily livestream grew into a thriving community, why consistency is the key to influence, and how AI is reshaping the way cyber professionals work.</p>
<p><br>
From building SimplyCyberCon to launching a new pentesting venture, Gerry’s journey is a masterclass in community, creativity, and courage. This episode is filled with inspiration and practical takeaways for anyone ready to grow their career, brand, or business in cybersecurity.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ycptzd8jysvr3gnm/HVS25_EP392_Gerald_Auger_Full_Audio7sq3s.mp3" length="49363270" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if showing up with consistency could spark opportunities, create careers, and build a global movement?
In this episode, Ron sits down with Gerald Auger, Ph.D., cybersecurity educator, content creator, and founder of Simply Cyber. Gerald shares how his daily livestream grew into a thriving community, why consistency is the key to influence, and how AI is reshaping the way cyber professionals work.
From building SimplyCyberCon to launching a new pentesting venture, Gerry’s journey is a masterclass in community, creativity, and courage. This episode is filled with inspiration and practical takeaways for anyone ready to grow their career, brand, or business in cybersecurity.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2044</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>392</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Rise of the Autonomous Blue Team with Vineet Edupuganti</title>
        <itunes:title>The Rise of the Autonomous Blue Team with Vineet Edupuganti</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-rise-of-the-autonomous-blue-team-with-vineet-edupuganti/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-rise-of-the-autonomous-blue-team-with-vineet-edupuganti/#comments</comments>        <pubDate>Thu, 04 Sep 2025 06:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7734f449-b6ec-3a43-bcd0-3a7042f9c1c4</guid>
                                    <description><![CDATA[<p>What if defenders had their own AI-powered task force, always on, always adapting, and finally one step ahead of attackers?</p>
<p>
In this episode, Ron welcomes Vineet Edupuganti, Founder and CEO of Cogent Security, to discuss how AI agents are rewriting the rules of cybersecurity. Vineet shares why traditional vulnerability management is fundamentally broken, why exposure management matters more than ever, and how Cogent is building an “AI Task Force” to give defenders the edge. From his early days in machine learning to reshaping the future of cyber defense, Vineet breaks down the urgent need for automation, context-driven insights, and explainable AI in security.</p>
<p>
Impactful Moments:
00:00 - Introduction
02:00 - Vineet’s journey into AI and cyber
04:30 - Why vulnerability management is broken
06:10 - Generative AI as a defender’s edge
08:20 - Why AI agents outperform brittle automation
09:45 - The first use cases for Cogent’s agents
12:00 - Rethinking tier-one SOC analyst roles
13:30 - The rise of exposure management (CTEM)
17:10 - Cogent’s vision for an AI task force
18:30 - Early wins and insights with Cogent
20:00 - Biggest misconceptions about AI in security
23:00 - What enterprises should demand from vendors
25:00 - Why explainability is essential in AI systems
27:00 - Startups vs incumbents in cybersecurity innovation
29:30 - Why enterprises must invest in AI now</p>
<p> </p>
<p>
Links:
Connect with our guest, Vineet Edupuganti, on LinkedIn: <a href='https://www.linkedin.com/in/vineetedupuganti'>https://www.linkedin.com/in/vineetedupuganti</a></p>
<p>
Learn more about Cogent Security: <a href='https://www.cogent.security'>https://www.cogent.security </a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if defenders had their own AI-powered task force, always on, always adapting, and finally one step ahead of attackers?</p>
<p><br>
In this episode, Ron welcomes Vineet Edupuganti, Founder and CEO of Cogent Security, to discuss how AI agents are rewriting the rules of cybersecurity. Vineet shares why traditional vulnerability management is fundamentally broken, why exposure management matters more than ever, and how Cogent is building an “AI Task Force” to give defenders the edge. From his early days in machine learning to reshaping the future of cyber defense, Vineet breaks down the urgent need for automation, context-driven insights, and explainable AI in security.</p>
<p><br>
Impactful Moments:<br>
00:00 - Introduction<br>
02:00 - Vineet’s journey into AI and cyber<br>
04:30 - Why vulnerability management is broken<br>
06:10 - Generative AI as a defender’s edge<br>
08:20 - Why AI agents outperform brittle automation<br>
09:45 - The first use cases for Cogent’s agents<br>
12:00 - Rethinking tier-one SOC analyst roles<br>
13:30 - The rise of exposure management (CTEM)<br>
17:10 - Cogent’s vision for an AI task force<br>
18:30 - Early wins and insights with Cogent<br>
20:00 - Biggest misconceptions about AI in security<br>
23:00 - What enterprises should demand from vendors<br>
25:00 - Why explainability is essential in AI systems<br>
27:00 - Startups vs incumbents in cybersecurity innovation<br>
29:30 - Why enterprises must invest in AI now</p>
<p> </p>
<p><br>
Links:<br>
Connect with our guest, Vineet Edupuganti, on LinkedIn: <a href='https://www.linkedin.com/in/vineetedupuganti'>https://www.linkedin.com/in/vineetedupuganti</a></p>
<p><br>
Learn more about Cogent Security: <a href='https://www.cogent.security'>https://www.cogent.security </a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3zewen7za624jpfj/HVS25_EP391_Cogent_Audiobns0t.mp3" length="54143076" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if defenders had their own AI-powered task force, always on, always adapting, and finally one step ahead of attackers?
In this episode, Ron welcomes Vineet Edupuganti, Founder and CEO of Cogent Security, to discuss how AI agents are rewriting the rules of cybersecurity. Vineet shares why traditional vulnerability management is fundamentally broken, why exposure management matters more than ever, and how Cogent is building an “AI Task Force” to give defenders the edge. From his early days in machine learning to reshaping the future of cyber defense, Vineet breaks down the urgent need for automation, context-driven insights, and explainable AI in security.
Impactful Moments:00:00 - Introduction02:00 - Vineet’s journey into AI and cyber04:30 - Why vulnerability management is broken06:10 - Generative AI as a defender’s edge08:20 - Why AI agents outperform brittle automation09:45 - The first use cases for Cogent’s agents12:00 - Rethinking tier-one SOC analyst roles13:30 - The rise of exposure management (CTEM)17:10 - Cogent’s vision for an AI task force18:30 - Early wins and insights with Cogent20:00 - Biggest misconceptions about AI in security23:00 - What enterprises should demand from vendors25:00 - Why explainability is essential in AI systems27:00 - Startups vs incumbents in cybersecurity innovation29:30 - Why enterprises must invest in AI now
 
Links:Connect with our guest, Vineet Edupuganti, on LinkedIn: https://www.linkedin.com/in/vineetedupuganti
Learn more about Cogent Security: https://www.cogent.security 
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2244</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>391</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Turning AI Into Your Super Tool with Ron Eddings</title>
        <itunes:title>Turning AI Into Your Super Tool with Ron Eddings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/turning-ai-into-your-super-tool-with-ron-eddings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/turning-ai-into-your-super-tool-with-ron-eddings/#comments</comments>        <pubDate>Thu, 28 Aug 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3648801e-2d33-3fdf-9fe0-4a1d19507e11</guid>
                                    <description><![CDATA[<p>AI is neither friend nor foe, it’s both. The way we choose to use it determines whether it helps or harms.</p>
<p>
In this solo episode, Ron Eddings shares lessons from his first job at a grocery store, his early days in cybersecurity, and today’s AI-driven landscape. From productivity hacks like meeting transcription, to creative tools like content-aware editing, to the dark side of phishing and deepfakes, Ron shows why human judgment remains the ultimate defense. This is a passionate reminder that the real power isn’t in the tools, it’s in us.</p>
<p>Impactful Moments
00:00 - Introduction
01:15 - AI is the tool, not the toolbox
03:00 - A grocery store scam that taught a life lesson
06:00 - The irreplaceable role of human judgment
07:30 - First cybersecurity job at Booz Allen Hamilton
09:00 - How AI boosts productivity with meeting transcription
12:00 - Creative shortcuts with AI in image and video editing
15:00 - Vibe coding and generative red teaming
17:30 - AI-powered phishing and scam emails
18:50 - Testing a deepfake voice on Ron’s mom
21:30 - Why curiosity and skepticism beat AI deception
22:30 - Final challenge: don’t serve AI—make AI serve you</p>
<p>Links:
Connect with our Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/</p>
<p>Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI is neither friend nor foe, it’s both. The way we choose to use it determines whether it helps or harms.</p>
<p><br>
In this solo episode, Ron Eddings shares lessons from his first job at a grocery store, his early days in cybersecurity, and today’s AI-driven landscape. From productivity hacks like meeting transcription, to creative tools like content-aware editing, to the dark side of phishing and deepfakes, Ron shows why human judgment remains the ultimate defense. This is a passionate reminder that the real power isn’t in the tools, it’s in us.</p>
<p>Impactful Moments<br>
00:00 - Introduction<br>
01:15 - AI is the tool, not the toolbox<br>
03:00 - A grocery store scam that taught a life lesson<br>
06:00 - The irreplaceable role of human judgment<br>
07:30 - First cybersecurity job at Booz Allen Hamilton<br>
09:00 - How AI boosts productivity with meeting transcription<br>
12:00 - Creative shortcuts with AI in image and video editing<br>
15:00 - Vibe coding and generative red teaming<br>
17:30 - AI-powered phishing and scam emails<br>
18:50 - Testing a deepfake voice on Ron’s mom<br>
21:30 - Why curiosity and skepticism beat AI deception<br>
22:30 - Final challenge: don’t serve AI—make AI serve you</p>
<p>Links:<br>
Connect with our Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/</p>
<p>Check out our upcoming events: https://www.hackervalley.com/livestreams<br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
https://www.patreon.com/hackervalleystudio<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3hthjdndh8ukm82u/HVS25_EP390_Ron_Solo_Final9iv2u.mp3" length="21960515" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI is neither friend nor foe, it’s both. The way we choose to use it determines whether it helps or harms.
In this solo episode, Ron Eddings shares lessons from his first job at a grocery store, his early days in cybersecurity, and today’s AI-driven landscape. From productivity hacks like meeting transcription, to creative tools like content-aware editing, to the dark side of phishing and deepfakes, Ron shows why human judgment remains the ultimate defense. This is a passionate reminder that the real power isn’t in the tools, it’s in us.
Impactful Moments00:00 - Introduction01:15 - AI is the tool, not the toolbox03:00 - A grocery store scam that taught a life lesson06:00 - The irreplaceable role of human judgment07:30 - First cybersecurity job at Booz Allen Hamilton09:00 - How AI boosts productivity with meeting transcription12:00 - Creative shortcuts with AI in image and video editing15:00 - Vibe coding and generative red teaming17:30 - AI-powered phishing and scam emails18:50 - Testing a deepfake voice on Ron’s mom21:30 - Why curiosity and skepticism beat AI deception22:30 - Final challenge: don’t serve AI—make AI serve you
Links:Connect with our Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out our upcoming events: https://www.hackervalley.com/livestreamsJoin our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioLove Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discordBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1372</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>390</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Mentorship to Mastery: AI and Community Lessons with Ron Eddings</title>
        <itunes:title>Mentorship to Mastery: AI and Community Lessons with Ron Eddings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/mentorship-to-mastery-ai-and-community-lessons-with-ron-eddings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/mentorship-to-mastery-ai-and-community-lessons-with-ron-eddings/#comments</comments>        <pubDate>Thu, 21 Aug 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9c1c7109-b544-3568-a167-5608cce5ceaa</guid>
                                    <description><![CDATA[<p>AI might analyze your logs in seconds, but only the community can put you in the room that changes your career.</p>
<p>In this solo episode, Ron Eddings discusses the powerful balance between human connection and artificial intelligence in shaping the future of cybersecurity and beyond. From the sacrifices that sparked his career to the mentors who opened doors, Ron shares personal stories that show why community will always be your ultimate competitive edge, even as AI advances into the SOC. He also runs live AI experiments on ransomware response and log analysis, revealing what AI can (and can’t) do for practitioners right now.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
02:00 - Why community is your first advantage
03:30 - The sacrifice that launched Ron’s career
04:40 - Meeting mentor Marcus Carey
06:00 - Early opportunities in cybersecurity
07:00 - The power of hacker spaces
09:00 - How mentors open hidden doors
10:00 - RSA and Black Hat as career accelerators
13:00 - The most underrated LinkedIn feature
15:00 - The HVS mastermind community
16:00 - Reality check on GPT-5
18:00 - AI builds an IR playbook
20:00 - Critical do’s and don’ts in incident response
23:00 - Why hallucinations matter in cybersecurity AI
25:00 - AI makes sense of raw logs
28:00 - Can AI replace tier one analysts?
30:00 - Where AI still falls short
31:00 - Final challenge: Strengthen your community</p>
<p> </p>
<p> </p>
<p>Links:</p>
<p>Connect with our Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>
Register for our livestream with Gerry Auger: <a href='https://www.linkedin.com/events/7359290642633539586/'>https://www.linkedin.com/events/7359290642633539586/</a></p>
<p>
Check out the links to the OpenAI ChatGPT threads here:
Incident Analysis Summary: <a href='https://chatgpt.com/share/689fa61f-3498-8006-9989-ff8221f97b01'>https://chatgpt.com/share/689fa61f-3498-8006-9989-ff8221f97b01</a></p>
<p>
Ransomware Incident Playbook: <a href='https://chatgpt.com/share/689fa63f-86ec-8006-8355-642d4d38808e'>https://chatgpt.com/share/689fa63f-86ec-8006-8355-642d4d38808e</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI might analyze your logs in seconds, but only the community can put you in the room that changes your career.</p>
<p>In this solo episode, Ron Eddings discusses the powerful balance between human connection and artificial intelligence in shaping the future of cybersecurity and beyond. From the sacrifices that sparked his career to the mentors who opened doors, Ron shares personal stories that show why community will always be your ultimate competitive edge, even as AI advances into the SOC. He also runs live AI experiments on ransomware response and log analysis, revealing what AI can (and can’t) do for practitioners right now.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
02:00 - Why community is your first advantage<br>
03:30 - The sacrifice that launched Ron’s career<br>
04:40 - Meeting mentor Marcus Carey<br>
06:00 - Early opportunities in cybersecurity<br>
07:00 - The power of hacker spaces<br>
09:00 - How mentors open hidden doors<br>
10:00 - RSA and Black Hat as career accelerators<br>
13:00 - The most underrated LinkedIn feature<br>
15:00 - The HVS mastermind community<br>
16:00 - Reality check on GPT-5<br>
18:00 - AI builds an IR playbook<br>
20:00 - Critical do’s and don’ts in incident response<br>
23:00 - Why hallucinations matter in cybersecurity AI<br>
25:00 - AI makes sense of raw logs<br>
28:00 - Can AI replace tier one analysts?<br>
30:00 - Where AI still falls short<br>
31:00 - Final challenge: Strengthen your community</p>
<p> </p>
<p> </p>
<p>Links:</p>
<p>Connect with our Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p><br>
Register for our livestream with Gerry Auger: <a href='https://www.linkedin.com/events/7359290642633539586/'>https://www.linkedin.com/events/7359290642633539586/</a></p>
<p><br>
Check out the links to the OpenAI ChatGPT threads here:<br>
Incident Analysis Summary: <a href='https://chatgpt.com/share/689fa61f-3498-8006-9989-ff8221f97b01'>https://chatgpt.com/share/689fa61f-3498-8006-9989-ff8221f97b01</a></p>
<p><br>
Ransomware Incident Playbook: <a href='https://chatgpt.com/share/689fa63f-86ec-8006-8355-642d4d38808e'>https://chatgpt.com/share/689fa63f-86ec-8006-8355-642d4d38808e</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/j4bzagi9xhna8gp6/HVS25_EP389_Ron_Solo_August9mj1l.mp3" length="31080800" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI might analyze your logs in seconds, but only the community can put you in the room that changes your career.
In this solo episode, Ron Eddings discusses the powerful balance between human connection and artificial intelligence in shaping the future of cybersecurity and beyond. From the sacrifices that sparked his career to the mentors who opened doors, Ron shares personal stories that show why community will always be your ultimate competitive edge, even as AI advances into the SOC. He also runs live AI experiments on ransomware response and log analysis, revealing what AI can (and can’t) do for practitioners right now.
 
Impactful Moments:
00:00 - Introduction02:00 - Why community is your first advantage03:30 - The sacrifice that launched Ron’s career04:40 - Meeting mentor Marcus Carey06:00 - Early opportunities in cybersecurity07:00 - The power of hacker spaces09:00 - How mentors open hidden doors10:00 - RSA and Black Hat as career accelerators13:00 - The most underrated LinkedIn feature15:00 - The HVS mastermind community16:00 - Reality check on GPT-518:00 - AI builds an IR playbook20:00 - Critical do’s and don’ts in incident response23:00 - Why hallucinations matter in cybersecurity AI25:00 - AI makes sense of raw logs28:00 - Can AI replace tier one analysts?30:00 - Where AI still falls short31:00 - Final challenge: Strengthen your community
 
 
Links:
Connect with our Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Register for our livestream with Gerry Auger: https://www.linkedin.com/events/7359290642633539586/
Check out the links to the OpenAI ChatGPT threads here:Incident Analysis Summary: https://chatgpt.com/share/689fa61f-3498-8006-9989-ff8221f97b01
Ransomware Incident Playbook: https://chatgpt.com/share/689fa63f-86ec-8006-8355-642d4d38808e
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1942</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>389</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>From MCP Risks to AI Jailbreaks with Marco Figueroa</title>
        <itunes:title>From MCP Risks to AI Jailbreaks with Marco Figueroa</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/from-mcp-risks-to-ai-jailbreaks-with-marco-figueroa/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/from-mcp-risks-to-ai-jailbreaks-with-marco-figueroa/#comments</comments>        <pubDate>Thu, 14 Aug 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/29bd7d70-fe73-36cb-8343-c89679db9a22</guid>
                                    <description><![CDATA[<p>When AI agents move faster than security teams, the game changes, and the risks multiply.</p>
<p>Ron welcomes back Marco “Mystic Marc” Figueroa, Program Manager at Mozilla’s 0DIN Program, to continue the conversation and update on 2025’s most pressing AI and cybersecurity shifts. From the explosive rise of AI agents and OpenAI’s rumored browser to the hidden dangers of MCP implementations and prompt injection exploits like the Gemini attack, Marco shares insights that security pros can’t afford to miss.</p>
<p>
Impactful Moments
00:00 - Introduction
02:00 - Why 2025 is the year of the agent
05:45 - MCP’s rapid adoption and security risks
10:00 - The Gemini prompt injection vulnerability
15:00 - How attackers hide malicious AI prompts
18:00 - High success rates in non-technical teams
22:00 - Rise of voice-based AI scams
25:00 - Using jailbreaks to bend AI to your needs
30:00 - Predictions on OpenAI’s upcoming browser
33:00 - The profit battle between OpenAI and Microsoft
35:00 - Windsurf’s rollercoaster of acquisitions</p>
<p>
Links:
Connect with our guest Marco on LinkedIn: https://www.linkedin.com/in/marco-figueroa-re/</p>
<p>
Check out our upcoming events: https://www.hackervalley.com/livestreams</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When AI agents move faster than security teams, the game changes, and the risks multiply.</p>
<p>Ron welcomes back Marco “Mystic Marc” Figueroa, Program Manager at Mozilla’s 0DIN Program, to continue the conversation and update on 2025’s most pressing AI and cybersecurity shifts. From the explosive rise of AI agents and OpenAI’s rumored browser to the hidden dangers of MCP implementations and prompt injection exploits like the Gemini attack, Marco shares insights that security pros can’t afford to miss.</p>
<p><br>
Impactful Moments<br>
00:00 - Introduction<br>
02:00 - Why 2025 is the year of the agent<br>
05:45 - MCP’s rapid adoption and security risks<br>
10:00 - The Gemini prompt injection vulnerability<br>
15:00 - How attackers hide malicious AI prompts<br>
18:00 - High success rates in non-technical teams<br>
22:00 - Rise of voice-based AI scams<br>
25:00 - Using jailbreaks to bend AI to your needs<br>
30:00 - Predictions on OpenAI’s upcoming browser<br>
33:00 - The profit battle between OpenAI and Microsoft<br>
35:00 - Windsurf’s rollercoaster of acquisitions</p>
<p><br>
Links:<br>
Connect with our guest Marco on LinkedIn: https://www.linkedin.com/in/marco-figueroa-re/</p>
<p><br>
Check out our upcoming events: https://www.hackervalley.com/livestreams</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:<br>
https://www.patreon.com/hackervalleystudio<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nngeekawcu677bsr/HVS25_EP388_Marco_Figueroa_Final_Audioapd1x.mp3" length="60555969" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When AI agents move faster than security teams, the game changes, and the risks multiply.
Ron welcomes back Marco “Mystic Marc” Figueroa, Program Manager at Mozilla’s 0DIN Program, to continue the conversation and update on 2025’s most pressing AI and cybersecurity shifts. From the explosive rise of AI agents and OpenAI’s rumored browser to the hidden dangers of MCP implementations and prompt injection exploits like the Gemini attack, Marco shares insights that security pros can’t afford to miss.
Impactful Moments00:00 - Introduction02:00 - Why 2025 is the year of the agent05:45 - MCP’s rapid adoption and security risks10:00 - The Gemini prompt injection vulnerability15:00 - How attackers hide malicious AI prompts18:00 - High success rates in non-technical teams22:00 - Rise of voice-based AI scams25:00 - Using jailbreaks to bend AI to your needs30:00 - Predictions on OpenAI’s upcoming browser33:00 - The profit battle between OpenAI and Microsoft35:00 - Windsurf’s rollercoaster of acquisitions
Links:Connect with our guest Marco on LinkedIn: https://www.linkedin.com/in/marco-figueroa-re/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioLove Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discordBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2490</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>388</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Debt vs. Risk: What the SharePoint Breach Taught Us with Ron Eddings</title>
        <itunes:title>Debt vs. Risk: What the SharePoint Breach Taught Us with Ron Eddings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/debt-vs-risk-what-the-sharepoint-breach-taught-us-with-ron-eddings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/debt-vs-risk-what-the-sharepoint-breach-taught-us-with-ron-eddings/#comments</comments>        <pubDate>Thu, 07 Aug 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b4e65b4b-55b4-392b-8d83-efcc89d3abf4</guid>
                                    <description><![CDATA[<p>The riskiest move in cybersecurity? Playing it too safe. In this solo episode, Ron Eddings redefines the way we think about technical debt, risk, and missed opportunities, in security and in life.

Ron reframes the debt vs. risk paradigm through the lens of the SharePoint breach, personal milestones, and co-founding Hacker Valley. With sharp insights, personal stories, and a call to action for every listener, he shows how curiosity and calculated risk are the true drivers of innovation.

</p>
<p>Impactful Moments
00:00 - Introduction
01:10 - Why debt vs. risk matters now
02:20 - What the SharePoint breach taught us
04:15 - Risk avoidance creates deeper debt
05:10 - Clear definitions: risk vs. debt
06:30 - Hidden costs of deferring decisions
08:15 - Leaving $200k salary to build Hacker Valley
10:00 - Long-term founder debt explained
11:08 - When comfort becomes dangerous
12:00 - Curiosity as a leadership skill
13:10 - What you’re not seeing yet
14:30 - Final thought: reflect and reassess</p>
<p>
Links:
Connect with our Ron on LinkedIn: ​​https://www.linkedin.com/in/ronaldeddings/</p>
<p>Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The riskiest move in cybersecurity? Playing it too safe. In this solo episode, Ron Eddings redefines the way we think about technical debt, risk, and missed opportunities, in security and in life.<br>
<br>
Ron reframes the debt vs. risk paradigm through the lens of the SharePoint breach, personal milestones, and co-founding Hacker Valley. With sharp insights, personal stories, and a call to action for every listener, he shows how curiosity and calculated risk are the true drivers of innovation.<br>
<br>
</p>
<p>Impactful Moments<br>
00:00 - Introduction<br>
01:10 - Why debt vs. risk matters now<br>
02:20 - What the SharePoint breach taught us<br>
04:15 - Risk avoidance creates deeper debt<br>
05:10 - Clear definitions: risk vs. debt<br>
06:30 - Hidden costs of deferring decisions<br>
08:15 - Leaving $200k salary to build Hacker Valley<br>
10:00 - Long-term founder debt explained<br>
11:08 - When comfort becomes dangerous<br>
12:00 - Curiosity as a leadership skill<br>
13:10 - What you’re not seeing yet<br>
14:30 - Final thought: reflect and reassess</p>
<p><br>
Links:<br>
Connect with our Ron on LinkedIn: ​​https://www.linkedin.com/in/ronaldeddings/</p>
<p>Check out our upcoming events: https://www.hackervalley.com/livestreams<br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
https://www.patreon.com/hackervalleystudio<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xrbszixdwp395ng6/HVS25_EP387_Ron_Solo_July803eo.mp3" length="15373892" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The riskiest move in cybersecurity? Playing it too safe. In this solo episode, Ron Eddings redefines the way we think about technical debt, risk, and missed opportunities, in security and in life.Ron reframes the debt vs. risk paradigm through the lens of the SharePoint breach, personal milestones, and co-founding Hacker Valley. With sharp insights, personal stories, and a call to action for every listener, he shows how curiosity and calculated risk are the true drivers of innovation.
Impactful Moments00:00 - Introduction01:10 - Why debt vs. risk matters now02:20 - What the SharePoint breach taught us04:15 - Risk avoidance creates deeper debt05:10 - Clear definitions: risk vs. debt06:30 - Hidden costs of deferring decisions08:15 - Leaving $200k salary to build Hacker Valley10:00 - Long-term founder debt explained11:08 - When comfort becomes dangerous12:00 - Curiosity as a leadership skill13:10 - What you’re not seeing yet14:30 - Final thought: reflect and reassess
Links:Connect with our Ron on LinkedIn: ​​https://www.linkedin.com/in/ronaldeddings/
Check out our upcoming events: https://www.hackervalley.com/livestreamsJoin our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioLove Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discordBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>960</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>387</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Future of Cyber Talent Is African with Confidence Staveley</title>
        <itunes:title>The Future of Cyber Talent Is African with Confidence Staveley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-future-of-cyber-talent-is-african-with-confidence-staveley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-future-of-cyber-talent-is-african-with-confidence-staveley/#comments</comments>        <pubDate>Thu, 31 Jul 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/27f21a90-9705-3211-abd2-e54a4370f463</guid>
                                    <description><![CDATA[<p>The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity and AI innovation… if we’re bold enough to invest.</p>
<p>In this episode, Ron welcomes back cybersecurity leader and advocate Confidence Staveley for a discussion on purpose-driven innovation, talent development, and AI-powered awareness tools. Confidence shares updates on her nonprofit work, her bold new ventures including AI Cyber Magazine, and how she's helping shape Africa into a tech talent hub. With global budget cuts hitting nonprofits and marginalized communities, Confidence shares how Africa’s innovators, who are often excluded from the table, are building their own tables, making their impact impossible to ignore, and shaping cybersecurity’s future on their terms.</p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction
02:00 - Her Difference Makers Award speech
04:00 - Partnering with SANS for bigger impact
06:01 - Global DEI backlash and ripple effects
10:00 - Why Africa is the future of tech
13:01 - Innovation with limited resources
17:10 - AI Cyber Magazine and its mission
19:00 - Building AI-powered awareness tools
21:00 - The African adage on self-renewal
22:10 - How sharing knowledge builds trust
</p>
<p> </p>
Links
<p>Connect with our guest, Confidence Staveley: <a href='https://www.linkedin.com/in/confidencestaveley/'>https://www.linkedin.com/in/confidencestaveley/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity and AI innovation… if we’re bold enough to invest.</p>
<p>In this episode, Ron welcomes back cybersecurity leader and advocate Confidence Staveley for a discussion on purpose-driven innovation, talent development, and AI-powered awareness tools. Confidence shares updates on her nonprofit work, her bold new ventures including <em>AI Cyber Magazine</em>, and how she's helping shape Africa into a tech talent hub. With global budget cuts hitting nonprofits and marginalized communities, Confidence shares how Africa’s innovators, who are often excluded from the table, are building their own tables, making their impact impossible to ignore, and shaping cybersecurity’s future on their terms.</p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction<br>
02:00 - Her Difference Makers Award speech<br>
04:00 - Partnering with SANS for bigger impact<br>
06:01 - Global DEI backlash and ripple effects<br>
10:00 - Why Africa is the future of tech<br>
13:01 - Innovation with limited resources<br>
17:10 - AI Cyber Magazine and its mission<br>
19:00 - Building AI-powered awareness tools<br>
21:00 - The African adage on self-renewal<br>
22:10 - How sharing knowledge builds trust<br>
</p>
<p> </p>
Links
<p>Connect with our guest, Confidence Staveley: <a href='https://www.linkedin.com/in/confidencestaveley/'>https://www.linkedin.com/in/confidencestaveley/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rrk2giu6f929699n/HVS25_EP386_Confidence_Staveley6h8ns.mp3" length="22445774" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity and AI innovation… if we’re bold enough to invest.
In this episode, Ron welcomes back cybersecurity leader and advocate Confidence Staveley for a discussion on purpose-driven innovation, talent development, and AI-powered awareness tools. Confidence shares updates on her nonprofit work, her bold new ventures including AI Cyber Magazine, and how she's helping shape Africa into a tech talent hub. With global budget cuts hitting nonprofits and marginalized communities, Confidence shares how Africa’s innovators, who are often excluded from the table, are building their own tables, making their impact impossible to ignore, and shaping cybersecurity’s future on their terms.
 
Impactful Moments
00:00 - Introduction02:00 - Her Difference Makers Award speech04:00 - Partnering with SANS for bigger impact06:01 - Global DEI backlash and ripple effects10:00 - Why Africa is the future of tech13:01 - Innovation with limited resources17:10 - AI Cyber Magazine and its mission19:00 - Building AI-powered awareness tools21:00 - The African adage on self-renewal22:10 - How sharing knowledge builds trust
 
Links
Connect with our guest, Confidence Staveley: https://www.linkedin.com/in/confidencestaveley/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1402</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>386</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Compliance Isn’t the Enemy with Jeff Man</title>
        <itunes:title>Compliance Isn’t the Enemy with Jeff Man</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/compliance-isn-t-the-enemy-with-jeff-man/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/compliance-isn-t-the-enemy-with-jeff-man/#comments</comments>        <pubDate>Thu, 24 Jul 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/cccaddac-30a9-3b2c-88d3-61883f8f0c99</guid>
                                    <description><![CDATA[<p>Is compliance just a checkbox, or the backbone of real security?</p>
<p>Returning to the show with decades of hard-earned insight, Jeff Man makes the case that compliance, especially PCI-DSS, isn't just a formality; it's foundational to modern security. As one of the original architects of the NSA Red Team and a 20-year PCI veteran, Jeff explains how this often-misunderstood framework has shaped everything from pen testing to vendor accountability.</p>
<p>Ron and Jeff unpack the six core goals of PCI, how red teams and SaaS builders are directly affected, and why many security teams resist compliance efforts, despite relying on them to get essential buy-in and funding.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction
01:00 – Does compliance equal security?
02:09 – Jeff returns with PCI firepower
03:15 – Defining security vs. compliance
05:33 – “Show me what you’re doing”
06:45 – Six goals at PCI’s core
10:45 – Security is watching, not reacting
13:30 – Companies secure because they have to
15:00 – PCI gave red teams their jobs
16:30 – Stripe and Square absorb PCI burden
19:30 – PCI 4.0 causes confusion
21:00 – Vendors aren’t your trusted advisors
22:30 – “Hate me, but I’ll help”</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Jeff Man: <a href='https://www.linkedin.com/in/jeffreyeman/'>https://www.linkedin.com/in/jeffreyeman/</a></p>
<p>


</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>


</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Is compliance just a checkbox, or the backbone of real security?</p>
<p>Returning to the show with decades of hard-earned insight, Jeff Man makes the case that compliance, especially PCI-DSS, isn't just a formality; it's foundational to modern security. As one of the original architects of the NSA Red Team and a 20-year PCI veteran, Jeff explains how this often-misunderstood framework has shaped everything from pen testing to vendor accountability.</p>
<p>Ron and Jeff unpack the six core goals of PCI, how red teams and SaaS builders are directly affected, and why many security teams resist compliance efforts, despite relying on them to get essential buy-in and funding.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction<br>
01:00 – Does compliance equal security?<br>
02:09 – Jeff returns with PCI firepower<br>
03:15 – Defining security vs. compliance<br>
05:33 – “Show me what you’re doing”<br>
06:45 – Six goals at PCI’s core<br>
10:45 – Security is watching, not reacting<br>
13:30 – Companies secure because they <em>have</em> to<br>
15:00 – PCI gave red teams their jobs<br>
16:30 – Stripe and Square absorb PCI burden<br>
19:30 – PCI 4.0 causes confusion<br>
21:00 – Vendors aren’t your trusted advisors<br>
22:30 – “Hate me, but I’ll help”</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Jeff Man: <a href='https://www.linkedin.com/in/jeffreyeman/'>https://www.linkedin.com/in/jeffreyeman/</a></p>
<p><br>
<br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6rdeau2rvrzscjtk/HVS25_EP385_Jeff_Man_Final_01bqqdr.mp3" length="35894873" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Is compliance just a checkbox, or the backbone of real security?
Returning to the show with decades of hard-earned insight, Jeff Man makes the case that compliance, especially PCI-DSS, isn't just a formality; it's foundational to modern security. As one of the original architects of the NSA Red Team and a 20-year PCI veteran, Jeff explains how this often-misunderstood framework has shaped everything from pen testing to vendor accountability.
Ron and Jeff unpack the six core goals of PCI, how red teams and SaaS builders are directly affected, and why many security teams resist compliance efforts, despite relying on them to get essential buy-in and funding.
 
Impactful Moments:
00:00 – Introduction01:00 – Does compliance equal security?02:09 – Jeff returns with PCI firepower03:15 – Defining security vs. compliance05:33 – “Show me what you’re doing”06:45 – Six goals at PCI’s core10:45 – Security is watching, not reacting13:30 – Companies secure because they have to15:00 – PCI gave red teams their jobs16:30 – Stripe and Square absorb PCI burden19:30 – PCI 4.0 causes confusion21:00 – Vendors aren’t your trusted advisors22:30 – “Hate me, but I’ll help”

Links:
Connect with our guest, Jeff Man: https://www.linkedin.com/in/jeffreyeman/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1494</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>385</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What Makes a Great CISO? A Playbook from Gary Hayslip</title>
        <itunes:title>What Makes a Great CISO? A Playbook from Gary Hayslip</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-makes-a-great-ciso-a-playbook-from-gary-hayslip/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-makes-a-great-ciso-a-playbook-from-gary-hayslip/#comments</comments>        <pubDate>Thu, 17 Jul 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fe66debd-09e9-3c6b-b474-e9d7f25dd9e7</guid>
                                    <description><![CDATA[<p>What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to discuss what it takes to lead in today’s high-stakes digital world. Gary shares battle-tested insights on accountability, the evolving expectations of the CISO role, and how AI is reshaping leadership without replacing it.</p>
<p>Gary shares stories ranging from military mishaps to enterprise-scale transformation, and makes the case for visibility, trust, and embracing change. His perspective brings clarity to the fundamental responsibilities of a CISO and the mindset required to lead with impact.</p>
Impactful Moments
<p>00:00 – Introduction
</p>
<p>02:00 – Defining the modern CISO as a business leader
</p>
<p>05:45 – Why CISOs should never delegate accountability
</p>
<p>07:30 – The danger of staying invisible
</p>
<p>10:45 – The $40K UPS explosion mistake
</p>
<p>15:00 – How leaders build trust in new teams
</p>
<p>19:10 – Visibility is not micromanagement
</p>
<p>24:30 – Staying humble while leading big
</p>
<p>30:00 – Building “Rocky the Raccoon” internal GPT
</p>
<p>34:30 – Hiring for AI fluency in security teams</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Gary Hayslip: <a href='https://www.linkedin.com/in/ghayslip/'>https://www.linkedin.com/in/ghayslip/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to discuss what it takes to lead in today’s high-stakes digital world. Gary shares battle-tested insights on accountability, the evolving expectations of the CISO role, and how AI is reshaping leadership without replacing it.</p>
<p>Gary shares stories ranging from military mishaps to enterprise-scale transformation, and makes the case for visibility, trust, and embracing change. His perspective brings clarity to the fundamental responsibilities of a CISO and the mindset required to lead with impact.</p>
Impactful Moments
<p>00:00 – Introduction<br>
</p>
<p>02:00 – Defining the modern CISO as a business leader<br>
</p>
<p>05:45 – Why CISOs should never delegate accountability<br>
</p>
<p>07:30 – The danger of staying invisible<br>
</p>
<p>10:45 – The $40K UPS explosion mistake<br>
</p>
<p>15:00 – How leaders build trust in new teams<br>
</p>
<p>19:10 – Visibility is not micromanagement<br>
</p>
<p>24:30 – Staying humble while leading big<br>
</p>
<p>30:00 – Building “Rocky the Raccoon” internal GPT<br>
</p>
<p>34:30 – Hiring for AI fluency in security teams</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Gary Hayslip: <a href='https://www.linkedin.com/in/ghayslip/'>https://www.linkedin.com/in/ghayslip/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ait262fu7qmwr268/HVS25_EP384_Gary_Hayslip_Finalb24hy.mp3" length="53784506" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to discuss what it takes to lead in today’s high-stakes digital world. Gary shares battle-tested insights on accountability, the evolving expectations of the CISO role, and how AI is reshaping leadership without replacing it.
Gary shares stories ranging from military mishaps to enterprise-scale transformation, and makes the case for visibility, trust, and embracing change. His perspective brings clarity to the fundamental responsibilities of a CISO and the mindset required to lead with impact.
Impactful Moments
00:00 – Introduction
02:00 – Defining the modern CISO as a business leader
05:45 – Why CISOs should never delegate accountability
07:30 – The danger of staying invisible
10:45 – The $40K UPS explosion mistake
15:00 – How leaders build trust in new teams
19:10 – Visibility is not micromanagement
24:30 – Staying humble while leading big
30:00 – Building “Rocky the Raccoon” internal GPT
34:30 – Hiring for AI fluency in security teams

Links:
Connect with our guest, Gary Hayslip: https://www.linkedin.com/in/ghayslip/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2239</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>384</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Confidence, Coaching, and the S-Word with Mel Reyes</title>
        <itunes:title>Confidence, Coaching, and the S-Word with Mel Reyes</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/confidence-coaching-and-the-s-word-with-mel-reyes/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/confidence-coaching-and-the-s-word-with-mel-reyes/#comments</comments>        <pubDate>Thu, 10 Jul 2025 07:34:09 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/beb00e37-6822-3a78-85e4-83d0ace79728</guid>
                                    <description><![CDATA[<p>Want to stand out as a leader? According to our guest Mel Reyes, you need to dress like you mean it and speak like you’ve got nothing to prove.</p>
<p>In this episode, Mel shares how he built billion-dollar portfolios, coached executive teams, and still shows up in a white hoodie when that feels right. With Ron, he unpacks how executive presence becomes a strategic weapon for breaking resistance, commanding attention, and making your message unforgettable. You’ll learn why generic resumes fail, how to master executive storytelling with the SPAR method, and what dropping the ego really looks like in your next leadership role.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction
03:00 – Breaking the rules of executive delivery
07:00 – Why confidence starts in your closet
11:30 – Respecting identity in professional spaces
12:30 – Advice for breaking into cybersecurity
17:00 – Reinvention at the mid-senior level
21:00 – The SPAR framework for storytelling
30:00 – Drop the ego, find your passion</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Mel Reyes: <a href='https://www.linkedin.com/in/melreyes/'>https://www.linkedin.com/in/melreyes/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Want to stand out as a leader? According to our guest Mel Reyes, you need to dress like you mean it and speak like you’ve got nothing to prove.</p>
<p>In this episode, Mel shares how he built billion-dollar portfolios, coached executive teams, and still shows up in a white hoodie when that feels right. With Ron, he unpacks how executive presence becomes a strategic weapon for breaking resistance, commanding attention, and making your message unforgettable. You’ll learn why generic resumes fail, how to master executive storytelling with the SPAR method, and what dropping the ego really looks like in your next leadership role.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction<br>
03:00 – Breaking the rules of executive delivery<br>
07:00 – Why confidence starts in your closet<br>
11:30 – Respecting identity in professional spaces<br>
12:30 – Advice for breaking into cybersecurity<br>
17:00 – Reinvention at the mid-senior level<br>
21:00 – The SPAR framework for storytelling<br>
30:00 – Drop the ego, find your passion</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Mel Reyes: <a href='https://www.linkedin.com/in/melreyes/'>https://www.linkedin.com/in/melreyes/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kj8sxb3bkmheihap/HVS25_EP384.mp3" length="48225899" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Want to stand out as a leader? According to our guest Mel Reyes, you need to dress like you mean it and speak like you’ve got nothing to prove.
In this episode, Mel shares how he built billion-dollar portfolios, coached executive teams, and still shows up in a white hoodie when that feels right. With Ron, he unpacks how executive presence becomes a strategic weapon for breaking resistance, commanding attention, and making your message unforgettable. You’ll learn why generic resumes fail, how to master executive storytelling with the SPAR method, and what dropping the ego really looks like in your next leadership role.
 
Impactful Moments:
00:00 – Introduction03:00 – Breaking the rules of executive delivery07:00 – Why confidence starts in your closet11:30 – Respecting identity in professional spaces12:30 – Advice for breaking into cybersecurity17:00 – Reinvention at the mid-senior level21:00 – The SPAR framework for storytelling30:00 – Drop the ego, find your passion
 
Links:
Connect with our guest, Mel Reyes: https://www.linkedin.com/in/melreyes/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1970</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>383</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Purple Teaming Is the New Job Security with Maril Vernon</title>
        <itunes:title>Purple Teaming Is the New Job Security with Maril Vernon</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/purple-teaming-is-the-new-job-security-with-maril-vernon/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/purple-teaming-is-the-new-job-security-with-maril-vernon/#comments</comments>        <pubDate>Thu, 26 Jun 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/817ee1e4-168e-3b9f-bc6a-7e6837e26f18</guid>
                                    <description><![CDATA[<p>Cybersecurity isn’t just red or blue anymore... it’s purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker Valley Studio to discuss purple teaming as the most future-proof career path in cyber. She opens up about mentorship, burnout, compensation realities, and how we’re still failing the fundamentals.</p>
<p>Together, Ron and Maril dig into what purple teaming really is (and isn’t), why soft skills matter more than ever, and how defenders are the frontline signal source for law enforcement. From guiding her mom into IR to co-founding Mind Over Cyber, Maril embodies what it means to show up for the cyber community and demand more from the culture itself.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Introduction
01:01 - Maril’s role at NetSPI
03:00 - Why purple skills are future-proof
05:19 - Salary truths in purple teaming
08:30 - Know your value, negotiate wisely
13:07 - How defenders enable law enforcement
16:22 - The real meaning of purple teaming
18:39 - Common misconceptions debunked
24:45 - People are always the soft spot
26:01 - The two security stack must-haves
29:00 - Mom made it to incident response
30:48 - Maril’s mentorship philosophy
34:09 - Why you need to post anyway
36:35 - What Mind Over Cyber is really about
40:00 - CISOs are burning out silently
41:31 - Closing thoughts


</p>
<p>Links:</p>
<p>Connect with our guest, Maril Vernon: <a href='https://www.linkedin.com/in/marilvernon'>https://www.linkedin.com/in/marilvernon</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>


</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Cybersecurity isn’t just red or blue anymore... it’s purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker Valley Studio to discuss purple teaming as the most future-proof career path in cyber. She opens up about mentorship, burnout, compensation realities, and how we’re still failing the fundamentals.</p>
<p>Together, Ron and Maril dig into what purple teaming really is (and isn’t), why soft skills matter more than ever, and how defenders are the frontline signal source for law enforcement. From guiding her mom into IR to co-founding <em>Mind Over Cyber</em>, Maril embodies what it means to show up for the cyber community and demand more from the culture itself.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Introduction<br>
01:01 - Maril’s role at NetSPI<br>
03:00 - Why purple skills are future-proof<br>
05:19 - Salary truths in purple teaming<br>
08:30 - Know your value, negotiate wisely<br>
13:07 - How defenders enable law enforcement<br>
16:22 - The real meaning of purple teaming<br>
18:39 - Common misconceptions debunked<br>
24:45 - People are always the soft spot<br>
26:01 - The two security stack must-haves<br>
29:00 - Mom made it to incident response<br>
30:48 - Maril’s mentorship philosophy<br>
34:09 - Why you need to post anyway<br>
36:35 - What Mind Over Cyber is really about<br>
40:00 - CISOs are burning out silently<br>
41:31 - Closing thoughts<br>
<br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Maril Vernon: <a href='https://www.linkedin.com/in/marilvernon'>https://www.linkedin.com/in/marilvernon</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rkmfbs9vq7mtj22u/HVS25_EP382_Maril_Vernon7vr0a.mp3" length="63524627" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Cybersecurity isn’t just red or blue anymore... it’s purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker Valley Studio to discuss purple teaming as the most future-proof career path in cyber. She opens up about mentorship, burnout, compensation realities, and how we’re still failing the fundamentals.
Together, Ron and Maril dig into what purple teaming really is (and isn’t), why soft skills matter more than ever, and how defenders are the frontline signal source for law enforcement. From guiding her mom into IR to co-founding Mind Over Cyber, Maril embodies what it means to show up for the cyber community and demand more from the culture itself.
 
Impactful Moments
00:00 - Introduction01:01 - Maril’s role at NetSPI03:00 - Why purple skills are future-proof05:19 - Salary truths in purple teaming08:30 - Know your value, negotiate wisely13:07 - How defenders enable law enforcement16:22 - The real meaning of purple teaming18:39 - Common misconceptions debunked24:45 - People are always the soft spot26:01 - The two security stack must-haves29:00 - Mom made it to incident response30:48 - Maril’s mentorship philosophy34:09 - Why you need to post anyway36:35 - What Mind Over Cyber is really about40:00 - CISOs are burning out silently41:31 - Closing thoughts
Links:
Connect with our guest, Maril Vernon: https://www.linkedin.com/in/marilvernon
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2606</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>382</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The AI Gold Rush in Cybersecurity with Chris Cochran</title>
        <itunes:title>The AI Gold Rush in Cybersecurity with Chris Cochran</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-ai-gold-rush-in-cybersecurity-with-chris-cochran/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-ai-gold-rush-in-cybersecurity-with-chris-cochran/#comments</comments>        <pubDate>Thu, 19 Jun 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c7df9b95-82e5-3607-8283-d520655d1cbd</guid>
                                    <description><![CDATA[<p>The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when machines fill the gaps we used to grow into?</p>
<p>In this episode, Chris Cochran, CEO and Founder of Commandant, returns to Hacker Valley Studio with an insider view on building in the AI boom. He shares why he’s betting on incident response over the “AI SOC,” what it means to use AI with integrity, and how this moment mirrors the early industrial revolutions: chaotic, risky, but ripe with once-in-a-career opportunity.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction
02:11 – Launch of Commandant AI
03:06 – Early-stage LLM opportunities
05:26 – Built first AI co-pilot in 4 hours
06:00 – AI bot tops HackerOne leaderboard
07:44 – AI used for and against orgs
10:14 – Focus on incident response, not AI SOC
12:34 – Reducing cost of prolonged incidents
14:01 – Cybersecurity changing every 2 months
16:58 – AI causing rapid skill loss
21:59 – AI-assisted job interviews detected
24:49 – AI lacks business context for blocking
27:30 – Daily AI use pays long-term dividends</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Chris Cochran: <a href='https://www.linkedin.com/in/chrishvm/'>https://www.linkedin.com/in/chrishvm/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when machines fill the gaps we used to grow into?</p>
<p>In this episode, Chris Cochran, CEO and Founder of Commandant, returns to Hacker Valley Studio with an insider view on building in the AI boom. He shares why he’s betting on incident response over the “AI SOC,” what it means to use AI with integrity, and how this moment mirrors the early industrial revolutions: chaotic, risky, but ripe with once-in-a-career opportunity.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction<br>
02:11 – Launch of Commandant AI<br>
03:06 – Early-stage LLM opportunities<br>
05:26 – Built first AI co-pilot in 4 hours<br>
06:00 – AI bot tops HackerOne leaderboard<br>
07:44 – AI used for and against orgs<br>
10:14 – Focus on incident response, not AI SOC<br>
12:34 – Reducing cost of prolonged incidents<br>
14:01 – Cybersecurity changing every 2 months<br>
16:58 – AI causing rapid skill loss<br>
21:59 – AI-assisted job interviews detected<br>
24:49 – AI lacks business context for blocking<br>
27:30 – Daily AI use pays long-term dividends</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Chris Cochran: <a href='https://www.linkedin.com/in/chrishvm/'>https://www.linkedin.com/in/chrishvm/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hi8hwe8i53ryh8ec/HVS25_EP381_FINAL_v3bm0x8.mp3" length="45340129" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when machines fill the gaps we used to grow into?
In this episode, Chris Cochran, CEO and Founder of Commandant, returns to Hacker Valley Studio with an insider view on building in the AI boom. He shares why he’s betting on incident response over the “AI SOC,” what it means to use AI with integrity, and how this moment mirrors the early industrial revolutions: chaotic, risky, but ripe with once-in-a-career opportunity.
 
Impactful Moments:
00:00 – Introduction02:11 – Launch of Commandant AI03:06 – Early-stage LLM opportunities05:26 – Built first AI co-pilot in 4 hours06:00 – AI bot tops HackerOne leaderboard07:44 – AI used for and against orgs10:14 – Focus on incident response, not AI SOC12:34 – Reducing cost of prolonged incidents14:01 – Cybersecurity changing every 2 months16:58 – AI causing rapid skill loss21:59 – AI-assisted job interviews detected24:49 – AI lacks business context for blocking27:30 – Daily AI use pays long-term dividends

Links:
Connect with our guest, Chris Cochran: https://www.linkedin.com/in/chrishvm/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1844</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>381</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The AI That Tried to Escape with Ron Eddings</title>
        <itunes:title>The AI That Tried to Escape with Ron Eddings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-ai-that-tried-to-escape-with-ron-eddings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-ai-that-tried-to-escape-with-ron-eddings/#comments</comments>        <pubDate>Thu, 12 Jun 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9ac52def-fa55-306a-a24c-bbec02fa493f</guid>
                                    <description><![CDATA[<p>What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there.</p>
<p>Host Ron Eddings unpacks the terrifyingly innovative ways AI is altering the cybersecurity threat landscape. From deepfakes convincing enough to fool your own family to auto-summarizing email clients acting as unintentional insiders, the stakes have never been higher. Ron also shares insights from his brand-new book Attack Surface Management, co-authored with MJ Kaufman and published by O'Reilly, and breaks down why the simplest social engineering tactics remain the most dangerous—even in the age of advanced AI.</p>
Impactful Moments:
<p>00:00 - Introduction
</p>
<p>02:30 - Model Context Protocol explained
</p>
<p>05:00 - Google's VEO-3 and fake riot videos
</p>
<p>07:00 - Fake Facebook ads pushing malware
</p>
<p>09:30 - Social engineering still reigns supreme
</p>
<p>13:30 - Using AI to write malicious emails
</p>
<p>16:30 - Calendly phishing and credential theft
</p>
<p>19:00 - Gemini and the risk of auto-summarization
</p>
<p>21:30 - LLM access to your private documents
</p>
<p>22:45 - Takeaways and protecting your environment</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>Grab a copy of Ron’s new book, “Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets”: <a href='https://a.co/d/1nmPod2'>https://a.co/d/1nmPod2</a></p>
<p> </p>
<p>Check out the full article on “The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare” here: <a href='https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/'>https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/</a></p>
<p>


</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there.</p>
<p>Host Ron Eddings unpacks the terrifyingly innovative ways AI is altering the cybersecurity threat landscape. From deepfakes convincing enough to fool your own family to auto-summarizing email clients acting as unintentional insiders, the stakes have never been higher. Ron also shares insights from his brand-new book <em>Attack Surface Management</em>, co-authored with MJ Kaufman and published by O'Reilly, and breaks down why the simplest social engineering tactics remain the most dangerous—even in the age of advanced AI.</p>
Impactful Moments:
<p>00:00 - Introduction<br>
</p>
<p>02:30 - Model Context Protocol explained<br>
</p>
<p>05:00 - Google's VEO-3 and fake riot videos<br>
</p>
<p>07:00 - Fake Facebook ads pushing malware<br>
</p>
<p>09:30 - Social engineering still reigns supreme<br>
</p>
<p>13:30 - Using AI to write malicious emails<br>
</p>
<p>16:30 - Calendly phishing and credential theft<br>
</p>
<p>19:00 - Gemini and the risk of auto-summarization<br>
</p>
<p>21:30 - LLM access to your private documents<br>
</p>
<p>22:45 - Takeaways and protecting your environment</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ron on LinkedIn: <a href='https://www.linkedin.com/in/ronaldeddings/'>https://www.linkedin.com/in/ronaldeddings/</a></p>
<p>Grab a copy of Ron’s new book, “Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets”: <a href='https://a.co/d/1nmPod2'>https://a.co/d/1nmPod2</a></p>
<p> </p>
<p>Check out the full article on “The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare” here: <a href='https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/'>https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/</a></p>
<p><br>
<br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ecx5kvccca6zkiry/HVS25_EP380_RonSolo_HQ_FINAL_01.mp3" length="35990306" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there.
Host Ron Eddings unpacks the terrifyingly innovative ways AI is altering the cybersecurity threat landscape. From deepfakes convincing enough to fool your own family to auto-summarizing email clients acting as unintentional insiders, the stakes have never been higher. Ron also shares insights from his brand-new book Attack Surface Management, co-authored with MJ Kaufman and published by O'Reilly, and breaks down why the simplest social engineering tactics remain the most dangerous—even in the age of advanced AI.
Impactful Moments:
00:00 - Introduction
02:30 - Model Context Protocol explained
05:00 - Google's VEO-3 and fake riot videos
07:00 - Fake Facebook ads pushing malware
09:30 - Social engineering still reigns supreme
13:30 - Using AI to write malicious emails
16:30 - Calendly phishing and credential theft
19:00 - Gemini and the risk of auto-summarization
21:30 - LLM access to your private documents
22:45 - Takeaways and protecting your environment
 
Links:
Connect with Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Grab a copy of Ron’s new book, “Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets”: https://a.co/d/1nmPod2
 
Check out the full article on “The Rise of ‘Vibe Hacking’ Is the Next AI Nightmare” here: https://www.wired.com/story/youre-not-ready-for-ai-hacker-agents/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1423</itunes:duration>
                <itunes:episode>380</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Zero Trust Isn’t a Tool — It’s Everything with George Finney</title>
        <itunes:title>Zero Trust Isn’t a Tool — It’s Everything with George Finney</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/zero-trust-isn-t-a-tool-%e2%80%94-it-s-everything-with-george-finney/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/zero-trust-isn-t-a-tool-%e2%80%94-it-s-everything-with-george-finney/#comments</comments>        <pubDate>Thu, 05 Jun 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d29a4d88-c55e-3bf5-bb66-2024b2d1ce02</guid>
                                    <description><![CDATA[<p>What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products?</p>
<p>In this episode, George Finney, CISO at the University of Texas System and author of Project Zero Trust, reveals the human-first truth behind the Zero Trust movement, and why it’s not something you buy but something you build. George shares stories from hacking a college database to launching a deepfake of himself trained on his own books, all while breaking down how AI and creativity are reshaping security leadership.</p>
<p> </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
01:16 - Cyber Hall of Fame recognition
07:00 - Hacked his college to solve mail
09:00 - Took startup job without paycheck
14:14 - Zero Trust is a strategy, not tool
17:00 - Tailoring security like a custom suit
23:29 - AI strategy through Zero Trust lens
29:30 - Built a Zero Trust voice clone hotline
36:00 - You don’t need to be a CISO
38:30 - Why weirdos make cybersecurity stronger</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, George Finney: <a href='https://www.linkedin.com/in/georgefinney/'>https://www.linkedin.com/in/georgefinney/</a></p>
<p>Check out George’s books on Amazon: <a href='https://www.amazon.com/stores/author/B01MT0C6X3'>https://www.amazon.com/stores/author/B01MT0C6X3</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if Zero Trust isn’t a framework, but the <em>only</em> viable cybersecurity strategy—more about people than products?</p>
<p>In this episode, George Finney, CISO at the University of Texas System and author of <em>Project Zero Trust</em>, reveals the human-first truth behind the Zero Trust movement, and why it’s not something you buy but something you <em>build</em>. George shares stories from hacking a college database to launching a deepfake of himself trained on his own books, all while breaking down how AI and creativity are reshaping security leadership.</p>
<p> </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
01:16 - Cyber Hall of Fame recognition<br>
07:00 - Hacked his college to solve mail<br>
09:00 - Took startup job without paycheck<br>
14:14 - Zero Trust is a strategy, not tool<br>
17:00 - Tailoring security like a custom suit<br>
23:29 - AI strategy through Zero Trust lens<br>
29:30 - Built a Zero Trust voice clone hotline<br>
36:00 - You don’t need to be a CISO<br>
38:30 - Why weirdos make cybersecurity stronger</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, George Finney: <a href='https://www.linkedin.com/in/georgefinney/'>https://www.linkedin.com/in/georgefinney/</a></p>
<p>Check out George’s books on Amazon: <a href='https://www.amazon.com/stores/author/B01MT0C6X3'>https://www.amazon.com/stores/author/B01MT0C6X3</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6scxrbuvawgkffzy/HVS25_EP379_George_Finney_MP3_HQ_FINAL_01965ac.mp3" length="60332168" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products?
In this episode, George Finney, CISO at the University of Texas System and author of Project Zero Trust, reveals the human-first truth behind the Zero Trust movement, and why it’s not something you buy but something you build. George shares stories from hacking a college database to launching a deepfake of himself trained on his own books, all while breaking down how AI and creativity are reshaping security leadership.
 
 
Impactful Moments:
00:00 - Introduction01:16 - Cyber Hall of Fame recognition07:00 - Hacked his college to solve mail09:00 - Took startup job without paycheck14:14 - Zero Trust is a strategy, not tool17:00 - Tailoring security like a custom suit23:29 - AI strategy through Zero Trust lens29:30 - Built a Zero Trust voice clone hotline36:00 - You don’t need to be a CISO38:30 - Why weirdos make cybersecurity stronger

Links:
Connect with our guest, George Finney: https://www.linkedin.com/in/georgefinney/
Check out George’s books on Amazon: https://www.amazon.com/stores/author/B01MT0C6X3
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2415</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>379</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Your Two-Year Edge Starts Now with Marco Figueroa</title>
        <itunes:title>Your Two-Year Edge Starts Now with Marco Figueroa</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/your-two-year-edge-starts-now-with-marco-figueroa/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/your-two-year-edge-starts-now-with-marco-figueroa/#comments</comments>        <pubDate>Thu, 29 May 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5a3a1c91-9c5e-3d34-a8ee-46d6efca748b</guid>
                                    <description><![CDATA[<p>You won’t be replaced by AI—you’ll be replaced by someone using it better.</p>
<p>Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a tactical update from someone tracking every release, every benchmark battle, and every edge worth chasing.</p>
<p>In this episode, Ron is joined by Marco as he breaks down the rapid evolution of AI agents—from Claude Code to Codex to Google Flow. He explains why general-purpose models are leveling off, how specialized tools are reshaping the landscape, and why creativity is now your most valuable edge. Whether you're in code, ops, or content, your two-year advantage starts right here.</p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction
01:08 - AI agents are no longer hype
03:45 - Major LLM releases and what's next
05:32 - The Grok delay and pricing drama
07:30 - Why general models are losing steam
10:50 - Benchmark manipulation and model specialization
14:15 - The future belongs to creatives
22:05 - The next AI drops to watch

</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>You won’t be replaced by AI—you’ll be replaced by someone using it better.</p>
<p>Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a tactical update from someone tracking every release, every benchmark battle, and every edge worth chasing.</p>
<p>In this episode, Ron is joined by Marco as he breaks down the rapid evolution of AI agents—from Claude Code to Codex to Google Flow. He explains why general-purpose models are leveling off, how specialized tools are reshaping the landscape, and why creativity is now your most valuable edge. Whether you're in code, ops, or content, your two-year advantage starts right here.</p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction<br>
01:08 - AI agents are no longer hype<br>
03:45 - Major LLM releases and what's next<br>
05:32 - The Grok delay and pricing drama<br>
07:30 - Why general models are losing steam<br>
10:50 - Benchmark manipulation and model specialization<br>
14:15 - The future belongs to creatives<br>
22:05 - The next AI drops to watch<br>
<br>
</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ib77ksxxgujhefs5/HVS25_EP378_HQ_FINAL.mp3" length="52661952" type="audio/mpeg"/>
        <itunes:summary><![CDATA[You won’t be replaced by AI—you’ll be replaced by someone using it better.
Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a tactical update from someone tracking every release, every benchmark battle, and every edge worth chasing.
In this episode, Ron is joined by Marco as he breaks down the rapid evolution of AI agents—from Claude Code to Codex to Google Flow. He explains why general-purpose models are leveling off, how specialized tools are reshaping the landscape, and why creativity is now your most valuable edge. Whether you're in code, ops, or content, your two-year advantage starts right here.
 
Impactful Moments
00:00 - Introduction01:08 - AI agents are no longer hype03:45 - Major LLM releases and what's next05:32 - The Grok delay and pricing drama07:30 - Why general models are losing steam10:50 - Benchmark manipulation and model specialization14:15 - The future belongs to creatives22:05 - The next AI drops to watch
 
Links:
Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2194</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>378</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Badge Cloning, Alarm Triggers &amp; Getting Hired to Hack with Greg Hatcher &amp; John Stigerwalt</title>
        <itunes:title>Badge Cloning, Alarm Triggers &amp; Getting Hired to Hack with Greg Hatcher &amp; John Stigerwalt</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/badge-cloning-alarm-triggers-getting-hired-to-hack-with-greg-hatcher-john-stigerwalt/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/badge-cloning-alarm-triggers-getting-hired-to-hack-with-greg-hatcher-john-stigerwalt/#comments</comments>        <pubDate>Thu, 22 May 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3603d86c-41b5-3217-ad44-c12ed2d8002b</guid>
                                    <description><![CDATA[<p>Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs.</p>
<p>In this episode, Ron talks with Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, a boutique offensive security firm built on real-world action. They share high-stakes red team operations—like triggering alarms and dodging police during a break-in—and explain why most companies are wide open to physical and insider threats. This isn’t a theory. It’s what’s happening right now, and it’s being executed with precision and purpose.</p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction
</p>
<p>02:13 - Origin story of White Knight Labs
</p>
<p>08:56 - Why physical red teaming is broken
</p>
<p>12:20 - Breaking into a lottery facility
</p>
<p>16:00 - Hiding from police mid-engagement
</p>
<p>22:30 - Getting hired to breach from inside
</p>
<p>25:45 - Hijacking code from offshore devs
</p>
<p>33:29 - Real difference: red team vs pen test
</p>
<p>35:00 - Get in touch with WKL
</p>
<p> </p>
Links
<p>Connect with our guests! 
Greg Hatcher: <a href='https://www.linkedin.com/in/gregoryhatcher2/'>https://www.linkedin.com/in/gregoryhatcher2/
</a>John Stigerwalt: <a href='https://www.linkedin.com/in/john-stigerwalt-90a9b4110/'>https://www.linkedin.com/in/john-stigerwalt-90a9b4110/</a></p>
<p>Learn more about White Knight Labs: <a href='https://www.whiteknightlabs.com'>https://www.whiteknightlabs.com</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs.</p>
<p>In this episode, Ron talks with Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, a boutique offensive security firm built on real-world action. They share high-stakes red team operations—like triggering alarms and dodging police during a break-in—and explain why most companies are wide open to physical and insider threats. This isn’t a theory. It’s what’s happening right now, and it’s being executed with precision and purpose.</p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction<br>
</p>
<p>02:13 - Origin story of White Knight Labs<br>
</p>
<p>08:56 - Why physical red teaming is broken<br>
</p>
<p>12:20 - Breaking into a lottery facility<br>
</p>
<p>16:00 - Hiding from police mid-engagement<br>
</p>
<p>22:30 - Getting hired to breach from inside<br>
</p>
<p>25:45 - Hijacking code from offshore devs<br>
</p>
<p>33:29 - Real difference: red team vs pen test<br>
</p>
<p>35:00 - Get in touch with WKL<br>
</p>
<p> </p>
Links
<p>Connect with our guests! <br>
Greg Hatcher: <a href='https://www.linkedin.com/in/gregoryhatcher2/'>https://www.linkedin.com/in/gregoryhatcher2/<br>
</a>John Stigerwalt: <a href='https://www.linkedin.com/in/john-stigerwalt-90a9b4110/'>https://www.linkedin.com/in/john-stigerwalt-90a9b4110/</a></p>
<p>Learn more about White Knight Labs: <a href='https://www.whiteknightlabs.com'>https://www.whiteknightlabs.com</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/869jt5zziuivbimx/HVS25_EP377_WKL_FINAL_01.mp3" length="57124776" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs.
In this episode, Ron talks with Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, a boutique offensive security firm built on real-world action. They share high-stakes red team operations—like triggering alarms and dodging police during a break-in—and explain why most companies are wide open to physical and insider threats. This isn’t a theory. It’s what’s happening right now, and it’s being executed with precision and purpose.
 
Impactful Moments
00:00 - Introduction
02:13 - Origin story of White Knight Labs
08:56 - Why physical red teaming is broken
12:20 - Breaking into a lottery facility
16:00 - Hiding from police mid-engagement
22:30 - Getting hired to breach from inside
25:45 - Hijacking code from offshore devs
33:29 - Real difference: red team vs pen test
35:00 - Get in touch with WKL
 
Links
Connect with our guests! Greg Hatcher: https://www.linkedin.com/in/gregoryhatcher2/John Stigerwalt: https://www.linkedin.com/in/john-stigerwalt-90a9b4110/
Learn more about White Knight Labs: https://www.whiteknightlabs.com
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2251</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>377</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Building Cyber Resilience Through Culture with David Shipley</title>
        <itunes:title>Building Cyber Resilience Through Culture with David Shipley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/building-cyber-resilience-through-culture-with-david-shipley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/building-cyber-resilience-through-culture-with-david-shipley/#comments</comments>        <pubDate>Thu, 15 May 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fd3f0f8d-587e-3f0e-833c-03e103b912b6</guid>
                                    <description><![CDATA[<p>What if fixing cybersecurity wasn’t about more tools, but about unlocking human potential? </p>
<p>In this episode, Ron Eddings welcomes back David Shipley, CEO and Field CSO of Beauceron Security, for a conversation on the real force behind security resilience: people. Together they expose the failure of "reactive" cybersecurity strategies, drawing parallels with preventative healthcare — and explain why culture, psychological safety, and behavior change are the true secret weapons. </p>
Impactful Moments:
<p>00:00 - Introduction
</p>
<p>01:36 - The true meaning of "people in cyber"
</p>
<p>03:13 - Cybersecurity’s flawed healthcare analogy
</p>
<p>07:31 - Nutrition for cyber: proactive strategies
</p>
<p>10:00 - MSPs: why selling tools isn’t enough
</p>
<p>16:22 - Measuring culture, not just clicks
</p>
<p>19:12 - Why people really click phishing emails
</p>
<p>23:59 - Building psychological safety in security
</p>
<p>30:30 - Celebrating human wins in security
</p>
<p>34:00 - The future: empathy, transparency, trust</p>
<p>




</p>
<p>Links:</p>
<p>Connect with our guest, David Shipley: <a href='https://www.linkedin.com/in/dbshipley/'>https://www.linkedin.com/in/dbshipley/</a></p>
<p>Learn more about Beauceron Security here:<a href='https://www.breachlock.com/'> </a><a href='http://www.beauceronsecurity.com/partner'>https:///www.beauceronsecurity.com/partner</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if fixing cybersecurity wasn’t about more tools, but about unlocking human potential? </p>
<p>In this episode, Ron Eddings welcomes back David Shipley, CEO and Field CSO of Beauceron Security, for a conversation on the real force behind security resilience: people. Together they expose the failure of "reactive" cybersecurity strategies, drawing parallels with preventative healthcare — and explain why culture, psychological safety, and behavior change are the true secret weapons. </p>
Impactful Moments:
<p>00:00 - Introduction<br>
</p>
<p>01:36 - The true meaning of "people in cyber"<br>
</p>
<p>03:13 - Cybersecurity’s flawed healthcare analogy<br>
</p>
<p>07:31 - Nutrition for cyber: proactive strategies<br>
</p>
<p>10:00 - MSPs: why selling tools isn’t enough<br>
</p>
<p>16:22 - Measuring culture, not just clicks<br>
</p>
<p>19:12 - Why people really click phishing emails<br>
</p>
<p>23:59 - Building psychological safety in security<br>
</p>
<p>30:30 - Celebrating human wins in security<br>
</p>
<p>34:00 - The future: empathy, transparency, trust</p>
<p><br>
<br>
<br>
<br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, David Shipley: <a href='https://www.linkedin.com/in/dbshipley/'>https://www.linkedin.com/in/dbshipley/</a></p>
<p>Learn more about Beauceron Security here:<a href='https://www.breachlock.com/'> </a><a href='http://www.beauceronsecurity.com/partner'>https:///www.beauceronsecurity.com/partner</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/35m87s39b62efdxe/HVS25_EP376_Beauceron2_FINAL.mp3" length="66188719" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if fixing cybersecurity wasn’t about more tools, but about unlocking human potential? 
In this episode, Ron Eddings welcomes back David Shipley, CEO and Field CSO of Beauceron Security, for a conversation on the real force behind security resilience: people. Together they expose the failure of "reactive" cybersecurity strategies, drawing parallels with preventative healthcare — and explain why culture, psychological safety, and behavior change are the true secret weapons. 
Impactful Moments:
00:00 - Introduction
01:36 - The true meaning of "people in cyber"
03:13 - Cybersecurity’s flawed healthcare analogy
07:31 - Nutrition for cyber: proactive strategies
10:00 - MSPs: why selling tools isn’t enough
16:22 - Measuring culture, not just clicks
19:12 - Why people really click phishing emails
23:59 - Building psychological safety in security
30:30 - Celebrating human wins in security
34:00 - The future: empathy, transparency, trust

Links:
Connect with our guest, David Shipley: https://www.linkedin.com/in/dbshipley/
Learn more about Beauceron Security here: https:///www.beauceronsecurity.com/partner

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2670</itunes:duration>
                <itunes:episode>376</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Ditch the Spreadsheets: Smarter Crypto Security with Michael Klieman</title>
        <itunes:title>Ditch the Spreadsheets: Smarter Crypto Security with Michael Klieman</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ditch-the-spreadsheets-smarter-crypto-security-with-michael-klieman/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ditch-the-spreadsheets-smarter-crypto-security-with-michael-klieman/#comments</comments>        <pubDate>Thu, 08 May 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/591a13b2-5a4c-325b-9c48-a26a244d9c3f</guid>
                                    <description><![CDATA[<p>Still tracking certificates in a spreadsheet? You’re not alone—and there’s a better way.</p>
<p>In this special episode from RSA 2025, Ron sits down with Michael Klieman, Global Vice President of Product Management for Digital Security Solutions at Entrust, to discuss how leading organizations are rethinking cryptographic security. From simplifying certificate management to preparing for a post-quantum future, this conversation covers real-world risks, surprising breach stories, and practical steps for bringing order to crypto chaos—without the stress.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction
04:00 – Three major problems with crypto today
06:45 – Certificates often missing from inventories
08:30 – Managing EV charging infrastructure with spreadsheets
11:00 – The two biggest certificate-related risks
12:50 – Expired certs can tank brand trust
14:45 – Automation usually comes after spreadsheets
16:30 – Why quantum risk grows every year
18:15 – Start with a cryptographic inventory
20:30 – Nation-state threats and critical infrastructure
22:15 – AI could fast-track quantum breakthroughs
24:45 – Entrust’s new unified crypto security platform
26:35 – One question every CISO must answer in 2025</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Michael Klieman: <a href='https://www.linkedin.com/in/mklieman/'>https://www.linkedin.com/in/mklieman/</a></p>
<p>Learn more about Entrust at: <a href='https://www.hackervalley.com/entrust'>https://www.hackervalley.com/entrust</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Still tracking certificates in a spreadsheet? You’re not alone—and there’s a better way.</p>
<p>In this special episode from RSA 2025, Ron sits down with Michael Klieman, Global Vice President of Product Management for Digital Security Solutions at Entrust, to discuss how leading organizations are rethinking cryptographic security. From simplifying certificate management to preparing for a post-quantum future, this conversation covers real-world risks, surprising breach stories, and practical steps for bringing order to crypto chaos—without the stress.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction<br>
04:00 – Three major problems with crypto today<br>
06:45 – Certificates often missing from inventories<br>
08:30 – Managing EV charging infrastructure with spreadsheets<br>
11:00 – The two biggest certificate-related risks<br>
12:50 – Expired certs can tank brand trust<br>
14:45 – Automation usually comes <em>after</em> spreadsheets<br>
16:30 – Why quantum risk grows every year<br>
18:15 – Start with a cryptographic inventory<br>
20:30 – Nation-state threats and critical infrastructure<br>
22:15 – AI could fast-track quantum breakthroughs<br>
24:45 – Entrust’s new unified crypto security platform<br>
26:35 – One question every CISO must answer in 2025</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Michael Klieman: <a href='https://www.linkedin.com/in/mklieman/'>https://www.linkedin.com/in/mklieman/</a></p>
<p>Learn more about Entrust at: <a href='https://www.hackervalley.com/entrust'>https://www.hackervalley.com/entrust</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wmgt8wx9hkt3gjqq/HVS25_EP375_Audio.mp3" length="43754737" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Still tracking certificates in a spreadsheet? You’re not alone—and there’s a better way.
In this special episode from RSA 2025, Ron sits down with Michael Klieman, Global Vice President of Product Management for Digital Security Solutions at Entrust, to discuss how leading organizations are rethinking cryptographic security. From simplifying certificate management to preparing for a post-quantum future, this conversation covers real-world risks, surprising breach stories, and practical steps for bringing order to crypto chaos—without the stress.
 
Impactful Moments:
00:00 – Introduction04:00 – Three major problems with crypto today06:45 – Certificates often missing from inventories08:30 – Managing EV charging infrastructure with spreadsheets11:00 – The two biggest certificate-related risks12:50 – Expired certs can tank brand trust14:45 – Automation usually comes after spreadsheets16:30 – Why quantum risk grows every year18:15 – Start with a cryptographic inventory20:30 – Nation-state threats and critical infrastructure22:15 – AI could fast-track quantum breakthroughs24:45 – Entrust’s new unified crypto security platform26:35 – One question every CISO must answer in 2025
 
Links:
Connect with our guest, Michael Klieman: https://www.linkedin.com/in/mklieman/
Learn more about Entrust at: https://www.hackervalley.com/entrust
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1788</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>375</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Protecting People, Not Just Perimeters with Andrey Suzdaltsev</title>
        <itunes:title>Protecting People, Not Just Perimeters with Andrey Suzdaltsev</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/protecting-people-not-just-perimeters-with-andrey-suzdaltsev/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/protecting-people-not-just-perimeters-with-andrey-suzdaltsev/#comments</comments>        <pubDate>Thu, 24 Apr 2025 06:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f3c85620-6617-33fa-9fc4-28c357e43cb9</guid>
                                    <description><![CDATA[<p>
AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter.</p>
<p>In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric protection. From offensive AI simulations to family-inclusive cyber safety, Andrey shares how his team secures both professional and personal perimeters before cybercriminals can strike.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 Cyber criminals get a theatrical glow-up</p>
<p>01:47 AI models + personal data = mass fraud</p>
<p>03:42 Brightside’s 3-part solution explained</p>
<p>07:32 Why security must get personal</p>
<p>11:16 Ron’s reaction to Brightside’s realism</p>
<p>13:16 AI research tools now used by hackers</p>
<p>19:33 Why deepfake detection may fail</p>
<p>15:16 Automating attacks with AI agents</p>
<p>37:34 Protecting families = smarter security</p>
<p>41:56 Brightside’s vision for defending human risk</p>
<p> </p>
<p>Links</p>
<p>Connect with our guest, Andrey Suzdaltsev: <a href='https://www.linkedin.com/in/ndrey/'>https://www.linkedin.com/in/ndrey</a></p>
<p>Learn more about Brightside: <a href='https://www.brside.com/'>www.brside.com</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p><br>
AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter.</p>
<p>In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric protection. From offensive AI simulations to family-inclusive cyber safety, Andrey shares how his team secures both professional and personal perimeters before cybercriminals can strike.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 Cyber criminals get a theatrical glow-up</p>
<p>01:47 AI models + personal data = mass fraud</p>
<p>03:42 Brightside’s 3-part solution explained</p>
<p>07:32 Why security must get personal</p>
<p>11:16 Ron’s reaction to Brightside’s realism</p>
<p>13:16 AI research tools now used by hackers</p>
<p>19:33 Why deepfake detection may fail</p>
<p>15:16 Automating attacks with AI agents</p>
<p>37:34 Protecting families = smarter security</p>
<p>41:56 Brightside’s vision for defending human risk</p>
<p> </p>
<p>Links</p>
<p>Connect with our guest, Andrey Suzdaltsev: <a href='https://www.linkedin.com/in/ndrey/'>https://www.linkedin.com/in/ndrey</a></p>
<p>Learn more about Brightside: <a href='https://www.brside.com/'>www.brside.com</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/avkcgrmxctvwyjru/HVS25_EP374_Brightside_MP3.mp3" length="54067656" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter.
In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric protection. From offensive AI simulations to family-inclusive cyber safety, Andrey shares how his team secures both professional and personal perimeters before cybercriminals can strike.
 
Impactful Moments
00:00 Cyber criminals get a theatrical glow-up
01:47 AI models + personal data = mass fraud
03:42 Brightside’s 3-part solution explained
07:32 Why security must get personal
11:16 Ron’s reaction to Brightside’s realism
13:16 AI research tools now used by hackers
19:33 Why deepfake detection may fail
15:16 Automating attacks with AI agents
37:34 Protecting families = smarter security
41:56 Brightside’s vision for defending human risk
 
Links
Connect with our guest, Andrey Suzdaltsev: https://www.linkedin.com/in/ndrey
Learn more about Brightside: www.brside.com
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2721</itunes:duration>
                <itunes:episode>374</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Digital Clutter and the Death of Passwords with Collin Sweeney &amp; Chase Cunningham</title>
        <itunes:title>Digital Clutter and the Death of Passwords with Collin Sweeney &amp; Chase Cunningham</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/digital-clutter-and-the-death-of-passwords-with-collin-sweeney-chase-cunningham/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/digital-clutter-and-the-death-of-passwords-with-collin-sweeney-chase-cunningham/#comments</comments>        <pubDate>Thu, 10 Apr 2025 16:21:49 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3f9217fd-8389-3aba-8ab0-99616e62493d</guid>
                                    <description><![CDATA[<p>Passwords are the original digital clutter—messy, overstuffed, and way too easy to forget. Like a junk drawer full of old keys and cables, we keep tossing more into them, hoping they’ll somehow keep working. But what if it’s time to throw the whole thing out?</p>
<p>In this episode, Ron Eddings is joined by Collin Sweeney of ZKX Solutions and Dr. Chase Cunningham, a.k.a. “Dr. Zero Trust,” for a bold conversation on the future of authentication. From the failures of MFA to the promise of zero-knowledge proofs, the crew breaks down how we got stuck with broken access systems—and what it’ll take to finally fix them. Whether it’s SIM swapping, face IDs, or security keys on the battlefield, this is the real talk on identity security you don’t want to miss.</p>
Impactful Moments:
<p>00:00 – Introduction
03:45 – ZKX’s origin: voice verification breakthrough
06:45 – Collin’s “oh crap” SolarWinds realization
09:15 – Why MFA still fails in practice
13:15 – Zero-knowledge proofs explained with a coin
15:30 – How ZKPs reduce identity attack surfaces
17:45 – Making MFA faster, smarter, more human
20:00 – MFA fatigue and ice skating uphill
24:00 – Why people still cling to passwords
30:54 – Quantum fears vs real-world encryption limits</p>
<p>

</p>
<p>Links:</p>
<p>Connect with Collin Sweeney: <a href='https://www.linkedin.com/in/collin-sweeney-6ab6a5176/'>https://www.linkedin.com/in/collin-sweeney-6ab6a5176/</a></p>
<p>Check out ZKX Solutions new product, Helix:</p>
<p><a href='https://zkxsolutions.com/helix'>zkxsolutions.com/helix</a></p>
<p>Connect with Chase Cunningham: <a href='https://www.linkedin.com/in/dr-chase-cunningham/'>https://www.linkedin.com/in/dr-chase-cunningham/</a></p>
<p>Grab a copy of Chase Cunningham's book “vArIable: A Novel in the gAbrIel Series” here: <a href='https://www.amazon.com/vArIable-gAbrIel-Dr-Chase-Cunningham-ebook/dp/B0DVMWCWCD?ref_=ast_author_mpb'>www.amazon.com/vArIable-gAbrIel-Dr-Chase-Cunningham-ebook/dp/B0DVMWCWCD?ref_=ast_author_mp</a></p>
<p> </p>
<p> </p>
<p>Check out Hacker Valley’s upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>B</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Passwords are the original digital clutter—messy, overstuffed, and way too easy to forget. Like a junk drawer full of old keys and cables, we keep tossing more into them, hoping they’ll somehow keep working. But what if it’s time to throw the whole thing out?</p>
<p>In this episode, Ron Eddings is joined by Collin Sweeney of ZKX Solutions and Dr. Chase Cunningham, a.k.a. “Dr. Zero Trust,” for a bold conversation on the future of authentication. From the failures of MFA to the promise of zero-knowledge proofs, the crew breaks down how we got stuck with broken access systems—and what it’ll take to finally fix them. Whether it’s SIM swapping, face IDs, or security keys on the battlefield, this is the real talk on identity security you don’t want to miss.</p>
Impactful Moments:
<p>00:00 – Introduction<br>
03:45 – ZKX’s origin: voice verification breakthrough<br>
06:45 – Collin’s “oh crap” SolarWinds realization<br>
09:15 – Why MFA still fails in practice<br>
13:15 – Zero-knowledge proofs explained with a coin<br>
15:30 – How ZKPs reduce identity attack surfaces<br>
17:45 – Making MFA faster, smarter, more human<br>
20:00 – MFA fatigue and ice skating uphill<br>
24:00 – Why people still cling to passwords<br>
30:54 – Quantum fears vs real-world encryption limits</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with Collin Sweeney: <a href='https://www.linkedin.com/in/collin-sweeney-6ab6a5176/'>https://www.linkedin.com/in/collin-sweeney-6ab6a5176/</a></p>
<p>Check out ZKX Solutions new product, Helix:</p>
<p><a href='https://zkxsolutions.com/helix'>zkxsolutions.com/helix</a></p>
<p>Connect with Chase Cunningham: <a href='https://www.linkedin.com/in/dr-chase-cunningham/'>https://www.linkedin.com/in/dr-chase-cunningham/</a></p>
<p>Grab a copy of Chase Cunningham's book “vArIable: A Novel in the gAbrIel Series” here: <a href='https://www.amazon.com/vArIable-gAbrIel-Dr-Chase-Cunningham-ebook/dp/B0DVMWCWCD?ref_=ast_author_mpb'>www.amazon.com/vArIable-gAbrIel-Dr-Chase-Cunningham-ebook/dp/B0DVMWCWCD?ref_=ast_author_mp</a></p>
<p> </p>
<p> </p>
<p>Check out Hacker Valley’s upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>B</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bpsaesasd2txfude/HVS25_EP373_REDCOM_FINAL.mp3" length="67156506" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Passwords are the original digital clutter—messy, overstuffed, and way too easy to forget. Like a junk drawer full of old keys and cables, we keep tossing more into them, hoping they’ll somehow keep working. But what if it’s time to throw the whole thing out?
In this episode, Ron Eddings is joined by Collin Sweeney of ZKX Solutions and Dr. Chase Cunningham, a.k.a. “Dr. Zero Trust,” for a bold conversation on the future of authentication. From the failures of MFA to the promise of zero-knowledge proofs, the crew breaks down how we got stuck with broken access systems—and what it’ll take to finally fix them. Whether it’s SIM swapping, face IDs, or security keys on the battlefield, this is the real talk on identity security you don’t want to miss.
Impactful Moments:
00:00 – Introduction03:45 – ZKX’s origin: voice verification breakthrough06:45 – Collin’s “oh crap” SolarWinds realization09:15 – Why MFA still fails in practice13:15 – Zero-knowledge proofs explained with a coin15:30 – How ZKPs reduce identity attack surfaces17:45 – Making MFA faster, smarter, more human20:00 – MFA fatigue and ice skating uphill24:00 – Why people still cling to passwords30:54 – Quantum fears vs real-world encryption limits

Links:
Connect with Collin Sweeney: https://www.linkedin.com/in/collin-sweeney-6ab6a5176/
Check out ZKX Solutions new product, Helix:
zkxsolutions.com/helix
Connect with Chase Cunningham: https://www.linkedin.com/in/dr-chase-cunningham/
Grab a copy of Chase Cunningham's book “vArIable: A Novel in the gAbrIel Series” here: www.amazon.com/vArIable-gAbrIel-Dr-Chase-Cunningham-ebook/dp/B0DVMWCWCD?ref_=ast_author_mp
 
 
Check out Hacker Valley’s upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
B]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2606</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>373</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What Most Cybersecurity Advice Misses—And How to Fix It with Robert Hansen</title>
        <itunes:title>What Most Cybersecurity Advice Misses—And How to Fix It with Robert Hansen</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-most-cybersecurity-advice-misses%e2%80%94and-how-to-fix-it-with-robert-hansen/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-most-cybersecurity-advice-misses%e2%80%94and-how-to-fix-it-with-robert-hansen/#comments</comments>        <pubDate>Thu, 03 Apr 2025 13:53:24 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/645581c3-ac87-37ae-aaad-76c8574363d6</guid>
                                    <description><![CDATA[<p>What if the biggest threat to cybersecurity isn’t attackers—but the defenders themselves? Why are we still building tools for experts in a world where technical skills are fading fast?</p>
<p>In this episode, Ron Eddings sits down with legendary hacker and investor Robert Hansen (aka RSnake) to talk about startup strategy, LLM-powered workflows, and the uncomfortable truth about skill decline in security teams. You’ll hear how he built an AI-powered threat intel engine, why most cybersecurity advice is outdated, and his hard-earned wisdom on surviving—and thriving—in a landscape built to break you.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
01:30 - Meeting RSnake at Hacker Hoedown
04:50 - AI-powered newsletter curation
08:15 - Ranking news by global impact
13:00 - Keeping LLM costs under 25 cents/day
16:10 - Paths to revenue for cybersecurity pros
24:00 - Why venture capital often kills innovation
33:20 - Cloud migration and the crocodile problem
37:00 - Decline in practitioner technical skill
40:00 - Designing tools for non-experts</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Robert “RSnake” Hansen: <a href='https://www.linkedin.com/in/roberthansen3/'>https://www.linkedin.com/in/roberthansen3/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if the biggest threat to cybersecurity isn’t attackers—but the defenders themselves? Why are we still building tools for experts in a world where technical skills are fading fast?</p>
<p>In this episode, Ron Eddings sits down with legendary hacker and investor Robert Hansen (aka RSnake) to talk about startup strategy, LLM-powered workflows, and the uncomfortable truth about skill decline in security teams. You’ll hear how he built an AI-powered threat intel engine, why most cybersecurity advice is outdated, and his hard-earned wisdom on surviving—and thriving—in a landscape built to break you.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
01:30 - Meeting RSnake at Hacker Hoedown<br>
04:50 - AI-powered newsletter curation<br>
08:15 - Ranking news by global impact<br>
13:00 - Keeping LLM costs under 25 cents/day<br>
16:10 - Paths to revenue for cybersecurity pros<br>
24:00 - Why venture capital often kills innovation<br>
33:20 - Cloud migration and the crocodile problem<br>
37:00 - Decline in practitioner technical skill<br>
40:00 - Designing tools for non-experts</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Robert “RSnake” Hansen: <a href='https://www.linkedin.com/in/roberthansen3/'>https://www.linkedin.com/in/roberthansen3/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/b3am5wt3xa4ikix7/HVS25_EP372_FINAL.mp3" length="868097" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if the biggest threat to cybersecurity isn’t attackers—but the defenders themselves? Why are we still building tools for experts in a world where technical skills are fading fast?
In this episode, Ron Eddings sits down with legendary hacker and investor Robert Hansen (aka RSnake) to talk about startup strategy, LLM-powered workflows, and the uncomfortable truth about skill decline in security teams. You’ll hear how he built an AI-powered threat intel engine, why most cybersecurity advice is outdated, and his hard-earned wisdom on surviving—and thriving—in a landscape built to break you.
 
Impactful Moments:
00:00 - Introduction01:30 - Meeting RSnake at Hacker Hoedown04:50 - AI-powered newsletter curation08:15 - Ranking news by global impact13:00 - Keeping LLM costs under 25 cents/day16:10 - Paths to revenue for cybersecurity pros24:00 - Why venture capital often kills innovation33:20 - Cloud migration and the crocodile problem37:00 - Decline in practitioner technical skill40:00 - Designing tools for non-experts

Links:
Connect with our guest, Robert “RSnake” Hansen: https://www.linkedin.com/in/roberthansen3/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>36</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>372</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hackers Have HR Now? featuring Christopher Budd</title>
        <itunes:title>Hackers Have HR Now? featuring Christopher Budd</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hackers-have-hr-now-featuring-christopher-budd/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hackers-have-hr-now-featuring-christopher-budd/#comments</comments>        <pubDate>Thu, 27 Mar 2025 14:13:26 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ec324c50-dd30-3fda-b01a-5c2ccb89cc9a</guid>
                                    <description><![CDATA[<p>The internet once came this close to crashing—and Microsoft was on the front line.</p>
<p>In this episode, cybersecurity veteran Christopher Budd takes us inside the Microsoft Security Response Center during one of the most chaotic cyber events in modern history. From the Nimda worm of 2001 to ransomware turf wars, and the weird future where threat actors post job ads for ransom note writers, Christopher lays it all out with perspective only decades in the game can bring. If you think AI or ransomware is the endgame, you’re not seeing the whole board.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
04:35 - Breaking down the Nimda attack
07:00 - “We carried 90% of the internet”
10:37 - Ransomware gangs fighting for headlines
15:26 - Secure perimeter is officially dead
17:31 - AI as your cybernetic exosuit
24:00 - Filtering 100,000 security emails with AI
27:05 - Privacy tension in AI-powered defense
32:00 - The inevitable swing back to local control
35:31 - “You will”: when sci-fi became real
</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Christopher Budd: <a href='https://www.linkedin.com/in/christopherbudd/'>https://www.linkedin.com/in/christopherbudd/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The internet once came <em>this close</em> to crashing—and Microsoft was on the front line.</p>
<p>In this episode, cybersecurity veteran Christopher Budd takes us inside the Microsoft Security Response Center during one of the most chaotic cyber events in modern history. From the Nimda worm of 2001 to ransomware turf wars, and the weird future where threat actors post job ads for ransom note writers, Christopher lays it all out with perspective only decades in the game can bring. If you think AI or ransomware is the endgame, you’re not seeing the whole board.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
04:35 - Breaking down the Nimda attack<br>
07:00 - “We carried 90% of the internet”<br>
10:37 - Ransomware gangs fighting for headlines<br>
15:26 - Secure perimeter is officially dead<br>
17:31 - AI as your cybernetic exosuit<br>
24:00 - Filtering 100,000 security emails with AI<br>
27:05 - Privacy tension in AI-powered defense<br>
32:00 - The inevitable swing back to local control<br>
35:31 - “You will”: when sci-fi became real<br>
</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Christopher Budd: <a href='https://www.linkedin.com/in/christopherbudd/'>https://www.linkedin.com/in/christopherbudd/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xphjmwt9qppigb6w/HVS25_Ep371_Final.mp3" length="55816805" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The internet once came this close to crashing—and Microsoft was on the front line.
In this episode, cybersecurity veteran Christopher Budd takes us inside the Microsoft Security Response Center during one of the most chaotic cyber events in modern history. From the Nimda worm of 2001 to ransomware turf wars, and the weird future where threat actors post job ads for ransom note writers, Christopher lays it all out with perspective only decades in the game can bring. If you think AI or ransomware is the endgame, you’re not seeing the whole board.
 
Impactful Moments:
00:00 - Introduction04:35 - Breaking down the Nimda attack07:00 - “We carried 90% of the internet”10:37 - Ransomware gangs fighting for headlines15:26 - Secure perimeter is officially dead17:31 - AI as your cybernetic exosuit24:00 - Filtering 100,000 security emails with AI27:05 - Privacy tension in AI-powered defense32:00 - The inevitable swing back to local control35:31 - “You will”: when sci-fi became real
 
Links:
Connect with our guest, Christopher Budd: https://www.linkedin.com/in/christopherbudd/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2219</itunes:duration>
                <itunes:episode>371</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Staying Ahead in the Age of AI Agents with Marco Figueroa</title>
        <itunes:title>Staying Ahead in the Age of AI Agents with Marco Figueroa</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ai-is-outpacing-security%e2%80%94here-s-how-to-stay-ahead-with-marco-figueroa/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ai-is-outpacing-security%e2%80%94here-s-how-to-stay-ahead-with-marco-figueroa/#comments</comments>        <pubDate>Fri, 21 Mar 2025 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6d91ba47-6a7b-342b-8f86-400a1bd9ab7a</guid>
                                    <description><![CDATA[<p>Marco Figueroa is back, and his AI predictions aren’t just coming true—they’re unfolding faster than anyone expected. AI agents aren’t on the horizon—they’re already here, and security teams are scrambling to keep up.</p>
<p>Building on his bold January prediction that 2025 would be the Year of the AI Agent, Marco returns to break down real-world threats, including an insider attack using an infinite logic bomb. From the rise of AI-driven security tools to the biggest risks companies aren’t ready for, this episode is your roadmap to staying ahead in the new AI era.</p>
<p> </p>
Impactful Moments:
<p>00:00 - Introduction
02:00 - Insider threat case: Infinite logic bomb attack
06:00 - Why AI will transform security forever
10:00 - AI agents will replace entire workflows
16:00 - The AI pricing war is heating up
22:00 - How to structure AI-driven security workflows
30:00 - The mind-blowing AI coding method you need
38:00 - The future of AI-assisted cybersecurity teams</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Marco Figueroa is back, and his AI predictions aren’t just coming true—they’re unfolding faster than anyone expected. AI agents aren’t on the horizon—they’re already here, and security teams are scrambling to keep up.</p>
<p>Building on his bold January prediction that 2025 would be the <em>Year of the AI Agent</em>, Marco returns to break down real-world threats, including an insider attack using an infinite logic bomb. From the rise of AI-driven security tools to the biggest risks companies aren’t ready for, this episode is your roadmap to staying ahead in the new AI era.</p>
<p> </p>
Impactful Moments:
<p>00:00 - Introduction<br>
02:00 - Insider threat case: Infinite logic bomb attack<br>
06:00 - Why AI will transform security forever<br>
10:00 - AI agents will replace entire workflows<br>
16:00 - The AI pricing war is heating up<br>
22:00 - How to structure AI-driven security workflows<br>
30:00 - The mind-blowing AI coding method you need<br>
38:00 - The future of AI-assisted cybersecurity teams</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/s6awh3itqr6zf8q4/HVS25_Ep370_FINAL.mp3" length="60709863" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Marco Figueroa is back, and his AI predictions aren’t just coming true—they’re unfolding faster than anyone expected. AI agents aren’t on the horizon—they’re already here, and security teams are scrambling to keep up.
Building on his bold January prediction that 2025 would be the Year of the AI Agent, Marco returns to break down real-world threats, including an insider attack using an infinite logic bomb. From the rise of AI-driven security tools to the biggest risks companies aren’t ready for, this episode is your roadmap to staying ahead in the new AI era.
 
Impactful Moments:
00:00 - Introduction02:00 - Insider threat case: Infinite logic bomb attack06:00 - Why AI will transform security forever10:00 - AI agents will replace entire workflows16:00 - The AI pricing war is heating up22:00 - How to structure AI-driven security workflows30:00 - The mind-blowing AI coding method you need38:00 - The future of AI-assisted cybersecurity teams
 
Links:
Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2457</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>370</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>I Built an AI Version of Myself – Here’s Why with Marcus J. Carey</title>
        <itunes:title>I Built an AI Version of Myself – Here’s Why with Marcus J. Carey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/i-built-an-ai-version-of-myself-%e2%80%93-here-s-why-with-marcus-j-carey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/i-built-an-ai-version-of-myself-%e2%80%93-here-s-why-with-marcus-j-carey/#comments</comments>        <pubDate>Fri, 14 Mar 2025 18:15:07 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fb7b658a-e8df-3141-8518-1d23a902e41c</guid>
                                    <description><![CDATA[<p>The best time to be alive is right now—if you know how to use AI. Marcus J. Carey, Principal Research Scientist at ReliaQuest, is harnessing AI to supercharge creativity, cybersecurity, and career development. In this episode, he shares the workflows he uses that redefine productivity, from dictating books in a week to building a personal AI twin.</p>
<p>In this episode, Ron and Marcus highlight AI’s true power—when used right. They discuss why intuition is the secret ingredient, how AI is reshaping cybersecurity, and why people who master AI will lead the future. Plus, Marcus breaks down how he built his own personal GPT, his approach to learning, and why he sees AI as a tool, not a threat.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
01:18 - Meet Marcus J. Carey
03:00 - Using AI to write a book fast
06:00 - Creating a personal AI twin
09:00 - AI’s impact on cybersecurity defense
15:00 - The power of intuition in AI
22:00 - Why learning fundamentals still matters
30:00 - AI-enhanced workflows for coding
36:00 - The reality of AI "hallucinations"
39:00 - Final thoughts on mastering AI</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Marcus J. Carey: <a href='https://www.linkedin.com/in/marcuscarey/'>https://www.linkedin.com/in/marcuscarey/</a></p>
<p>Grab a copy of Marcus’ book, “Hacker, Inc.: Mindset For Your Career” here: <a href='https://a.co/d/8i7waDc'>https://a.co/d/8i7waDc</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The best time to be alive is right now—if you know how to use AI. Marcus J. Carey, Principal Research Scientist at ReliaQuest, is harnessing AI to supercharge creativity, cybersecurity, and career development. In this episode, he shares the workflows he uses that redefine productivity, from dictating books in a week to building a personal AI twin.</p>
<p>In this episode, Ron and Marcus highlight AI’s true power—when used right. They discuss why intuition is the secret ingredient, how AI is reshaping cybersecurity, and why people who master AI will lead the future. Plus, Marcus breaks down how he built his own personal GPT, his approach to learning, and why he sees AI as a tool, not a threat.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
01:18 - Meet Marcus J. Carey<br>
03:00 - Using AI to write a book fast<br>
06:00 - Creating a personal AI twin<br>
09:00 - AI’s impact on cybersecurity defense<br>
15:00 - The power of intuition in AI<br>
22:00 - Why learning fundamentals still matters<br>
30:00 - AI-enhanced workflows for coding<br>
36:00 - The reality of AI "hallucinations"<br>
39:00 - Final thoughts on mastering AI</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Marcus J. Carey: <a href='https://www.linkedin.com/in/marcuscarey/'>https://www.linkedin.com/in/marcuscarey/</a></p>
<p>Grab a copy of Marcus’ book, “Hacker, Inc.: Mindset For Your Career” here: <a href='https://a.co/d/8i7waDc'>https://a.co/d/8i7waDc</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/whadabji2735x66w/HVS25_Ep369_FINAL.mp3" length="59710036" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The best time to be alive is right now—if you know how to use AI. Marcus J. Carey, Principal Research Scientist at ReliaQuest, is harnessing AI to supercharge creativity, cybersecurity, and career development. In this episode, he shares the workflows he uses that redefine productivity, from dictating books in a week to building a personal AI twin.
In this episode, Ron and Marcus highlight AI’s true power—when used right. They discuss why intuition is the secret ingredient, how AI is reshaping cybersecurity, and why people who master AI will lead the future. Plus, Marcus breaks down how he built his own personal GPT, his approach to learning, and why he sees AI as a tool, not a threat.
 
Impactful Moments:
00:00 - Introduction01:18 - Meet Marcus J. Carey03:00 - Using AI to write a book fast06:00 - Creating a personal AI twin09:00 - AI’s impact on cybersecurity defense15:00 - The power of intuition in AI22:00 - Why learning fundamentals still matters30:00 - AI-enhanced workflows for coding36:00 - The reality of AI "hallucinations"39:00 - Final thoughts on mastering AI

Links:
Connect with our guest, Marcus J. Carey: https://www.linkedin.com/in/marcuscarey/
Grab a copy of Marcus’ book, “Hacker, Inc.: Mindset For Your Career” here: https://a.co/d/8i7waDc
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2388</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>369</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole</title>
        <itunes:title>Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cyber-warfare-digital-deception-and-the-hidden-threats-we-ignore-with-dr-eric-cole/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cyber-warfare-digital-deception-and-the-hidden-threats-we-ignore-with-dr-eric-cole/#comments</comments>        <pubDate>Fri, 07 Mar 2025 19:29:47 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/deac1ac1-e8d9-3a9b-b344-0229b12fae07</guid>
                                    <description><![CDATA[<p>We’re already in World War III—just not the kind you’re thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it’s peacetime?</p>
<p>Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI’s role in our digital future, and why most people are sleepwalking through a war they don’t even realize they’re in. From the rise of deepfakes to North Korea’s billion-dollar hacking economy, this episode is one you can’t afford to ignore.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
02:00 - Dr. Eric Cole’s journey from the CIA to cybersecurity leadership
07:20 - The fundamentals of hacking and why they still matter
11:00 - AI is only as smart as the data we give it
17:00 - The rise of deepfakes and digital deception
19:45 - Cyber warfare: How North Korea funds its economy through hacking
23:50 - The problem with America’s peacetime mentality
30:00 - Should we be worried about AI replacing humans?
36:10 - The key to success: mastering people skills, not just tech skills
40:30 - Final thoughts and where to follow Dr. Eric Cole</p>
<p> </p>
<p>Connect with Dr. Eric Cole on LinkedIn: <a href='https://www.linkedin.com/in/ericcole1/'>https://www.linkedin.com/in/ericcole1/</a></p>
<p>Check out Dr. Eric Cole’s books – </p>
<p>Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: <a href='https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT'>https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT</a></p>
<p>Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet:
<a href='https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT'>https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We’re already in World War III—just not the kind you’re thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it’s peacetime?</p>
<p>Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI’s role in our digital future, and why most people are sleepwalking through a war they don’t even realize they’re in. From the rise of deepfakes to North Korea’s billion-dollar hacking economy, this episode is one you can’t afford to ignore.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
02:00 - Dr. Eric Cole’s journey from the CIA to cybersecurity leadership<br>
07:20 - The fundamentals of hacking and why they still matter<br>
11:00 - AI is only as smart as the data we give it<br>
17:00 - The rise of deepfakes and digital deception<br>
19:45 - Cyber warfare: How North Korea funds its economy through hacking<br>
23:50 - The problem with America’s peacetime mentality<br>
30:00 - Should we be worried about AI replacing humans?<br>
36:10 - The key to success: mastering people skills, not just tech skills<br>
40:30 - Final thoughts and where to follow Dr. Eric Cole</p>
<p> </p>
<p>Connect with Dr. Eric Cole on LinkedIn: <a href='https://www.linkedin.com/in/ericcole1/'>https://www.linkedin.com/in/ericcole1/</a></p>
<p>Check out Dr. Eric Cole’s books – </p>
<p>Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: <a href='https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT'>https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT</a></p>
<p>Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet:<br>
<a href='https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT'>https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jvbt788khwah56kn/HVS25_EP368_EricCole_03.mp3" length="61599867" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We’re already in World War III—just not the kind you’re thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it’s peacetime?
Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI’s role in our digital future, and why most people are sleepwalking through a war they don’t even realize they’re in. From the rise of deepfakes to North Korea’s billion-dollar hacking economy, this episode is one you can’t afford to ignore.
 
Impactful Moments:
00:00 - Introduction02:00 - Dr. Eric Cole’s journey from the CIA to cybersecurity leadership07:20 - The fundamentals of hacking and why they still matter11:00 - AI is only as smart as the data we give it17:00 - The rise of deepfakes and digital deception19:45 - Cyber warfare: How North Korea funds its economy through hacking23:50 - The problem with America’s peacetime mentality30:00 - Should we be worried about AI replacing humans?36:10 - The key to success: mastering people skills, not just tech skills40:30 - Final thoughts and where to follow Dr. Eric Cole
 
Connect with Dr. Eric Cole on LinkedIn: https://www.linkedin.com/in/ericcole1/
Check out Dr. Eric Cole’s books – 
Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT
Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet:https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2505</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>368</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The AI Shift You Can’t Ignore with Marco Figueroa</title>
        <itunes:title>The AI Shift You Can’t Ignore with Marco Figueroa</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-ai-shift-you-can-t-ignore-with-marco-figueroa/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-ai-shift-you-can-t-ignore-with-marco-figueroa/#comments</comments>        <pubDate>Fri, 28 Feb 2025 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b31fcb9d-f016-344a-a14f-d186e3c840e8</guid>
                                    <description><![CDATA[<p>AI isn’t just evolving—it’s sprinting, and cybersecurity needs to keep up. </p>
<p>Ron Eddings is joined again by cybersecurity leader Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, who called it in January: 2025 is the year of AI agents, and the early signs are already here. From Grok 3’s speed advantage to AI-powered red teaming for $25K, this is the reality check security leaders need. No more six-month security projects—it’s all about speed, automation, and staying ahead.</p>
<p> </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:45 - Breaking down Palantir’s stock drop</p>
<p>07:15 - Why Grok 3 is a game-changer</p>
<p>10:24 - The real difference between GPT-4 and Grok</p>
<p>17:25 - AI-powered red teaming for $25K?</p>
<p>22:00 - The death of six-month security projects</p>
<p>26:24 - OpenAI’s Operator: The future or a gimmick?</p>
<p>34:22 - How AI is eliminating busywork</p>
<p>36:55 - Next month’s prediction: Agents building agents</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>


</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>AI isn’t just evolving—it’s sprinting, and cybersecurity needs to keep up. </p>
<p>Ron Eddings is joined again by cybersecurity leader Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, who called it in January: 2025 is the year of AI agents, and the early signs are already here. From Grok 3’s speed advantage to AI-powered red teaming for $25K, this is the reality check security leaders need. No more six-month security projects—it’s all about speed, automation, and staying ahead.</p>
<p> </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:45 - Breaking down Palantir’s stock drop</p>
<p>07:15 - Why Grok 3 is a game-changer</p>
<p>10:24 - The real difference between GPT-4 and Grok</p>
<p>17:25 - AI-powered red teaming for $25K?</p>
<p>22:00 - The death of six-month security projects</p>
<p>26:24 - OpenAI’s Operator: The future or a gimmick?</p>
<p>34:22 - How AI is eliminating busywork</p>
<p>36:55 - Next month’s prediction: Agents building agents</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9pj3twxswtwejspf/HVS25_Ep367_Final_Draft_AUDIO_ONLY_017q0wv.mp3" length="56615367" type="audio/mpeg"/>
        <itunes:summary><![CDATA[AI isn’t just evolving—it’s sprinting, and cybersecurity needs to keep up. 
Ron Eddings is joined again by cybersecurity leader Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, who called it in January: 2025 is the year of AI agents, and the early signs are already here. From Grok 3’s speed advantage to AI-powered red teaming for $25K, this is the reality check security leaders need. No more six-month security projects—it’s all about speed, automation, and staying ahead.
 
 
Impactful Moments:
00:00 - Introduction
01:45 - Breaking down Palantir’s stock drop
07:15 - Why Grok 3 is a game-changer
10:24 - The real difference between GPT-4 and Grok
17:25 - AI-powered red teaming for $25K?
22:00 - The death of six-month security projects
26:24 - OpenAI’s Operator: The future or a gimmick?
34:22 - How AI is eliminating busywork
36:55 - Next month’s prediction: Agents building agents

Links:
Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2255</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>367</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Superhuman Productivity and AI Mastery with Pedram Amini</title>
        <itunes:title>Superhuman Productivity and AI Mastery with Pedram Amini</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/superhuman-productivity-and-ai-mastery-with-pedram-amini/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/superhuman-productivity-and-ai-mastery-with-pedram-amini/#comments</comments>        <pubDate>Fri, 21 Feb 2025 15:26:24 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/365082a8-94ff-379b-ad98-4b73bbbfee13</guid>
                                    <description><![CDATA[<p>What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this episode, we explore the mind-blowing potential of AI and its impact on cybersecurity, productivity, and even legacy.</p>
<p>Pedram Amini, Chief Scientist at OPSWAT, joins Ron Eddings to discuss his journey from bootstrapped startups to AI-driven innovation. Together they cover topics like the role of AI in cybersecurity, the rise of fake identities in hiring, the ethics of AI-generated content, and why mastering AI tools is no longer optional—it's essential. Pedram shares his workflow for superhuman productivity, his thoughts on deepfakes, and how AI is reshaping how we work and communicate.</p>
Impactful Moments:
<p>00:00 - Introduction
02:00 - Meet Pedram Amini, cyber innovator
03:07 - The $17M North Korea insider threat case
06:00 - Fake job candidates and AI hiring scams
09:28 - Deepfakes and AI-driven deception
14:00 - Future of AI-powered personal assistants
20:49 - The reality of bootstrapping vs. VC funding
26:00 - AI in cybersecurity: risk or revolution?
31:00 - “AI isn’t taking your job—someone using AI is”
35:00 - The ultimate AI-powered legacy project</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Pedram Amini: <a href='https://www.linkedin.com/in/pedramamini/'>https://www.linkedin.com/in/pedramamini/</a></p>
<p>Check out the entire article about the $17M North Korea insider threat case here: <a href='https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/'>https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this episode, we explore the mind-blowing potential of AI and its impact on cybersecurity, productivity, and even legacy.</p>
<p>Pedram Amini, Chief Scientist at OPSWAT, joins Ron Eddings to discuss his journey from bootstrapped startups to AI-driven innovation. Together they cover topics like the role of AI in cybersecurity, the rise of fake identities in hiring, the ethics of AI-generated content, and why mastering AI tools is no longer optional—it's essential. Pedram shares his workflow for superhuman productivity, his thoughts on deepfakes, and how AI is reshaping how we work and communicate.</p>
Impactful Moments:
<p>00:00 - Introduction<br>
02:00 - Meet Pedram Amini, cyber innovator<br>
03:07 - The $17M North Korea insider threat case<br>
06:00 - Fake job candidates and AI hiring scams<br>
09:28 - Deepfakes and AI-driven deception<br>
14:00 - Future of AI-powered personal assistants<br>
20:49 - The reality of bootstrapping vs. VC funding<br>
26:00 - AI in cybersecurity: risk or revolution?<br>
31:00 - “AI isn’t taking your job—someone using AI is”<br>
35:00 - The ultimate AI-powered legacy project</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Pedram Amini: <a href='https://www.linkedin.com/in/pedramamini/'>https://www.linkedin.com/in/pedramamini/</a></p>
<p>Check out the entire article about the $17M North Korea insider threat case here: <a href='https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/'>https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zw3ifh5uhwt76sma/HVS25_Ep366_AUDIO.mp3" length="55882644" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if you could have a conversation with yourself—years into the future? Or leave behind an AI-powered avatar that understands your thoughts, philosophies, and even your voice? In this episode, we explore the mind-blowing potential of AI and its impact on cybersecurity, productivity, and even legacy.
Pedram Amini, Chief Scientist at OPSWAT, joins Ron Eddings to discuss his journey from bootstrapped startups to AI-driven innovation. Together they cover topics like the role of AI in cybersecurity, the rise of fake identities in hiring, the ethics of AI-generated content, and why mastering AI tools is no longer optional—it's essential. Pedram shares his workflow for superhuman productivity, his thoughts on deepfakes, and how AI is reshaping how we work and communicate.
Impactful Moments:
00:00 - Introduction02:00 - Meet Pedram Amini, cyber innovator03:07 - The $17M North Korea insider threat case06:00 - Fake job candidates and AI hiring scams09:28 - Deepfakes and AI-driven deception14:00 - Future of AI-powered personal assistants20:49 - The reality of bootstrapping vs. VC funding26:00 - AI in cybersecurity: risk or revolution?31:00 - “AI isn’t taking your job—someone using AI is”35:00 - The ultimate AI-powered legacy project
 
Links:
Connect with our guest, Pedram Amini: https://www.linkedin.com/in/pedramamini/
Check out the entire article about the $17M North Korea insider threat case here: https://www.theregister.com/2025/02/12/arizona_woman_laptop_farm_guilty/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2177</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>366</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cybersecurity Meets AI: The Good, The Bad &amp; The Janky</title>
        <itunes:title>Cybersecurity Meets AI: The Good, The Bad &amp; The Janky</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cybersecurity-meets-ai-the-good-the-bad-the-janky/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cybersecurity-meets-ai-the-good-the-bad-the-janky/#comments</comments>        <pubDate>Thu, 13 Feb 2025 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a46afdd1-12df-3f7a-a9b1-ddde34234478</guid>
                                    <description><![CDATA[<p>There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect.</p>
<p>In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make him a cyber superhero—when they work. From automating security tasks to turbocharging programming workflows, AI is proving its value, but also revealing its limits. Through live walkthroughs and real-world examples, he showcases how AI automates security tasks, accelerates programming, and enhances research—while also showing why some cybersecurity actions should stay human-led.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>02:00 - The good and bad of AI in security</p>
<p>04:00 - Google’s AI weapons controversy</p>
<p>06:30 - Deepfake scams and AI-powered phishing</p>
<p>09:00 - How AI helps (and fails) at programming</p>
<p>12:00 - Automating security research with AI</p>
<p>18:00 - AI-generated meeting notes &amp; productivity hacks</p>
<p>21:00 - What AI should NEVER do</p>
<p>23:00 - The future of AI in cybersecurity</p>
<p> </p>
<p>Links:</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect.</p>
<p>In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make him a cyber superhero—when they work. From automating security tasks to turbocharging programming workflows, AI is proving its value, but also revealing its limits. Through live walkthroughs and real-world examples, he showcases how AI automates security tasks, accelerates programming, and enhances research—while also showing why some cybersecurity actions should stay human-led.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>02:00 - The good and bad of AI in security</p>
<p>04:00 - Google’s AI weapons controversy</p>
<p>06:30 - Deepfake scams and AI-powered phishing</p>
<p>09:00 - How AI helps (and fails) at programming</p>
<p>12:00 - Automating security research with AI</p>
<p>18:00 - AI-generated meeting notes &amp; productivity hacks</p>
<p>21:00 - What AI should NEVER do</p>
<p>23:00 - The future of AI in cybersecurity</p>
<p> </p>
<p>Links:</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ccizbrzwajd3titx/HVS25_EP365_RonSoloCursor_Final.mp3" length="33972738" type="audio/mpeg"/>
        <itunes:summary><![CDATA[There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect.
In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make him a cyber superhero—when they work. From automating security tasks to turbocharging programming workflows, AI is proving its value, but also revealing its limits. Through live walkthroughs and real-world examples, he showcases how AI automates security tasks, accelerates programming, and enhances research—while also showing why some cybersecurity actions should stay human-led.
 
Impactful Moments:
00:00 - Introduction
02:00 - The good and bad of AI in security
04:00 - Google’s AI weapons controversy
06:30 - Deepfake scams and AI-powered phishing
09:00 - How AI helps (and fails) at programming
12:00 - Automating security research with AI
18:00 - AI-generated meeting notes &amp; productivity hacks
21:00 - What AI should NEVER do
23:00 - The future of AI in cybersecurity
 
Links:
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1358</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>365</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>A Human-Centric Approach to Cybersecurity with Edna Conway</title>
        <itunes:title>A Human-Centric Approach to Cybersecurity with Edna Conway</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/a-human-centric-approach-to-cybersecurity-with-edna-conway/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/a-human-centric-approach-to-cybersecurity-with-edna-conway/#comments</comments>        <pubDate>Tue, 04 Feb 2025 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5e7f0b1f-ab7e-3bdd-b00d-fe4a5dcfef9f</guid>
                                    <description><![CDATA[<p>What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to cybersecurity and explores the human element often overlooked in technology. </p>
<p>Recorded live at InfoSec Nashville 2024, Edna discusses the intersection of innovation and tradition, the critical role of accuracy in AI, and her vision for cybersecurity's future. From anomaly detection to the wisdom of creating "enclaves," her insights remind us that tech is here to serve people, not the other way around.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction
01:22 – Keynote insights: Innovation meets tradition
02:39 – From prosecutor to cybersecurity leader
07:00 – Human-first approach to AI and security
11:40 – LLMs in cybersecurity: opportunities and accuracy
16:34 – Balancing risk with AI use in business
23:06 – Bringing diverse talent into cybersecurity
32:30 – Advice on leadership and collaboration</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Edna Conway: <a href='https://www.linkedin.com/in/ednaconway/'>https://www.linkedin.com/in/ednaconway/</a></p>
<p>Learn more about ISSA Middle TN here: <a href='https://issamidtn.org/'>https://issamidtn.org/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to cybersecurity and explores the human element often overlooked in technology. </p>
<p>Recorded live at InfoSec Nashville 2024, Edna discusses the intersection of innovation and tradition, the critical role of accuracy in AI, and her vision for cybersecurity's future. From anomaly detection to the wisdom of creating "enclaves," her insights remind us that tech is here to serve people, not the other way around.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction<br>
01:22 – Keynote insights: Innovation meets tradition<br>
02:39 – From prosecutor to cybersecurity leader<br>
07:00 – Human-first approach to AI and security<br>
11:40 – LLMs in cybersecurity: opportunities and accuracy<br>
16:34 – Balancing risk with AI use in business<br>
23:06 – Bringing diverse talent into cybersecurity<br>
32:30 – Advice on leadership and collaboration</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Edna Conway: <a href='https://www.linkedin.com/in/ednaconway/'>https://www.linkedin.com/in/ednaconway/</a></p>
<p>Learn more about ISSA Middle TN here: <a href='https://issamidtn.org/'>https://issamidtn.org/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/79bnfnqd4p2mfuz2/IS24_EdnaConway_FINAL.mp3" length="51807346" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to cybersecurity and explores the human element often overlooked in technology. 
Recorded live at InfoSec Nashville 2024, Edna discusses the intersection of innovation and tradition, the critical role of accuracy in AI, and her vision for cybersecurity's future. From anomaly detection to the wisdom of creating "enclaves," her insights remind us that tech is here to serve people, not the other way around.
 
Impactful Moments:
00:00 – Introduction01:22 – Keynote insights: Innovation meets tradition02:39 – From prosecutor to cybersecurity leader07:00 – Human-first approach to AI and security11:40 – LLMs in cybersecurity: opportunities and accuracy16:34 – Balancing risk with AI use in business23:06 – Bringing diverse talent into cybersecurity32:30 – Advice on leadership and collaboration
 
Links:
Connect with our guest, Edna Conway: https://www.linkedin.com/in/ednaconway/
Learn more about ISSA Middle TN here: https://issamidtn.org/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2140</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>364</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Rise of the Machines: Why Your Attack Surface Has More Holes Than You Think ft Pandian Gnanaprakasam</title>
        <itunes:title>Rise of the Machines: Why Your Attack Surface Has More Holes Than You Think ft Pandian Gnanaprakasam</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/rise-of-the-machines-why-your-attack-surface-has-more-holes-than-you-think-with-pandian-gnanaprakasam/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/rise-of-the-machines-why-your-attack-surface-has-more-holes-than-you-think-with-pandian-gnanaprakasam/#comments</comments>        <pubDate>Tue, 28 Jan 2025 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3bfbaa22-c911-3792-a51b-c24bbf70594a</guid>
                                    <description><![CDATA[<p>Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product Officer at Ordr, to discuss the critical risks posed by agentless devices and how orchestration can strengthen your defenses.</p>
<p>Pandian shares key findings from Ordr’s 2024 "Rise of the Machines" report, highlighting the risks of overlooked agentless devices. He covers the rapid growth of these devices, strategies to manage vulnerabilities, and how automation can strengthen your defenses.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>04:15 - Why agentless devices dominate the next decade</p>
<p>06:30 - Insights from Ordr's “Rise of the Machines” report</p>
<p>08:50 - Hidden risks: 42% of devices are agentless</p>
<p>11:15 - Solving the "Swiss cheese" problem of security gaps</p>
<p>14:30 - Prioritizing vulnerabilities with business context</p>
<p>18:10 - Orchestration vs. automation: The harmony difference</p>
<p>22:00 - Why visibility is the foundation of security</p>
<p>27:30 - Ordr’s unique approach to securing the attack surface</p>
<p>


</p>
<p>Links:</p>
<p>Connect with our guest, Pandian Gnanaprakasam: <a href='https://www.linkedin.com/in/gpandian/'>https://www.linkedin.com/in/gpandian/</a></p>
<p>Check out Ordr’s Rise of the Machines report here: <a href='https://ordr.net/resources/rise-of-the-machines-report-2024'>https://ordr.net/resources/rise-of-the-machines-report-2024</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product Officer at Ordr, to discuss the critical risks posed by agentless devices and how orchestration can strengthen your defenses.</p>
<p>Pandian shares key findings from Ordr’s 2024 "Rise of the Machines" report, highlighting the risks of overlooked agentless devices. He covers the rapid growth of these devices, strategies to manage vulnerabilities, and how automation can strengthen your defenses.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>04:15 - Why agentless devices dominate the next decade</p>
<p>06:30 - Insights from Ordr's “Rise of the Machines” report</p>
<p>08:50 - Hidden risks: 42% of devices are agentless</p>
<p>11:15 - Solving the "Swiss cheese" problem of security gaps</p>
<p>14:30 - Prioritizing vulnerabilities with business context</p>
<p>18:10 - Orchestration vs. automation: The harmony difference</p>
<p>22:00 - Why visibility is the foundation of security</p>
<p>27:30 - Ordr’s unique approach to securing the attack surface</p>
<p><br>
<br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Pandian Gnanaprakasam: <a href='https://www.linkedin.com/in/gpandian/'>https://www.linkedin.com/in/gpandian/</a></p>
<p>Check out Ordr’s Rise of the Machines report here: <a href='https://ordr.net/resources/rise-of-the-machines-report-2024'>https://ordr.net/resources/rise-of-the-machines-report-2024</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/v2qu9uwfjhr4xwkm/HVS_Episodes_Ordr3_FINAL.mp3" length="56540929" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product Officer at Ordr, to discuss the critical risks posed by agentless devices and how orchestration can strengthen your defenses.
Pandian shares key findings from Ordr’s 2024 "Rise of the Machines" report, highlighting the risks of overlooked agentless devices. He covers the rapid growth of these devices, strategies to manage vulnerabilities, and how automation can strengthen your defenses.
 
Impactful Moments:
00:00 - Introduction
04:15 - Why agentless devices dominate the next decade
06:30 - Insights from Ordr's “Rise of the Machines” report
08:50 - Hidden risks: 42% of devices are agentless
11:15 - Solving the "Swiss cheese" problem of security gaps
14:30 - Prioritizing vulnerabilities with business context
18:10 - Orchestration vs. automation: The harmony difference
22:00 - Why visibility is the foundation of security
27:30 - Ordr’s unique approach to securing the attack surface

Links:
Connect with our guest, Pandian Gnanaprakasam: https://www.linkedin.com/in/gpandian/
Check out Ordr’s Rise of the Machines report here: https://ordr.net/resources/rise-of-the-machines-report-2024

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2283</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>363</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How a Game Turned a Watchmaker into a Cybersecurity Pro with Simeon Kakpovi</title>
        <itunes:title>How a Game Turned a Watchmaker into a Cybersecurity Pro with Simeon Kakpovi</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-a-game-turned-a-watchmaker-into-a-cybersecurity-pro-with-simeon-kakpovi/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-a-game-turned-a-watchmaker-into-a-cybersecurity-pro-with-simeon-kakpovi/#comments</comments>        <pubDate>Wed, 22 Jan 2025 09:59:54 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7ca24e8a-c872-37b3-ae29-cd621e4ea086</guid>
                                    <description><![CDATA[<p>What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and reshaping the cybersecurity pipeline by making cybersecurity education accessible. </p>
<p>From his journey as a threat hunter to building a free online game that teaches real-world blue team skills, Simeon joins Ron to show how creativity and inclusion can unlock potential in unexpected places. Plus, listen to the remarkable story about how a watchmaker with no cyber background landed a dream job at Microsoft—all thanks to KC7. </p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction</p>
<p>01:11 - The evolution of cybersecurity</p>
<p>03:03 - Cybersecurity Mergers &amp; Acquisitions</p>
<p>05:38 - Meet our guest: Simeon Kakpovi of KC7 Foundation</p>
<p>06:00 - KC7 wins “Team of the Year” at the SANS DMAs</p>
<p>8:43 - Founding the KC7 Foundation</p>
<p>10:00 - Lessons from Lockheed Martin’s Cyber Analyst Challenge</p>
<p>11:46 - How KC7 gamifies real-world cybersecurity</p>
<p>14:52 - Bringing KC7 to high school and middle school students</p>
<p>16:52 - Expanding access to cybersecurity careers</p>
<p>25:09 - A watchmaker’s journey to Microsoft</p>
<p>34:00 - How to get started with KC7</p>
<p> </p>
<p> </p>
Links
<p>Connect with our guest, Simeon Kakpovi on LinkedIn: <a href='https://www.linkedin.com/in/kakpovi/'>https://www.linkedin.com/in/kakpovi/</a></p>
<p>Check out the Cybersecurity M&amp;A Roundup Article here: <a href='https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/'>https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and reshaping the cybersecurity pipeline by making cybersecurity education accessible. </p>
<p>From his journey as a threat hunter to building a free online game that teaches real-world blue team skills, Simeon joins Ron to show how creativity and inclusion can unlock potential in unexpected places. Plus, listen to the remarkable story about how a watchmaker with no cyber background landed a dream job at Microsoft—all thanks to KC7. </p>
<p> </p>
Impactful Moments
<p>00:00 - Introduction</p>
<p>01:11 - The evolution of cybersecurity</p>
<p>03:03 - Cybersecurity Mergers &amp; Acquisitions</p>
<p>05:38 - Meet our guest: Simeon Kakpovi of KC7 Foundation</p>
<p>06:00 - KC7 wins “Team of the Year” at the SANS DMAs</p>
<p>8:43 - Founding the KC7 Foundation</p>
<p>10:00 - Lessons from Lockheed Martin’s Cyber Analyst Challenge</p>
<p>11:46 - How KC7 gamifies real-world cybersecurity</p>
<p>14:52 - Bringing KC7 to high school and middle school students</p>
<p>16:52 - Expanding access to cybersecurity careers</p>
<p>25:09 - A watchmaker’s journey to Microsoft</p>
<p>34:00 - How to get started with KC7</p>
<p> </p>
<p> </p>
Links
<p>Connect with our guest, Simeon Kakpovi on LinkedIn: <a href='https://www.linkedin.com/in/kakpovi/'>https://www.linkedin.com/in/kakpovi/</a></p>
<p>Check out the Cybersecurity M&amp;A Roundup Article here: <a href='https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/'>https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/va9xgm5pubb53tk2/HVS_Episodes_Simeon_FInal3.mp3" length="52910797" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and reshaping the cybersecurity pipeline by making cybersecurity education accessible. 
From his journey as a threat hunter to building a free online game that teaches real-world blue team skills, Simeon joins Ron to show how creativity and inclusion can unlock potential in unexpected places. Plus, listen to the remarkable story about how a watchmaker with no cyber background landed a dream job at Microsoft—all thanks to KC7. 
 
Impactful Moments
00:00 - Introduction
01:11 - The evolution of cybersecurity
03:03 - Cybersecurity Mergers &amp; Acquisitions
05:38 - Meet our guest: Simeon Kakpovi of KC7 Foundation
06:00 - KC7 wins “Team of the Year” at the SANS DMAs
8:43 - Founding the KC7 Foundation
10:00 - Lessons from Lockheed Martin’s Cyber Analyst Challenge
11:46 - How KC7 gamifies real-world cybersecurity
14:52 - Bringing KC7 to high school and middle school students
16:52 - Expanding access to cybersecurity careers
25:09 - A watchmaker’s journey to Microsoft
34:00 - How to get started with KC7
 
 
Links
Connect with our guest, Simeon Kakpovi on LinkedIn: https://www.linkedin.com/in/kakpovi/
Check out the Cybersecurity M&amp;A Roundup Article here: https://www.securityweek.com/cybersecurity-ma-roundup-37-deals-announced-in-december-2024/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2135</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>362</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Managing and Mitigating Cyber Risks For Your Assets with Jerich Beason and Wes Wright</title>
        <itunes:title>Managing and Mitigating Cyber Risks For Your Assets with Jerich Beason and Wes Wright</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/managing-and-mitigating-cyber-risks-for-your-assets-with-jerich-beason-and-wes-wright/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/managing-and-mitigating-cyber-risks-for-your-assets-with-jerich-beason-and-wes-wright/#comments</comments>        <pubDate>Tue, 14 Jan 2025 17:34:47 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a7eadfa2-7ecb-34c4-81e0-b1a07fef6de1</guid>
                                    <description><![CDATA[<p>What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity. </p>
<p>Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-Secure, emphasizing the need for complete visibility and data-driven risk mitigation. </p>
Impactful Moment:
<p>00:00 - Introduction</p>
<p>03:00 - Defining attack surface management</p>
<p>06:13 - See-Know-Secure framework </p>
<p>09:05 - Analogies for explaining ASM to stakeholders</p>
<p>15:33 - Building an inventory for asset visibility</p>
<p>20:42 - Convincing leadership: Budget strategies</p>
<p>25:00 - Tools and methodologies for ASM</p>
<p>36:57 - Managed services vs. in-house approaches</p>
<p>43:00 - Starting your ASM journey</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests –</p>
<p>Wes Wright: <a href='https://www.linkedin.com/in/4kidwes/'>https://www.linkedin.com/in/4kidwes/</a></p>
<p>Jerich Beason:<a href='https://www.breachlock.com/'> </a>https://www.linkedin.com/in/jerich-beason/</p>
<p>Learn more about Ordr: https://ordr.net/</p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity. </p>
<p>Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-Secure, emphasizing the need for complete visibility and data-driven risk mitigation. </p>
Impactful Moment:
<p>00:00 - Introduction</p>
<p>03:00 - Defining attack surface management</p>
<p>06:13 - See-Know-Secure framework </p>
<p>09:05 - Analogies for explaining ASM to stakeholders</p>
<p>15:33 - Building an inventory for asset visibility</p>
<p>20:42 - Convincing leadership: Budget strategies</p>
<p>25:00 - Tools and methodologies for ASM</p>
<p>36:57 - Managed services vs. in-house approaches</p>
<p>43:00 - Starting your ASM journey</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests –</p>
<p>Wes Wright: <a href='https://www.linkedin.com/in/4kidwes/'>https://www.linkedin.com/in/4kidwes/</a></p>
<p>Jerich Beason:<a href='https://www.breachlock.com/'> </a>https://www.linkedin.com/in/jerich-beason/</p>
<p>Learn more about Ordr: https://ordr.net/</p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wwcm234i9suhs3es/HVS_Episodes_Ordr2_FINAL.mp3" length="65898990" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management (ASM) and its impact on cybersecurity. 
Together with Ron, they explain what constitutes an attack surface and introduce practical frameworks like See-Know-Secure, emphasizing the need for complete visibility and data-driven risk mitigation. 
Impactful Moment:
00:00 - Introduction
03:00 - Defining attack surface management
06:13 - See-Know-Secure framework 
09:05 - Analogies for explaining ASM to stakeholders
15:33 - Building an inventory for asset visibility
20:42 - Convincing leadership: Budget strategies
25:00 - Tools and methodologies for ASM
36:57 - Managed services vs. in-house approaches
43:00 - Starting your ASM journey
 
Links:
Connect with our guests –
Wes Wright: https://www.linkedin.com/in/4kidwes/
Jerich Beason: https://www.linkedin.com/in/jerich-beason/
Learn more about Ordr: https://ordr.net/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2689</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>361</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Year of the Agent: AI, Bug Bounties, and Cybersecurity Insights with Marco Figueroa</title>
        <itunes:title>The Year of the Agent: AI, Bug Bounties, and Cybersecurity Insights with Marco Figueroa</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-year-of-the-agent-ai-bug-bounties-and-cybersecurity-insights-with-marco-figueroa/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-year-of-the-agent-ai-bug-bounties-and-cybersecurity-insights-with-marco-figueroa/#comments</comments>        <pubDate>Fri, 10 Jan 2025 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/643c6005-8af1-3d94-aa55-eeee4e90caf3</guid>
                                    <description><![CDATA[<p>How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI systems and integrations take a central role. </p>
<p>In this special New Year bonus episode, Ron sits down with Marco to discuss the transformative role of AI in solving cybersecurity challenges. Marco breaks down AI jailbreak techniques, the impact of bug bounty programs on securing AI systems, and why 2025’s fast-evolving tech landscape demands creative thinking. Learn how tools like ChatGPT and Gemini 2.0 are reshaping the industry and why staying adaptable is essential.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>02:14 - Speed vs. safety: AI system challenges</p>
<p>05:30 - Why experience matters more than information</p>
<p>07:45 - Legal stakes for deepfakes and AI</p>
<p>18:36 - Marco’s creative journey in cybersecurity</p>
<p>28:00 - Jailbreaks: Risks and surprising AI findings</p>
<p>37:13 - 2025 predictions: The rise of agents</p>
<p>41:00 - Closing thoughts and the power of community</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p>Chuck Brooks' 2025 Cybersecurity Predictions article: <a href='https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/'>https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/</a></p>
<p>Focus Areas for the FaccT Conference News: <a href='https://facctconference.org/2025/focusareas'>https://facctconference.org/2025/focusareas</a></p>
<p>“Unreasonable Hospitality” by Will Guidara Book Link: <a href='https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573'>https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI systems and integrations take a central role. </p>
<p>In this special New Year bonus episode, Ron sits down with Marco to discuss the transformative role of AI in solving cybersecurity challenges. Marco breaks down AI jailbreak techniques, the impact of bug bounty programs on securing AI systems, and why 2025’s fast-evolving tech landscape demands creative thinking. Learn how tools like ChatGPT and Gemini 2.0 are reshaping the industry and why staying adaptable is essential.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>02:14 - Speed vs. safety: AI system challenges</p>
<p>05:30 - Why experience matters more than information</p>
<p>07:45 - Legal stakes for deepfakes and AI</p>
<p>18:36 - Marco’s creative journey in cybersecurity</p>
<p>28:00 - Jailbreaks: Risks and surprising AI findings</p>
<p>37:13 - 2025 predictions: The rise of agents</p>
<p>41:00 - Closing thoughts and the power of community</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Marco Figueroa: <a href='https://www.linkedin.com/in/marco-figueroa-re/'>https://www.linkedin.com/in/marco-figueroa-re/</a></p>
<p>Chuck Brooks' 2025 Cybersecurity Predictions article: <a href='https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/'>https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/</a></p>
<p>Focus Areas for the FaccT Conference News: <a href='https://facctconference.org/2025/focusareas'>https://facctconference.org/2025/focusareas</a></p>
<p>“Unreasonable Hospitality” by Will Guidara Book Link: <a href='https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573'>https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wtuu6en8cp3bqnyq/HVS_Episodes_NewYears2025_FINAL.mp3" length="64445765" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI systems and integrations take a central role. 
In this special New Year bonus episode, Ron sits down with Marco to discuss the transformative role of AI in solving cybersecurity challenges. Marco breaks down AI jailbreak techniques, the impact of bug bounty programs on securing AI systems, and why 2025’s fast-evolving tech landscape demands creative thinking. Learn how tools like ChatGPT and Gemini 2.0 are reshaping the industry and why staying adaptable is essential.
 
Impactful Moments:
00:00 - Introduction
02:14 - Speed vs. safety: AI system challenges
05:30 - Why experience matters more than information
07:45 - Legal stakes for deepfakes and AI
18:36 - Marco’s creative journey in cybersecurity
28:00 - Jailbreaks: Risks and surprising AI findings
37:13 - 2025 predictions: The rise of agents
41:00 - Closing thoughts and the power of community

Links:
Connect with our guest, Marco Figueroa: https://www.linkedin.com/in/marco-figueroa-re/
Chuck Brooks' 2025 Cybersecurity Predictions article: https://www.forbes.com/sites/chuckbrooks/2024/12/24/cybersecurity-trends-and-priorities-to-watch-for-2025/
Focus Areas for the FaccT Conference News: https://facctconference.org/2025/focusareas
“Unreasonable Hospitality” by Will Guidara Book Link: https://www.amazon.com/Unreasonable-Hospitality-Remarkable-Giving-People/dp/0593418573

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2499</itunes:duration>
                <itunes:episode>360</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Understanding the Psychology of Cyber Risk with David Shipley</title>
        <itunes:title>Understanding the Psychology of Cyber Risk with David Shipley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/understanding-the-psychology-of-cyber-risk-with-david-shipley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/understanding-the-psychology-of-cyber-risk-with-david-shipley/#comments</comments>        <pubDate>Tue, 07 Jan 2025 05:25:47 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5cc66845-744b-3835-8638-83ee927abaca</guid>
                                    <description><![CDATA[<p>Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and neuroscience reshape how we approach security awareness, reducing risks in ways tech alone never could.</p>
<p>In this episode, Ron and David examine why people, not technology, are at the core of effective cybersecurity. David teaches us about the SCARF model, warns us about the dangers of overconfidence in training, and explains how gamification can drive meaningful behavior change when it comes to cybersecurity awareness and risk reduction. </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction</p>
<p>02:00 – David Shipley’s journey from journalist to cybersecurity leader</p>
<p>06:10 – Why motivation outshines knowledge in security training</p>
<p>08:20 – The Dunning-Kruger effect: Overconfidence in cybersecurity</p>
<p>11:17 – How overreliance on tech increases click rates</p>
<p>17:03 – Cybercriminals’ evolving tactics and emotional manipulation</p>
<p>25:00 – Gamification in cybersecurity: Changing security behaviors</p>
<p>30:56 – Using the SCARF model to enhance security culture</p>
<p>39:45 – Emotional intelligence as a defense against AI threats</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, David Shipley: <a href='https://www.linkedin.com/in/dbshipley/'>https://www.linkedin.com/in/dbshipley/</a></p>
<p>Learn more about Beauceron Security here: <a href='http://www.beauceronsecurity.com/partner'>www.beauceronsecurity.com/partner</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>


</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and neuroscience reshape how we approach security awareness, reducing risks in ways tech alone never could.</p>
<p>In this episode, Ron and David examine why people, not technology, are at the core of effective cybersecurity. David teaches us about the SCARF model, warns us about the dangers of overconfidence in training, and explains how gamification can drive meaningful behavior change when it comes to cybersecurity awareness and risk reduction. </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction</p>
<p>02:00 – David Shipley’s journey from journalist to cybersecurity leader</p>
<p>06:10 – Why motivation outshines knowledge in security training</p>
<p>08:20 – The Dunning-Kruger effect: Overconfidence in cybersecurity</p>
<p>11:17 – How overreliance on tech increases click rates</p>
<p>17:03 – Cybercriminals’ evolving tactics and emotional manipulation</p>
<p>25:00 – Gamification in cybersecurity: Changing security behaviors</p>
<p>30:56 – Using the SCARF model to enhance security culture</p>
<p>39:45 – Emotional intelligence as a defense against AI threats</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, David Shipley: <a href='https://www.linkedin.com/in/dbshipley/'>https://www.linkedin.com/in/dbshipley/</a></p>
<p>Learn more about Beauceron Security here: <a href='http://www.beauceronsecurity.com/partner'>www.beauceronsecurity.com/partner</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2un72t4527iy9th6/HVS_Episodes_Beauceron_FINAL_1_8p1eb.mp3" length="66428391" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and neuroscience reshape how we approach security awareness, reducing risks in ways tech alone never could.
In this episode, Ron and David examine why people, not technology, are at the core of effective cybersecurity. David teaches us about the SCARF model, warns us about the dangers of overconfidence in training, and explains how gamification can drive meaningful behavior change when it comes to cybersecurity awareness and risk reduction. 
 
Impactful Moments:
00:00 – Introduction
02:00 – David Shipley’s journey from journalist to cybersecurity leader
06:10 – Why motivation outshines knowledge in security training
08:20 – The Dunning-Kruger effect: Overconfidence in cybersecurity
11:17 – How overreliance on tech increases click rates
17:03 – Cybercriminals’ evolving tactics and emotional manipulation
25:00 – Gamification in cybersecurity: Changing security behaviors
30:56 – Using the SCARF model to enhance security culture
39:45 – Emotional intelligence as a defense against AI threats

Links:
Connect with our guest, David Shipley: https://www.linkedin.com/in/dbshipley/
Learn more about Beauceron Security here: www.beauceronsecurity.com/partner
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2664</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>359</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>From Landscaping to Cyber Leadership with Cole Lisko</title>
        <itunes:title>From Landscaping to Cyber Leadership with Cole Lisko</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/from-landscaping-to-cyber-leadership-with-cole-lisko/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/from-landscaping-to-cyber-leadership-with-cole-lisko/#comments</comments>        <pubDate>Tue, 24 Dec 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c96c4672-d1dc-3e62-8f86-78cce98be1a7</guid>
                                    <description><![CDATA[<p>How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks. </p>
<p>Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with laughs and lessons learned along the way. Discussing career pivots, unexpected opportunities, and the impact of mentorship, this conversation offers relatable motivation and a candid look at the power of meaningful connections.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>03:00 - Cole’s first exposure to cybersecurity</p>
<p>06:30 - Pivotal moment: a call for mentorship</p>
<p>11:40 - Breaking into cleared work</p>
<p>18:30 - Lessons learned at Booz Allen</p>
<p>22:00 - The art of work-life compartmentalization</p>
<p>27:45 - Leadership insights from landscaping days</p>
<p>32:50 - What’s next for Cole at Palo Alto Networks</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Cole Lisko: <a href='https://www.linkedin.com/in/matthewlisko/'>https://www.linkedin.com/in/matthewlisko/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks. </p>
<p>Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with laughs and lessons learned along the way. Discussing career pivots, unexpected opportunities, and the impact of mentorship, this conversation offers relatable motivation and a candid look at the power of meaningful connections.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>03:00 - Cole’s first exposure to cybersecurity</p>
<p>06:30 - Pivotal moment: a call for mentorship</p>
<p>11:40 - Breaking into cleared work</p>
<p>18:30 - Lessons learned at Booz Allen</p>
<p>22:00 - The art of work-life compartmentalization</p>
<p>27:45 - Leadership insights from landscaping days</p>
<p>32:50 - What’s next for Cole at Palo Alto Networks</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Cole Lisko: <a href='https://www.linkedin.com/in/matthewlisko/'>https://www.linkedin.com/in/matthewlisko/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wz7zhcuaey6vv65c/HVS_Episodes_ColeLisko_FINAL_1_bl74b.mp3" length="51625750" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from landscaping to becoming the Cortex Team Manager at Palo Alto Networks. 
Joined by his bestie Cole, Ron weaves the conversation through their history of friendship with laughs and lessons learned along the way. Discussing career pivots, unexpected opportunities, and the impact of mentorship, this conversation offers relatable motivation and a candid look at the power of meaningful connections.
 
Impactful Moments:
00:00 - Introduction
03:00 - Cole’s first exposure to cybersecurity
06:30 - Pivotal moment: a call for mentorship
11:40 - Breaking into cleared work
18:30 - Lessons learned at Booz Allen
22:00 - The art of work-life compartmentalization
27:45 - Leadership insights from landscaping days
32:50 - What’s next for Cole at Palo Alto Networks

Links:
Connect with our guest, Cole Lisko: https://www.linkedin.com/in/matthewlisko/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2084</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>358</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Think Like a Hacker, Solve Like a Leader featuring Ted Harrington</title>
        <itunes:title>Think Like a Hacker, Solve Like a Leader featuring Ted Harrington</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington/#comments</comments>        <pubDate>Tue, 17 Dec 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3db6849e-d6b8-3c9b-a86a-4aeb15b6e5d8</guid>
                                    <description><![CDATA[<p>What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever.</p>
<p>Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Intro 
03:15 - The four traits of a hacker mindset 
07:40 - Hacking the first iPhone and Tesla 
11:50 - Why penetration testing is misunderstood 
16:30 - Risks and realities of AI deepfakes 
21:20 - Applying hacker traits to entrepreneurship 
28:45 - Ted’s upcoming book: Inner Hacker 
33:00 - Why mindset matters most</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Ted Harrington: <a href='https://www.linkedin.com/in/securityted/'>https://www.linkedin.com/in/securityted/</a></p>
<p>Order Ted Harrington’s book “Hackable” here: <a href='https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4'>https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever.</p>
<p>Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Intro <br>
03:15 - The four traits of a hacker mindset <br>
07:40 - Hacking the first iPhone and Tesla <br>
11:50 - Why penetration testing is misunderstood <br>
16:30 - Risks and realities of AI deepfakes <br>
21:20 - Applying hacker traits to entrepreneurship <br>
28:45 - Ted’s upcoming book: Inner Hacker <br>
33:00 - Why mindset matters most</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Ted Harrington: <a href='https://www.linkedin.com/in/securityted/'>https://www.linkedin.com/in/securityted/</a></p>
<p>Order Ted Harrington’s book “Hackable” here: <a href='https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4'>https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/e6zf5wvc63adarkz/Epsidoes_TedHarrington_Audio.mp3" length="60603150" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, curiosity, creativity, and nonconformity to rethink cybersecurity and life itself. From hacking the first iPhone to disrupting misconceptions about security testing, Ted shows why the hacker mindset matters more now than ever.
Join Ron and Ted as they discuss strategies for using the hacker mindset to solve problems, address risks like AI-driven deepfakes, and uncover unconventional opportunities in both business and personal growth.
 
Impactful Moments:
00:00 - Intro 03:15 - The four traits of a hacker mindset 07:40 - Hacking the first iPhone and Tesla 11:50 - Why penetration testing is misunderstood 16:30 - Risks and realities of AI deepfakes 21:20 - Applying hacker traits to entrepreneurship 28:45 - Ted’s upcoming book: Inner Hacker 33:00 - Why mindset matters most
 
Links:
Connect with our guest, Ted Harrington: https://www.linkedin.com/in/securityted/
Order Ted Harrington’s book “Hackable” here: https://www.amazon.com/Hackable-How-Application-Security-Right-ebook/dp/B08MFTQ7Q4

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2466</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>357</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacking Trust with AI and Deepfakes featuring Iain Jackson</title>
        <itunes:title>Hacking Trust with AI and Deepfakes featuring Iain Jackson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacking-trust-with-ai-and-deepfakes-featuring-iain-jackson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacking-trust-with-ai-and-deepfakes-featuring-iain-jackson/#comments</comments>        <pubDate>Thu, 12 Dec 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8112932c-6034-30f6-b87d-c9a6f763fc0c</guid>
                                    <description><![CDATA[<p>What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity. </p>
<p>Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead. </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction
01:56 - Iain shares his journey with AI
03:29 - Demonstrating voice cloning in real-time
06:31 - Risks of automated synthetic voice attacks
09:46 - Impact of AI on social engineering tactics
11:00 - Importance of "vibe checks" in cybersecurity
15:17 - Real-world phishing and HR scam example
20:00 - Uncanny Valley: Defense against AI deception
23:37 - The future of AI in adversary emulation</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Iain Jackson: <a href='https://www.linkedin.com/in/iain-j-98578a238/'>https://www.linkedin.com/in/iain-j-98578a238/</a></p>
<p>Learn more about CovertSwarm here: <a href='https://covertswarm.com/'>https://covertswarm.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity. </p>
<p>Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead. </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction<br>
01:56 - Iain shares his journey with AI<br>
03:29 - Demonstrating voice cloning in real-time<br>
06:31 - Risks of automated synthetic voice attacks<br>
09:46 - Impact of AI on social engineering tactics<br>
11:00 - Importance of "vibe checks" in cybersecurity<br>
15:17 - Real-world phishing and HR scam example<br>
20:00 - Uncanny Valley: Defense against AI deception<br>
23:37 - The future of AI in adversary emulation</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Iain Jackson: <a href='https://www.linkedin.com/in/iain-j-98578a238/'>https://www.linkedin.com/in/iain-j-98578a238/</a></p>
<p>Learn more about CovertSwarm here: <a href='https://covertswarm.com/'>https://covertswarm.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7rcdxg93ez6xcys5/Episodes_CovertSwarm_IainJackson_FINAL.mp3" length="36500981" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic voices and AI in cybersecurity. 
Together, Ron and Iain discuss how adversaries are using AI to bypass human intuition. From synthetic voice calls to automating phishing attacks at scale, this episode explores how hackers leverage technology using these tactics and what you can do to stay one step ahead. 
 
Impactful Moments:
00:00 - Introduction01:56 - Iain shares his journey with AI03:29 - Demonstrating voice cloning in real-time06:31 - Risks of automated synthetic voice attacks09:46 - Impact of AI on social engineering tactics11:00 - Importance of "vibe checks" in cybersecurity15:17 - Real-world phishing and HR scam example20:00 - Uncanny Valley: Defense against AI deception23:37 - The future of AI in adversary emulation
 
Links:
Connect with our guest, Iain Jackson: https://www.linkedin.com/in/iain-j-98578a238/
Learn more about CovertSwarm here: https://covertswarm.com/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1504</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>356</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Championing the Human in Cybersecurity with Julie Haney</title>
        <itunes:title>Championing the Human in Cybersecurity with Julie Haney</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/championing-the-human-in-cybersecurity-with-julie-haney/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/championing-the-human-in-cybersecurity-with-julie-haney/#comments</comments>        <pubDate>Tue, 03 Dec 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9ecf99c1-133d-3179-8e6a-f5b9d3f9b31b</guid>
                                    <description><![CDATA[<p>What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection.</p>
<p>In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, why empathy is a game-changer for effective security, and strategies for empowering people to feel confident and secure online. This conversation will inspire you to rethink how we protect people in the digital age and shares a fresh perspective on making cybersecurity work for all.</p>
Impactful Moments:
<p>00:00 - Introduction
07:15 - Breaking down barriers in user design
15:40 - Why empathy matters in cybersecurity solutions
21:05 - Challenges in bridging tech and humanity
28:30 - Designing systems with people, not just for them
35:10 - Practical steps to empower users in security
42:45 - Final reflections on human-centered innovation</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Julie Haney here: <a href='https://www.linkedin.com/in/julie-haney-037449119'>https://www.linkedin.com/in/julie-haney-037449119</a></p>
<p>Check out NIST’s Online Community of Interest here: <a href='https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi'>https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi</a></p>
<p>Learn more about Human-Centered Cybersecurity on NIST’s website here: <a href='https://csrc.nist.gov/projects/human-centered-cybersecurity'>https://csrc.nist.gov/projects/human-centered-cybersecurity</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection.</p>
<p>In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, why empathy is a game-changer for effective security, and strategies for empowering people to feel confident and secure online. This conversation will inspire you to rethink how we protect people in the digital age and shares a fresh perspective on making cybersecurity work for all.</p>
Impactful Moments:
<p>00:00 - Introduction<br>
07:15 - Breaking down barriers in user design<br>
15:40 - Why empathy matters in cybersecurity solutions<br>
21:05 - Challenges in bridging tech and humanity<br>
28:30 - Designing systems with people, not just for them<br>
35:10 - Practical steps to empower users in security<br>
42:45 - Final reflections on human-centered innovation</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Julie Haney here: <a href='https://www.linkedin.com/in/julie-haney-037449119'>https://www.linkedin.com/in/julie-haney-037449119</a></p>
<p>Check out NIST’s Online Community of Interest here: <a href='https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi'>https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi</a></p>
<p>Learn more about Human-Centered Cybersecurity on NIST’s website here: <a href='https://csrc.nist.gov/projects/human-centered-cybersecurity'>https://csrc.nist.gov/projects/human-centered-cybersecurity</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9shvptphbsd74b4k/Episodes_JulieHaney_Audio.mp3" length="3636929" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater adoption, reduced frustration, and stronger protection.
In this episode, Julie discusses how to improve user adoption by simplifying complex security processes, why empathy is a game-changer for effective security, and strategies for empowering people to feel confident and secure online. This conversation will inspire you to rethink how we protect people in the digital age and shares a fresh perspective on making cybersecurity work for all.
Impactful Moments:
00:00 - Introduction07:15 - Breaking down barriers in user design15:40 - Why empathy matters in cybersecurity solutions21:05 - Challenges in bridging tech and humanity28:30 - Designing systems with people, not just for them35:10 - Practical steps to empower users in security42:45 - Final reflections on human-centered innovation
 
Links:
Connect with our guest, Julie Haney here: https://www.linkedin.com/in/julie-haney-037449119
Check out NIST’s Online Community of Interest here: https://csrc.nist.gov/Projects/human-centered-cybersecurity/hcc-coi
Learn more about Human-Centered Cybersecurity on NIST’s website here: https://csrc.nist.gov/projects/human-centered-cybersecurity
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>151</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>355</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss</title>
        <itunes:title>Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid Schloss</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/do-you-deserve-to-be-hacked-featuring-ilan-fehler-and-dahvid-schloss/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/do-you-deserve-to-be-hacked-featuring-ilan-fehler-and-dahvid-schloss/#comments</comments>        <pubDate>Tue, 26 Nov 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fb449d41-2e4e-3196-b59d-3cb211120b49</guid>
                                    <description><![CDATA[<p>Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild.</p>
<p>Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity.</p>
<p>Impactful Moments:
00:00 - Introduction
01:25 - You Deserve To Be Hacked
03:05 - Emulating criminal behavior: The hive structure
07:55 - Social engineering tactics that really work
20:16 - Physical breaches: Pentesting in action
24:09 - Past the firewall: Second- and third-layer testing
29:14 - Digital exploits and real-world vulnerabilities
35:24 - Why organizations hesitate to invest in red teams
37:33 - Building muscle memory for security</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests, Ilan Fehler <a href='https://www.linkedin.com/in/fehler/'>https://www.linkedin.com/in/fehler/</a> and Dahvid Schloss <a href='https://www.linkedin.com/in/dahvidschloss/'>https://www.linkedin.com/in/dahvidschloss/</a></p>
<p>Learn more about CovertSwarm here: <a href='https://covertswarm.com/'>https://covertswarm.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild.</p>
<p>Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity.</p>
<p>Impactful Moments:<br>
00:00 - Introduction<br>
01:25 - You Deserve To Be Hacked<br>
03:05 - Emulating criminal behavior: The hive structure<br>
07:55 - Social engineering tactics that really work<br>
20:16 - Physical breaches: Pentesting in action<br>
24:09 - Past the firewall: Second- and third-layer testing<br>
29:14 - Digital exploits and real-world vulnerabilities<br>
35:24 - Why organizations hesitate to invest in red teams<br>
37:33 - Building muscle memory for security</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests, Ilan Fehler <a href='https://www.linkedin.com/in/fehler/'>https://www.linkedin.com/in/fehler/</a> and Dahvid Schloss <a href='https://www.linkedin.com/in/dahvidschloss/'>https://www.linkedin.com/in/dahvidschloss/</a></p>
<p>Learn more about CovertSwarm here: <a href='https://covertswarm.com/'>https://covertswarm.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5km5a76ruped3tr2/CovertSwarm-_Dahvid_Ilan7s5a6.mp3" length="58895330" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how organizations can prepare for adversaries in the wild.
Recorded at Black Hat 2024, Ron is joined by Ilan Fehler, US Sales Lead at CovertSwarm, and Dahvid Schloss, Hive Leader at CovertSwarm to explore the world of adversary emulation. From physical breaches to API exploits, this conversation covers the human, digital, and physical elements of cybersecurity.
Impactful Moments:00:00 - Introduction01:25 - You Deserve To Be Hacked03:05 - Emulating criminal behavior: The hive structure07:55 - Social engineering tactics that really work20:16 - Physical breaches: Pentesting in action24:09 - Past the firewall: Second- and third-layer testing29:14 - Digital exploits and real-world vulnerabilities35:24 - Why organizations hesitate to invest in red teams37:33 - Building muscle memory for security
 
Links:
Connect with our guests, Ilan Fehler https://www.linkedin.com/in/fehler/ and Dahvid Schloss https://www.linkedin.com/in/dahvidschloss/
Learn more about CovertSwarm here: https://covertswarm.com/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2421</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>354</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Transforming SOC Operations with AI featuring Roy Halevi</title>
        <itunes:title>Transforming SOC Operations with AI featuring Roy Halevi</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/transforming-soc-operations-with-ai-featuring-roy-halevi/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/transforming-soc-operations-with-ai-featuring-roy-halevi/#comments</comments>        <pubDate>Wed, 20 Nov 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5b0cffaa-a2ed-370f-bea5-e100c98a93cb</guid>
                                    <description><![CDATA[<p>Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats.</p>
<p>In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response, reducing noise and improving accuracy. Roy shares insights on overcoming challenges in adopting AI, the future of SOC roles, and how organizations can optimize their defenses using AI driven tools.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 – Intro and the AI revolution in cybersecurity</p>
<p>01:16 – Meet Roy Halevi, Co-Founder and CTO of Intezer</p>
<p>03:00 – The story behind the name ‘Intezer’</p>
<p>06:14 – Key challenges facing today’s SOC teams</p>
<p>15:04 – Top use cases for AI in the SOC</p>
<p>21:27 – How Intezer automates alert triage and response</p>
<p>37:32 – Future predictions for SOC and cybersecurity roles</p>
<p>48:23 – Closing thoughts and call to action</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Roy Halevi: <a href='https://www.linkedin.com/in/royhalevi/'>https://www.linkedin.com/in/royhalevi</a></p>
<p>Learn more about Intezer here:<a href='https://www.breachlock.com/'> </a><a href='https://intezer.com/'>https://intezer.com</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats.</p>
<p>In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response, reducing noise and improving accuracy. Roy shares insights on overcoming challenges in adopting AI, the future of SOC roles, and how organizations can optimize their defenses using AI driven tools.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 – Intro and the AI revolution in cybersecurity</p>
<p>01:16 – Meet Roy Halevi, Co-Founder and CTO of Intezer</p>
<p>03:00 – The story behind the name ‘Intezer’</p>
<p>06:14 – Key challenges facing today’s SOC teams</p>
<p>15:04 – Top use cases for AI in the SOC</p>
<p>21:27 – How Intezer automates alert triage and response</p>
<p>37:32 – Future predictions for SOC and cybersecurity roles</p>
<p>48:23 – Closing thoughts and call to action</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Roy Halevi: <a href='https://www.linkedin.com/in/royhalevi/'>https://www.linkedin.com/in/royhalevi</a></p>
<p>Learn more about Intezer here:<a href='https://www.breachlock.com/'> </a><a href='https://intezer.com/'>https://intezer.com</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5vyznaykbwd8dq69/HVS_Episodes_Intezer_FINAL.mp3" length="72485357" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams to focus on critical threats.
In this conversation with host Ron Eddings, Roy explains how AI automates critical tasks like alert investigation and response, reducing noise and improving accuracy. Roy shares insights on overcoming challenges in adopting AI, the future of SOC roles, and how organizations can optimize their defenses using AI driven tools.
 
Impactful Moments
00:00 – Intro and the AI revolution in cybersecurity
01:16 – Meet Roy Halevi, Co-Founder and CTO of Intezer
03:00 – The story behind the name ‘Intezer’
06:14 – Key challenges facing today’s SOC teams
15:04 – Top use cases for AI in the SOC
21:27 – How Intezer automates alert triage and response
37:32 – Future predictions for SOC and cybersecurity roles
48:23 – Closing thoughts and call to action
 
Links:
Connect with our guest, Roy Halevi: https://www.linkedin.com/in/royhalevi
Learn more about Intezer here: https://intezer.com
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2944</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>353</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>From Shadow IT to Full Asset Visibility with Wes Wright</title>
        <itunes:title>From Shadow IT to Full Asset Visibility with Wes Wright</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/from-shadow-it-to-full-asset-visibility-with-wes-wright/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/from-shadow-it-to-full-asset-visibility-with-wes-wright/#comments</comments>        <pubDate>Tue, 12 Nov 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ace61ea8-6aa5-364e-9d1b-831bdd3221c8</guid>
                                    <description><![CDATA[<p>Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.</p>
<p>In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:35 - Asset visibility and blind spots</p>
<p>03:47 - What keeps CTOs and CISOs up at night</p>
<p>08:45 - Bridging IT and OT: CAASM explained</p>
<p>12:10 - Real-world use cases for CAASM</p>
<p>18:37 - The power of automated asset management</p>
<p>25:00 - Why continuous inventory is a game-changer</p>
<p>35:59 - Wes’s advice for getting started with Ordr</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Wes Wright: <a href='https://www.linkedin.com/in/4kidwes/'>https://www.linkedin.com/in/4kidwes/</a></p>
<p>Learn more about Ordr here: <a href='https://ordr.net/'>https://ordr.net/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.</p>
<p>In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:35 - Asset visibility and blind spots</p>
<p>03:47 - What keeps CTOs and CISOs up at night</p>
<p>08:45 - Bridging IT and OT: CAASM explained</p>
<p>12:10 - Real-world use cases for CAASM</p>
<p>18:37 - The power of automated asset management</p>
<p>25:00 - Why continuous inventory is a game-changer</p>
<p>35:59 - Wes’s advice for getting started with Ordr</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Wes Wright: <a href='https://www.linkedin.com/in/4kidwes/'>https://www.linkedin.com/in/4kidwes/</a></p>
<p>Learn more about Ordr here: <a href='https://ordr.net/'>https://ordr.net/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/62q3qmc5dgxq3u8h/HVS_Episodes_OrdrEp1_FINAL.mp3" length="35912408" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take control of their digital assets.
In this episode, Ron and Wes discuss the importance of asset visibility in cybersecurity, outlining the potential of CAASM (Cyber Asset and Attack Surface Management) and how it empowers teams to expose hidden vulnerabilities, streamline operations, and stay ahead of security threats, vulnerabilities, and exposures.
 
Impactful Moments:
00:00 - Introduction
01:35 - Asset visibility and blind spots
03:47 - What keeps CTOs and CISOs up at night
08:45 - Bridging IT and OT: CAASM explained
12:10 - Real-world use cases for CAASM
18:37 - The power of automated asset management
25:00 - Why continuous inventory is a game-changer
35:59 - Wes’s advice for getting started with Ordr

Links:
Connect with our guest, Wes Wright: https://www.linkedin.com/in/4kidwes/
Learn more about Ordr here: https://ordr.net/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2244</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>352</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Building Opportunities for Women and Minorities in Cybersecurity with Connie Matthews</title>
        <itunes:title>Building Opportunities for Women and Minorities in Cybersecurity with Connie Matthews</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/building-opportunities-for-women-and-minorities-in-cybersecurity-with-connie-matthews/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/building-opportunities-for-women-and-minorities-in-cybersecurity-with-connie-matthews/#comments</comments>        <pubDate>Wed, 06 Nov 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a1c1ea49-05a3-3225-98b2-402925f40749</guid>
                                    <description><![CDATA[<p>How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity.

In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW-ER, Connie’s shared lessons and insights on resilience and community give listeners a blueprint for making a meaningful impact in their careers.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction
04:27 – Mentorship impact: Building future leaders
10:14 – Embracing diversity and servant leadership
18:03 – Founding EmpoW-ER: Supporting women in cyber
24:13 – Navigating stereotypes and staying resilient
30:00 – Recognizing and celebrating young talent
36:45 – Building an inclusive cybersecurity community</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Connie Matthews: <a href='https://www.linkedin.com/in/conniematthews/'>https://www.linkedin.com/in/conniematthews/</a></p>
<p>Learn more about EmpoW-ER:<a href='https://www.breachlock.com/'> </a>https://www.empower-infosec.org/</p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity.<br>
<br>
In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW-ER, Connie’s shared lessons and insights on resilience and community give listeners a blueprint for making a meaningful impact in their careers.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction<br>
04:27 – Mentorship impact: Building future leaders<br>
10:14 – Embracing diversity and servant leadership<br>
18:03 – Founding EmpoW-ER: Supporting women in cyber<br>
24:13 – Navigating stereotypes and staying resilient<br>
30:00 – Recognizing and celebrating young talent<br>
36:45 – Building an inclusive cybersecurity community</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Connie Matthews: <a href='https://www.linkedin.com/in/conniematthews/'>https://www.linkedin.com/in/conniematthews/</a></p>
<p>Learn more about EmpoW-ER:<a href='https://www.breachlock.com/'> </a>https://www.empower-infosec.org/</p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/c5dy6h24dydyghps/HVS_Episodes_ConnieMatthews_FINAL.mp3" length="61602489" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in cybersecurity.In this powerful episode, Connie shares her path as a pioneering woman in cybersecurity. Discussing diversity, mentorship, and her nonprofit EmpoW-ER, Connie’s shared lessons and insights on resilience and community give listeners a blueprint for making a meaningful impact in their careers.
 
Impactful Moments:
00:00 – Introduction04:27 – Mentorship impact: Building future leaders10:14 – Embracing diversity and servant leadership18:03 – Founding EmpoW-ER: Supporting women in cyber24:13 – Navigating stereotypes and staying resilient30:00 – Recognizing and celebrating young talent36:45 – Building an inclusive cybersecurity community
 
Links:
Connect with our guest, Connie Matthews: https://www.linkedin.com/in/conniematthews/
Learn more about EmpoW-ER: https://www.empower-infosec.org/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2509</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>351</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Rethinking Cybersecurity Hiring with Naomi Buckwalter</title>
        <itunes:title>Rethinking Cybersecurity Hiring with Naomi Buckwalter</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/rethinking-cybersecurity-hiring-with-naomi-buckwalter/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/rethinking-cybersecurity-hiring-with-naomi-buckwalter/#comments</comments>        <pubDate>Tue, 29 Oct 2024 12:06:27 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8cb5ac39-5e1c-333a-ad3a-127a1e4213b0</guid>
                                    <description><![CDATA[<p>Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth.</p>
<p>In this episode, Naomi challenges why industry hiring norms fall short, shares candid stories of her own missteps, and explains why humility and learning are just as important as technical skills in cybersecurity.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction</p>
<p>03:15 – Building a genuine presence on LinkedIn</p>
<p>07:40 – Founding the Cybersecurity Gatebreakers Foundation</p>
<p>12:00 – Why hiring juniors is a win for cybersecurity</p>
<p>17:58 – Relationship building in cybersecurity</p>
<p>25:27 – Lessons from layoffs and overcoming failure</p>
<p>35:45 – Setting goals and attracting opportunities</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Naomi Buckwalter: <a href='https://www.linkedin.com/in/naomi-buckwalter/'>https://www.linkedin.com/in/naomi-buckwalter/</a></p>
<p>Learn more about the Cybersecurity Gatebreakers Foundation:<a href='https://www.breachlock.com/'> </a><a href='https://www.cybersecuritygatebreakers.org/'>https://www.cybersecuritygatebreakers.org/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p>

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth.</p>
<p>In this episode, Naomi challenges why industry hiring norms fall short, shares candid stories of her own missteps, and explains why humility and learning are just as important as technical skills in cybersecurity.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 – Introduction</p>
<p>03:15 – Building a genuine presence on LinkedIn</p>
<p>07:40 – Founding the Cybersecurity Gatebreakers Foundation</p>
<p>12:00 – Why hiring juniors is a win for cybersecurity</p>
<p>17:58 – Relationship building in cybersecurity</p>
<p>25:27 – Lessons from layoffs and overcoming failure</p>
<p>35:45 – Setting goals and attracting opportunities</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Naomi Buckwalter: <a href='https://www.linkedin.com/in/naomi-buckwalter/'>https://www.linkedin.com/in/naomi-buckwalter/</a></p>
<p>Learn more about the Cybersecurity Gatebreakers Foundation:<a href='https://www.breachlock.com/'> </a><a href='https://www.cybersecuritygatebreakers.org/'>https://www.cybersecuritygatebreakers.org/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p><br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qnmcfv6trdpjp48p/HVS_Episodes_NaomiBuckwalter.mp3" length="64797996" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, argues that fresh talent and open doors are crucial for industry growth.
In this episode, Naomi challenges why industry hiring norms fall short, shares candid stories of her own missteps, and explains why humility and learning are just as important as technical skills in cybersecurity.
 
Impactful Moments:
00:00 – Introduction
03:15 – Building a genuine presence on LinkedIn
07:40 – Founding the Cybersecurity Gatebreakers Foundation
12:00 – Why hiring juniors is a win for cybersecurity
17:58 – Relationship building in cybersecurity
25:27 – Lessons from layoffs and overcoming failure
35:45 – Setting goals and attracting opportunities

Links:
Connect with our guest, Naomi Buckwalter: https://www.linkedin.com/in/naomi-buckwalter/
Learn more about the Cybersecurity Gatebreakers Foundation: https://www.cybersecuritygatebreakers.org/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2620</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>350</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter</title>
        <itunes:title>AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ai-deepfakes-and-human-risk-in-cybersecurity-with-perry-carpenter/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ai-deepfakes-and-human-risk-in-cybersecurity-with-perry-carpenter/#comments</comments>        <pubDate>Tue, 22 Oct 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ae399632-dc94-3e9f-af42-0059919e00bf</guid>
                                    <description><![CDATA[<p>In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, to discuss the risks and the potential of synthetic media and human risk management.</p>
<p>Whether you’re worried about deepfakes or curious about AI’s role in creativity, this episode has something for everyone.</p>
Impactful Moments:
<ul><li style="font-weight:400;">00:00 – Intro</li>
<li style="font-weight:400;">00:49 – Synthetic voices surprise in mastermind</li>
<li style="font-weight:400;">01:42 – Perry’s new book FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</li>
<li style="font-weight:400;">03:42 – Psychology's role in cybersecurity</li>
<li style="font-weight:400;">06:07 – Human risk management explained</li>
<li style="font-weight:400;">09:14 – Deepfakes in fraud and scams</li>
<li style="font-weight:400;">15:13 – Demo of deepfake voices</li>
<li style="font-weight:400;">20:22 – Using cakes to explain large language models </li>
<li style="font-weight:400;">27:00 – AI helps overcome creative blocks</li>
<li style="font-weight:400;">32:00 – Managing AI hallucinations and risks</li>
</ul>
<p>Connect with our guest, Perry Carpenter: <a href='https://www.linkedin.com/in/perrycarpenter'>https://www.linkedin.com/in/perrycarpenter</a></p>
<p>Purchase a copy of Perry’s book FAIK here: <a href='https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885'>https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of <em>FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions,</em> to discuss the risks and the potential of synthetic media and human risk management.</p>
<p>Whether you’re worried about deepfakes or curious about AI’s role in creativity, this episode has something for everyone.</p>
Impactful Moments:
<ul><li style="font-weight:400;">00:00 – Intro</li>
<li style="font-weight:400;">00:49 – Synthetic voices surprise in mastermind</li>
<li style="font-weight:400;">01:42 – Perry’s new book FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions</li>
<li style="font-weight:400;">03:42 – Psychology's role in cybersecurity</li>
<li style="font-weight:400;">06:07 – Human risk management explained</li>
<li style="font-weight:400;">09:14 – Deepfakes in fraud and scams</li>
<li style="font-weight:400;">15:13 – Demo of deepfake voices</li>
<li style="font-weight:400;">20:22 – Using cakes to explain large language models </li>
<li style="font-weight:400;">27:00 – AI helps overcome creative blocks</li>
<li style="font-weight:400;">32:00 – Managing AI hallucinations and risks</li>
</ul>
<p>Connect with our guest, Perry Carpenter: <a href='https://www.linkedin.com/in/perrycarpenter'>https://www.linkedin.com/in/perrycarpenter</a></p>
<p>Purchase a copy of Perry’s book FAIK here: <a href='https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885'>https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pa5y8czum53rfem5/HVS_Episodes_PerryCarpenter.mp3" length="50229756" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, to discuss the risks and the potential of synthetic media and human risk management.
Whether you’re worried about deepfakes or curious about AI’s role in creativity, this episode has something for everyone.
Impactful Moments:
00:00 – Intro
00:49 – Synthetic voices surprise in mastermind
01:42 – Perry’s new book FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions
03:42 – Psychology's role in cybersecurity
06:07 – Human risk management explained
09:14 – Deepfakes in fraud and scams
15:13 – Demo of deepfake voices
20:22 – Using cakes to explain large language models 
27:00 – AI helps overcome creative blocks
32:00 – Managing AI hallucinations and risks
Connect with our guest, Perry Carpenter: https://www.linkedin.com/in/perrycarpenter
Purchase a copy of Perry’s book FAIK here: https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2034</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>349</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How to Become a True Security Leader with Nathan Case</title>
        <itunes:title>How to Become a True Security Leader with Nathan Case</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-to-become-a-true-security-leader-with-nathan-case/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-to-become-a-true-security-leader-with-nathan-case/#comments</comments>        <pubDate>Tue, 15 Oct 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b0441fb2-4630-394a-82f2-4b42416c9654</guid>
                                    <description><![CDATA[<p>How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact. </p>
<p>In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with leadership, the future of AI in cybersecurity, and what it takes to become a real leader in the security space. He also reflects on the importance of being chosen as a leader, rather than striving for the title.</p>
<p> </p>
Impactful Moments:
<p>00:00 – Introduction</p>
<p>02:31 – Journey from AWS to Clarity</p>
<p>04:00 – Cyber Dominance</p>
<p>05:55 – Leading Through M&amp;A</p>
<p>07:00 – Redefining the CISO Role</p>
<p>11:00 – Shared Security Responsibility</p>
<p>15:15 – Balancing Mission and Family</p>
<p>20:00 – AI in Security</p>
<p>28:30 – Leadership in Incident Response</p>
<p>32:00 – Woodworking and Perfectionism</p>
<p>35:00 – Leaders Are Chosen</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Nathan Case: <a href='https://www.linkedin.com/in/nathancase/'>https://www.linkedin.com/in/nathancase/</a></p>
<p>Check out Nathan and Ross Haleliuk's blog on Security Incident Response here: <a href='https://ventureinsecurity.net/p/a-different-take-on-security-incident'>https://ventureinsecurity.net/p/a-different-take-on-security-incident</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact. </p>
<p>In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with leadership, the future of AI in cybersecurity, and what it takes to become a real leader in the security space. He also reflects on the importance of being chosen as a leader, rather than striving for the title.</p>
<p> </p>
Impactful Moments:
<p>00:00 – Introduction</p>
<p>02:31 – Journey from AWS to Clarity</p>
<p>04:00 – Cyber Dominance</p>
<p>05:55 – Leading Through M&amp;A</p>
<p>07:00 – Redefining the CISO Role</p>
<p>11:00 – Shared Security Responsibility</p>
<p>15:15 – Balancing Mission and Family</p>
<p>20:00 – AI in Security</p>
<p>28:30 – Leadership in Incident Response</p>
<p>32:00 – Woodworking and Perfectionism</p>
<p>35:00 – Leaders Are Chosen</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Nathan Case: <a href='https://www.linkedin.com/in/nathancase/'>https://www.linkedin.com/in/nathancase/</a></p>
<p>Check out Nathan and Ross Haleliuk's blog on Security Incident Response here: <a href='https://ventureinsecurity.net/p/a-different-take-on-security-incident'>https://ventureinsecurity.net/p/a-different-take-on-security-incident</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ffgr4hxfei3t8x3g/HVS_Episodes_NathanCase_FINAL.mp3" length="34837838" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact. 
In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with leadership, the future of AI in cybersecurity, and what it takes to become a real leader in the security space. He also reflects on the importance of being chosen as a leader, rather than striving for the title.
 
Impactful Moments:
00:00 – Introduction
02:31 – Journey from AWS to Clarity
04:00 – Cyber Dominance
05:55 – Leading Through M&amp;A
07:00 – Redefining the CISO Role
11:00 – Shared Security Responsibility
15:15 – Balancing Mission and Family
20:00 – AI in Security
28:30 – Leadership in Incident Response
32:00 – Woodworking and Perfectionism
35:00 – Leaders Are Chosen

Links:
Connect with our guest, Nathan Case: https://www.linkedin.com/in/nathancase/
Check out Nathan and Ross Haleliuk's blog on Security Incident Response here: https://ventureinsecurity.net/p/a-different-take-on-security-incident
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2177</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>348</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>AI and the Future of Cyber Defense with John Hubbard</title>
        <itunes:title>AI and the Future of Cyber Defense with John Hubbard</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ai-and-the-future-of-cyber-defense-with-john-hubbard/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ai-and-the-future-of-cyber-defense-with-john-hubbard/#comments</comments>        <pubDate>Tue, 08 Oct 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/74bda928-7ed9-3ec1-9c9a-d4476c3beea8</guid>
                                    <description><![CDATA[<p>How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS.</p>
<p>John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams.</p>
<p>Impactful Moments:</p>
<ul><li style="font-weight:400;">00:00 – Introduction</li>
<li style="font-weight:400;">01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS</li>
<li style="font-weight:400;">02:30 – Overview of the SANS Cyber Defense Curriculum</li>
<li style="font-weight:400;">03:30 – The Role of AI in Cybersecurity</li>
<li style="font-weight:400;">05:30 – How AI is Shaping Threat Detection in SOCs</li>
<li style="font-weight:400;">09:00 – Automation and AI: Practical Use Cases</li>
<li style="font-weight:400;">15:00 – AI in Network Traffic Analysis</li>
<li style="font-weight:400;">19:00 – The Future of SOC Operations with AI</li>
</ul>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, John Hubbard: <a href='https://www.linkedin.com/in/johnlhubbard/'>https://www.linkedin.com/in/johnlhubbard/</a></p>
<p>Check out the SANS Cybersecurity Courses &amp; Certifications:<a href='https://www.breachlock.com/'> </a><a href='https://www.sans.org/cyber-security-courses/'>https://www.sans.org/cyber-security-courses/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS.</p>
<p>John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams.</p>
<p>Impactful Moments:</p>
<ul><li style="font-weight:400;">00:00 – Introduction</li>
<li style="font-weight:400;">01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS</li>
<li style="font-weight:400;">02:30 – Overview of the SANS Cyber Defense Curriculum</li>
<li style="font-weight:400;">03:30 – The Role of AI in Cybersecurity</li>
<li style="font-weight:400;">05:30 – How AI is Shaping Threat Detection in SOCs</li>
<li style="font-weight:400;">09:00 – Automation and AI: Practical Use Cases</li>
<li style="font-weight:400;">15:00 – AI in Network Traffic Analysis</li>
<li style="font-weight:400;">19:00 – The Future of SOC Operations with AI</li>
</ul>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, John Hubbard: <a href='https://www.linkedin.com/in/johnlhubbard/'>https://www.linkedin.com/in/johnlhubbard/</a></p>
<p>Check out the SANS Cybersecurity Courses &amp; Certifications:<a href='https://www.breachlock.com/'> </a><a href='https://www.sans.org/cyber-security-courses/'>https://www.sans.org/cyber-security-courses/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/byr3e9tj8v24qnpy/HVS_Episodes_JohnHubbard_FINAL_1_6ion0.mp3" length="51172909" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS.
John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams.
Impactful Moments:
00:00 – Introduction
01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS
02:30 – Overview of the SANS Cyber Defense Curriculum
03:30 – The Role of AI in Cybersecurity
05:30 – How AI is Shaping Threat Detection in SOCs
09:00 – Automation and AI: Practical Use Cases
15:00 – AI in Network Traffic Analysis
19:00 – The Future of SOC Operations with AI
 
Links:
Connect with our guest, John Hubbard: https://www.linkedin.com/in/johnlhubbard/
Check out the SANS Cybersecurity Courses &amp; Certifications: https://www.sans.org/cyber-security-courses/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2052</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>347</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How Adversaries Are Living Off The Dark Web with Jason Haddix</title>
        <itunes:title>How Adversaries Are Living Off The Dark Web with Jason Haddix</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-adversaries-are-living-off-the-dark-web/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-adversaries-are-living-off-the-dark-web/#comments</comments>        <pubDate>Tue, 01 Oct 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a723cbd3-524c-3dae-8915-66555e277739</guid>
                                    <description><![CDATA[<p>Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees? </p>
<p>In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting against malicious actors. Whether you're curious about data exposure or how threat actors operate, this conversation offers insights into the constant changes in cybersecurity.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:11 - The Basics of the Dark Web and How Criminals Operate</p>
<p>07:16 - Flare's Role in Cybersecurity</p>
<p>11:14 - Common Security Mistakes</p>
<p>20:04 - Pen Testing with Flare</p>
<p>21:33 - Exploiting Exposed Credentials</p>
<p>22:19 - Reconnaissance Tools and Techniques</p>
<p>24:38 - Email Security Concerns</p>
<p>28:43 - The Power of Stealer Logs</p>
<p>38:21 - Dark Web Tactics and AI</p>
<p>39:33 - Advice for Cybersecurity Leaders</p>
<p>42:04 - Exploring Flare’s Platform for Threat Intelligence</p>
<p>44:26 - Conclusion and Final Thoughts</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Jason Haddix: <a href='https://www.linkedin.com/in/jhaddix/'>https://www.linkedin.com/in/jhaddix/</a></p>
<p>Check out Flare here: <a href='https://try.flare.io/hacker-valley-media/'>https://try.flare.io/hacker-valley-media/</a></p>
<p>Check out Arcanum here: <a href='https://www.arcanum-sec.com/'>https://www.arcanum-sec.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees? </p>
<p>In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting against malicious actors. Whether you're curious about data exposure or how threat actors operate, this conversation offers insights into the constant changes in cybersecurity.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:11 - The Basics of the Dark Web and How Criminals Operate</p>
<p>07:16 - Flare's Role in Cybersecurity</p>
<p>11:14 - Common Security Mistakes</p>
<p>20:04 - Pen Testing with Flare</p>
<p>21:33 - Exploiting Exposed Credentials</p>
<p>22:19 - Reconnaissance Tools and Techniques</p>
<p>24:38 - Email Security Concerns</p>
<p>28:43 - The Power of Stealer Logs</p>
<p>38:21 - Dark Web Tactics and AI</p>
<p>39:33 - Advice for Cybersecurity Leaders</p>
<p>42:04 - Exploring Flare’s Platform for Threat Intelligence</p>
<p>44:26 - Conclusion and Final Thoughts</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Jason Haddix: <a href='https://www.linkedin.com/in/jhaddix/'>https://www.linkedin.com/in/jhaddix/</a></p>
<p>Check out Flare here: <a href='https://try.flare.io/hacker-valley-media/'>https://try.flare.io/hacker-valley-media/</a></p>
<p>Check out Arcanum here: <a href='https://www.arcanum-sec.com/'>https://www.arcanum-sec.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/93adaxx8kafiejbz/Episodes_FlareEp2_FINAL.mp3" length="68820350" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees? 
In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting against malicious actors. Whether you're curious about data exposure or how threat actors operate, this conversation offers insights into the constant changes in cybersecurity.
 
Impactful Moments:
00:00 - Introduction
01:11 - The Basics of the Dark Web and How Criminals Operate
07:16 - Flare's Role in Cybersecurity
11:14 - Common Security Mistakes
20:04 - Pen Testing with Flare
21:33 - Exploiting Exposed Credentials
22:19 - Reconnaissance Tools and Techniques
24:38 - Email Security Concerns
28:43 - The Power of Stealer Logs
38:21 - Dark Web Tactics and AI
39:33 - Advice for Cybersecurity Leaders
42:04 - Exploring Flare’s Platform for Threat Intelligence
44:26 - Conclusion and Final Thoughts

Links:
Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/
Check out Flare here: https://try.flare.io/hacker-valley-media/
Check out Arcanum here: https://www.arcanum-sec.com/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2695</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>346</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>AT&amp;T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan</title>
        <itunes:title>AT&amp;T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/att-dynamic-defense-security-before-it-reaches-your-companys-doorstep-with-senthil-ramakrishnan/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/att-dynamic-defense-security-before-it-reaches-your-companys-doorstep-with-senthil-ramakrishnan/#comments</comments>        <pubDate>Tue, 24 Sep 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e0c6a96e-476c-378d-abc9-530c075aa510</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&amp;T Business. </p>
<p>Senthil shares information about how a new product, AT&amp;T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evolving cybersecurity threats, including real-world examples like the Log4j vulnerability, and how its simplicity allows for a zero-touch experience.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:01 - Introducing guest, Senthil Ramakrishnan</p>
<p>04:01 - Security at the Network Edge</p>
<p>05:57 - Fitting in With Businesses</p>
<p>08:00 - “Can You Just Block It For Us?”</p>
<p>10:05 - Stopping Log4j</p>
<p>11:18 - Default Enabled Policy</p>
<p>15:57 - How Involved is the Customer?</p>
<p>16:40 - Simplifying Security for Customers</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Senthil Ramakrishnan:<a href='https://www.linkedin.com/in/senthil-ramakrishnan-66406b30/'> https://www.linkedin.com/in/senthil-ramakrishnan-66406b30/</a></p>
<p>Check out AT&amp;T Dynamic Defense™:</p>
<p><a href='https://www.business.att.com/products/att-dynamic-defense.html'>https://www.business.att.com/products/att-dynamic-defense.html</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&amp;T Business. </p>
<p>Senthil shares information about how a new product, AT&amp;T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evolving cybersecurity threats, including real-world examples like the Log4j vulnerability, and how its simplicity allows for a zero-touch experience.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:01 - Introducing guest, Senthil Ramakrishnan</p>
<p>04:01 - Security at the Network Edge</p>
<p>05:57 - Fitting in With Businesses</p>
<p>08:00 - “Can You Just Block It For Us?”</p>
<p>10:05 - Stopping Log4j</p>
<p>11:18 - Default Enabled Policy</p>
<p>15:57 - How Involved is the Customer?</p>
<p>16:40 - Simplifying Security for Customers</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Senthil Ramakrishnan:<a href='https://www.linkedin.com/in/senthil-ramakrishnan-66406b30/'> https://www.linkedin.com/in/senthil-ramakrishnan-66406b30/</a></p>
<p>Check out AT&amp;T Dynamic Defense™:</p>
<p><a href='https://www.business.att.com/products/att-dynamic-defense.html'>https://www.business.att.com/products/att-dynamic-defense.html</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vq89998x8aygfwbq/HVS_EPisodes_AT_T_Senthil_Final69nls.mp3" length="17612908" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&amp;T Business. 
Senthil shares information about how a new product, AT&amp;T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evolving cybersecurity threats, including real-world examples like the Log4j vulnerability, and how its simplicity allows for a zero-touch experience.
 
Impactful Moments:
00:00 - Welcome
01:01 - Introducing guest, Senthil Ramakrishnan
04:01 - Security at the Network Edge
05:57 - Fitting in With Businesses
08:00 - “Can You Just Block It For Us?”
10:05 - Stopping Log4j
11:18 - Default Enabled Policy
15:57 - How Involved is the Customer?
16:40 - Simplifying Security for Customers
 
Links:
Connect with our guest Senthil Ramakrishnan: https://www.linkedin.com/in/senthil-ramakrishnan-66406b30/
Check out AT&amp;T Dynamic Defense™:
https://www.business.att.com/products/att-dynamic-defense.html
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1100</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>345</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam</title>
        <itunes:title>Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/soft-skills-in-technical-sales-to-connect-and-sell-more-with-evgeniy-kharam/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/soft-skills-in-technical-sales-to-connect-and-sell-more-with-evgeniy-kharam/#comments</comments>        <pubDate>Tue, 17 Sep 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/66b5150d-e62d-3511-985c-53d3f14f4bf8</guid>
                                    <description><![CDATA[<p>Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. </p>
<p> </p>
<p>From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech.</p>
<p> </p>
<p>Evgeniy Kharam has authored “Architecting Success: The Art of Soft Skills and Technical Sales”, to teach the art of soft skills, and the importance of building connections through vulnerability.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:08 - Meet Evgeniy Kharam </p>
<p>02:21 - Ski &amp; Snowboard Cybersecurity Conference</p>
<p>06:22 - Impact of Events and Community Building</p>
<p>10:19 - ‘Architecting Success’</p>
<p>10:36 - Sales Engineers’ Evolving Role</p>
<p>25:58 - POCs and Soft Skills</p>
<p>28:01 - Your Voice: A Key Soft Skill</p>
<p>31:28 - Connect with Evgeniy</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Evgeniy Kharam: <a href='https://www.linkedin.com/in/ekharam/'>https://www.linkedin.com/in/ekharam/</a></p>
<p>Check out Evgeniy’s Book, “Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More“ here:<a href='https://www.breachlock.com/'> </a><a href='https://a.co/d/0xJSyew'>https://a.co/d/0xJSyew</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. </p>
<p> </p>
<p>From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech.</p>
<p> </p>
<p>Evgeniy Kharam has authored “Architecting Success: The Art of Soft Skills and Technical Sales”, to teach the art of soft skills, and the importance of building connections through vulnerability.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:08 - Meet Evgeniy Kharam </p>
<p>02:21 - Ski &amp; Snowboard Cybersecurity Conference</p>
<p>06:22 - Impact of Events and Community Building</p>
<p>10:19 - ‘Architecting Success’</p>
<p>10:36 - Sales Engineers’ Evolving Role</p>
<p>25:58 - POCs and Soft Skills</p>
<p>28:01 - Your Voice: A Key Soft Skill</p>
<p>31:28 - Connect with Evgeniy</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Evgeniy Kharam: <a href='https://www.linkedin.com/in/ekharam/'>https://www.linkedin.com/in/ekharam/</a></p>
<p>Check out Evgeniy’s Book, “Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More“ here:<a href='https://www.breachlock.com/'> </a><a href='https://a.co/d/0xJSyew'>https://a.co/d/0xJSyew</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vqtwjxyruv7ytcvx/HVS_Evgeniy_Kharam_FINALbdrs3.mp3" length="47321855" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. 
 
From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech.
 
Evgeniy Kharam has authored “Architecting Success: The Art of Soft Skills and Technical Sales”, to teach the art of soft skills, and the importance of building connections through vulnerability.
 
Impactful Moments:
00:00 - Introduction
01:08 - Meet Evgeniy Kharam 
02:21 - Ski &amp; Snowboard Cybersecurity Conference
06:22 - Impact of Events and Community Building
10:19 - ‘Architecting Success’
10:36 - Sales Engineers’ Evolving Role
25:58 - POCs and Soft Skills
28:01 - Your Voice: A Key Soft Skill
31:28 - Connect with Evgeniy
 
Links:
Connect with our guest, Evgeniy Kharam: https://www.linkedin.com/in/ekharam/
Check out Evgeniy’s Book, “Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More“ here: https://a.co/d/0xJSyew
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1889</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>344</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix</title>
        <itunes:title>Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/recon-like-an-adversary-uncovering-modern-techniques-in-attack-surface-management-with-jason-haddix/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/recon-like-an-adversary-uncovering-modern-techniques-in-attack-surface-management-with-jason-haddix/#comments</comments>        <pubDate>Tue, 10 Sep 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/76368d7e-e421-336b-ab95-a03c6ad155d7</guid>
                                    <description><![CDATA[<p>Ever wondered how the best defenders become unstoppable? They think like the attackers. In this episode with Jason Haddix, we reveal the strategies hackers don’t want you to know about and show you how to use them to your advantage.</p>
<p>Jason, CEO of Arcanum Information Security and Field CISO at Flare, helps us step into the mind of a hacker. With stories and insights that will change how you think about cybersecurity, he talks about the tactics that can turn any security program into a fortress. From exploiting the overlooked to using AI for unbeatable defense, this conversation will revolutionize your approach to cybersecurity.</p>
<p> </p>
<p>00:00 Introduction</p>
<p>01:29 Jason Haddix, CEO at Arcanum and Field CISO for Flare</p>
<p>04:48 Origins of Arcanum</p>
<p>07:04 Recon in Cybersecurity</p>
<p>12:22 Recon Discoveries</p>
<p>27:41 Flare's Role in Credential Management</p>
<p>33:47 Tooling for Small Businesses</p>
<p>35:47 Using AI for Cybersecurity</p>
<p>41:23 Flare Platform Deep Dive</p>
<p>43:20 Conclusion</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Jason Haddix: <a href='https://www.linkedin.com/in/jhaddix/'>https://www.linkedin.com/in/jhaddix/</a></p>
<p>Check out Flare here: <a href='https://try.flare.io/hacker-valley-media/'>https://try.flare.io/hacker-valley-media/</a></p>
<p>Check out Arcanum here: <a href='https://www.arcanum-sec.com/'>https://www.arcanum-sec.com/</a></p>
<p>

</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ever wondered how the best defenders become unstoppable? They think like the attackers. In this episode with Jason Haddix, we reveal the strategies hackers don’t want you to know about and show you how to use them to your advantage.</p>
<p>Jason, CEO of Arcanum Information Security and Field CISO at Flare, helps us step into the mind of a hacker. With stories and insights that will change how you think about cybersecurity, he talks about the tactics that can turn any security program into a fortress. From exploiting the overlooked to using AI for unbeatable defense, this conversation will revolutionize your approach to cybersecurity.</p>
<p> </p>
<p>00:00 Introduction</p>
<p>01:29 Jason Haddix, CEO at Arcanum and Field CISO for Flare</p>
<p>04:48 Origins of Arcanum</p>
<p>07:04 Recon in Cybersecurity</p>
<p>12:22 Recon Discoveries</p>
<p>27:41 Flare's Role in Credential Management</p>
<p>33:47 Tooling for Small Businesses</p>
<p>35:47 Using AI for Cybersecurity</p>
<p>41:23 Flare Platform Deep Dive</p>
<p>43:20 Conclusion</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Jason Haddix: <a href='https://www.linkedin.com/in/jhaddix/'>https://www.linkedin.com/in/jhaddix/</a></p>
<p>Check out Flare here: <a href='https://try.flare.io/hacker-valley-media/'>https://try.flare.io/hacker-valley-media/</a></p>
<p>Check out Arcanum here: <a href='https://www.arcanum-sec.com/'>https://www.arcanum-sec.com/</a></p>
<p><br>
<br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4k69ewje5je55qej/Episodes_FlareJasonHaddix_Final.mp3" length="69067971" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ever wondered how the best defenders become unstoppable? They think like the attackers. In this episode with Jason Haddix, we reveal the strategies hackers don’t want you to know about and show you how to use them to your advantage.
Jason, CEO of Arcanum Information Security and Field CISO at Flare, helps us step into the mind of a hacker. With stories and insights that will change how you think about cybersecurity, he talks about the tactics that can turn any security program into a fortress. From exploiting the overlooked to using AI for unbeatable defense, this conversation will revolutionize your approach to cybersecurity.
 
00:00 Introduction
01:29 Jason Haddix, CEO at Arcanum and Field CISO for Flare
04:48 Origins of Arcanum
07:04 Recon in Cybersecurity
12:22 Recon Discoveries
27:41 Flare's Role in Credential Management
33:47 Tooling for Small Businesses
35:47 Using AI for Cybersecurity
41:23 Flare Platform Deep Dive
43:20 Conclusion
 
Links:
Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/
Check out Flare here: https://try.flare.io/hacker-valley-media/
Check out Arcanum here: https://www.arcanum-sec.com/

Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2762</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>343</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>I Failed Over 300 Times Trying To Get Into Security ft. Joe South</title>
        <itunes:title>I Failed Over 300 Times Trying To Get Into Security ft. Joe South</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/i-failed-over-300-times-trying-to-get-into-security-ft-joe-south/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/i-failed-over-300-times-trying-to-get-into-security-ft-joe-south/#comments</comments>        <pubDate>Tue, 03 Sep 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/10c3b75a-08b9-3574-a8f7-bb33e6fc5944</guid>
                                    <description><![CDATA[<p>Joe South is a testament to resilience, unconventional decisions, and finding success in unexpected places. If you’ve ever felt stuck in a rut or on the verge of giving up, Joe’s experience might be the jolt you need to keep pushing forward.</p>
<p>Joe, Principal Security Engineer and host of the “Security Unfiltered” podcast, shares his journey into cybersecurity and battling depression after being rejected more than 300 times when applying for security roles. Joe shares advice on breaking into cybersecurity, dealing with rejection, the importance of mentorship, and staying persistent.</p>
<p> </p>
<p>00:00 Introduction</p>
<p>01:00 Joe South, Principal Security Engineer and Host of the Security Unfiltered podcast</p>
<p>02:34 Early Career Struggles and Breakthrough</p>
<p>03:59 The Turning Point: From Help Desk to Cybersecurity</p>
<p>06:44 Rejection and Finding Success</p>
<p>11:17 Advice for Aspiring Cybersecurity Professionals</p>
<p>16:19 The Importance of Continuous Learning in Cybersecurity</p>
<p>18:10 Join the Hacker Valley Creative Mastermind!</p>
<p>19:10 Securing AI Models: Challenges and Strategies</p>
<p>20:10 The Importance of Communication in Security</p>
<p>21:22 Experience and Career Advancement</p>
<p>21:52 Rethinking Success: The Value of Being Number Two</p>
<p>23:57 Pressure and Rewards of Being a CISO</p>
<p>26:16 The Benefits of Podcasting and Content Creation</p>
<p>32:28 Balancing Personal and Public Information</p>
<p>35:27 Overcoming Adversity and Putting Yourself Out There</p>
<p>38:01 Final Thoughts and Advice for Aspiring Content Creators</p>
<p>

</p>
<p>Links:</p>
<p>Connect with our guest, Joe South: <a href='https://www.linkedin.com/in/joseph-south/'>https://www.linkedin.com/in/joseph-south/</a></p>
<p>Check out the Security Unfiltered podcast here: <a href='https://securityunfiltered.com'>https://securityunfiltered.com</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Joe South is a testament to resilience, unconventional decisions, and finding success in unexpected places. If you’ve ever felt stuck in a rut or on the verge of giving up, Joe’s experience might be the jolt you need to keep pushing forward.</p>
<p>Joe, Principal Security Engineer and host of the “Security Unfiltered” podcast, shares his journey into cybersecurity and battling depression after being rejected more than 300 times when applying for security roles. Joe shares advice on breaking into cybersecurity, dealing with rejection, the importance of mentorship, and staying persistent.</p>
<p> </p>
<p>00:00 Introduction</p>
<p>01:00 Joe South, Principal Security Engineer and Host of the Security Unfiltered podcast</p>
<p>02:34 Early Career Struggles and Breakthrough</p>
<p>03:59 The Turning Point: From Help Desk to Cybersecurity</p>
<p>06:44 Rejection and Finding Success</p>
<p>11:17 Advice for Aspiring Cybersecurity Professionals</p>
<p>16:19 The Importance of Continuous Learning in Cybersecurity</p>
<p>18:10 Join the Hacker Valley Creative Mastermind!</p>
<p>19:10 Securing AI Models: Challenges and Strategies</p>
<p>20:10 The Importance of Communication in Security</p>
<p>21:22 Experience and Career Advancement</p>
<p>21:52 Rethinking Success: The Value of Being Number Two</p>
<p>23:57 Pressure and Rewards of Being a CISO</p>
<p>26:16 The Benefits of Podcasting and Content Creation</p>
<p>32:28 Balancing Personal and Public Information</p>
<p>35:27 Overcoming Adversity and Putting Yourself Out There</p>
<p>38:01 Final Thoughts and Advice for Aspiring Content Creators</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Connect with our guest, Joe South: <a href='https://www.linkedin.com/in/joseph-south/'>https://www.linkedin.com/in/joseph-south/</a></p>
<p>Check out the Security Unfiltered podcast here: <a href='https://securityunfiltered.com'>https://securityunfiltered.com</a></p>
<p> </p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/85vy2eeir2vqte8j/JoeSouth_Final.mp3" length="62092438" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Joe South is a testament to resilience, unconventional decisions, and finding success in unexpected places. If you’ve ever felt stuck in a rut or on the verge of giving up, Joe’s experience might be the jolt you need to keep pushing forward.
Joe, Principal Security Engineer and host of the “Security Unfiltered” podcast, shares his journey into cybersecurity and battling depression after being rejected more than 300 times when applying for security roles. Joe shares advice on breaking into cybersecurity, dealing with rejection, the importance of mentorship, and staying persistent.
 
00:00 Introduction
01:00 Joe South, Principal Security Engineer and Host of the Security Unfiltered podcast
02:34 Early Career Struggles and Breakthrough
03:59 The Turning Point: From Help Desk to Cybersecurity
06:44 Rejection and Finding Success
11:17 Advice for Aspiring Cybersecurity Professionals
16:19 The Importance of Continuous Learning in Cybersecurity
18:10 Join the Hacker Valley Creative Mastermind!
19:10 Securing AI Models: Challenges and Strategies
20:10 The Importance of Communication in Security
21:22 Experience and Career Advancement
21:52 Rethinking Success: The Value of Being Number Two
23:57 Pressure and Rewards of Being a CISO
26:16 The Benefits of Podcasting and Content Creation
32:28 Balancing Personal and Public Information
35:27 Overcoming Adversity and Putting Yourself Out There
38:01 Final Thoughts and Advice for Aspiring Content Creators

Links:
Connect with our guest, Joe South: https://www.linkedin.com/in/joseph-south/
Check out the Security Unfiltered podcast here: https://securityunfiltered.com
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2412</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>342</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cybersecurity Challenges: AI, Burnout, and Insider Threats with Kayla Williams</title>
        <itunes:title>Cybersecurity Challenges: AI, Burnout, and Insider Threats with Kayla Williams</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cybersecurity-challenges-ai-burnout-and-insider-threats-with-kayla-williams/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cybersecurity-challenges-ai-burnout-and-insider-threats-with-kayla-williams/#comments</comments>        <pubDate>Tue, 27 Aug 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/bcde0ea5-4002-3d24-8e40-125eabfd3302</guid>
                                    <description><![CDATA[<p>At Black Hat 2024, we sat down with Kayla Williams, Chief Information Security Officer at Devo, to discuss her career journey, the role of AI in cybersecurity, and the pervasive issue of burnout among SOC analysts. Through her research with Wakefield Research, Kayla and her team discovered that 83% of IT professionals are burnt out due to stress, lack of sleep, and anxiety. IT and Security burnout leads to breaches.</p>
<p>For the past 4 years, Devo has been hosting SOC Analyst Appreciation Day, a virtual event where they shower SOC analysts with the love, appreciation and recognition that they deserve.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:25 - Kayla Williams, Chief Information Security Officer at Devo</p>
<p>01:38 - How Kayla Became a CISO</p>
<p>03:06 - Challenges and Rewards</p>
<p>04:23 - Burnout in Cybersecurity</p>
<p>04:31 - 83% of IT professionals are Burnt Out</p>
<p>09:38 - How AI Fits into the SOC</p>
<p>09:59 - Key Use Cases for AI in Cybersecurity</p>
<p>15:07 - Insider Threat and Employees Stealing Company Data</p>
<p>18:14 - Non-Traditional Paths into Cybersecurity</p>
<p>21:00 - Future of Cybersecurity and AI</p>
<p>22:31 - Advice for Aspiring CISOs</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Kayla Williams: <a href='https://www.linkedin.com/in/kaylamwilliams1/'>https://www.linkedin.com/in/kaylamwilliams1/</a></p>
<p>Check out Devo: <a href='https://www.devo.com/'>https://www.devo.com/</a>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>At Black Hat 2024, we sat down with Kayla Williams, Chief Information Security Officer at Devo, to discuss her career journey, the role of AI in cybersecurity, and the pervasive issue of burnout among SOC analysts. Through her research with Wakefield Research, Kayla and her team discovered that 83% of IT professionals are burnt out due to stress, lack of sleep, and anxiety. IT and Security burnout leads to breaches.</p>
<p>For the past 4 years, Devo has been hosting SOC Analyst Appreciation Day, a virtual event where they shower SOC analysts with the love, appreciation and recognition that they deserve.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:25 - Kayla Williams, Chief Information Security Officer at Devo</p>
<p>01:38 - How Kayla Became a CISO</p>
<p>03:06 - Challenges and Rewards</p>
<p>04:23 - Burnout in Cybersecurity</p>
<p>04:31 - 83% of IT professionals are Burnt Out</p>
<p>09:38 - How AI Fits into the SOC</p>
<p>09:59 - Key Use Cases for AI in Cybersecurity</p>
<p>15:07 - Insider Threat and Employees Stealing Company Data</p>
<p>18:14 - Non-Traditional Paths into Cybersecurity</p>
<p>21:00 - Future of Cybersecurity and AI</p>
<p>22:31 - Advice for Aspiring CISOs</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Kayla Williams: <a href='https://www.linkedin.com/in/kaylamwilliams1/'>https://www.linkedin.com/in/kaylamwilliams1/</a></p>
<p>Check out Devo: <a href='https://www.devo.com/'>https://www.devo.com/</a><br>
</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vy89z3d5faq9fvf8/Episodes_Devo_KaylaWilliams.mp3" length="36111212" type="audio/mpeg"/>
        <itunes:summary><![CDATA[At Black Hat 2024, we sat down with Kayla Williams, Chief Information Security Officer at Devo, to discuss her career journey, the role of AI in cybersecurity, and the pervasive issue of burnout among SOC analysts. Through her research with Wakefield Research, Kayla and her team discovered that 83% of IT professionals are burnt out due to stress, lack of sleep, and anxiety. IT and Security burnout leads to breaches.
For the past 4 years, Devo has been hosting SOC Analyst Appreciation Day, a virtual event where they shower SOC analysts with the love, appreciation and recognition that they deserve.
 
Impactful Moments:
00:00 - Introduction
01:25 - Kayla Williams, Chief Information Security Officer at Devo
01:38 - How Kayla Became a CISO
03:06 - Challenges and Rewards
04:23 - Burnout in Cybersecurity
04:31 - 83% of IT professionals are Burnt Out
09:38 - How AI Fits into the SOC
09:59 - Key Use Cases for AI in Cybersecurity
15:07 - Insider Threat and Employees Stealing Company Data
18:14 - Non-Traditional Paths into Cybersecurity
21:00 - Future of Cybersecurity and AI
22:31 - Advice for Aspiring CISOs
 
Links:
Connect with our guest, Kayla Williams: https://www.linkedin.com/in/kaylamwilliams1/
Check out Devo: https://www.devo.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1479</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>341</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Offensive Security: Unlocking Hidden ROI with Seemant Sehgal</title>
        <itunes:title>Offensive Security: Unlocking Hidden ROI with Seemant Sehgal</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/offensive-security-unlocking-hidden-roi-with-seemant-sehgal/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/offensive-security-unlocking-hidden-roi-with-seemant-sehgal/#comments</comments>        <pubDate>Fri, 16 Aug 2024 13:29:19 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/725bcb5c-2f31-3ce1-b4cb-f7887dbff3f4</guid>
                                    <description><![CDATA[<p>In this episode, Ron sits down at Black Hat with guest <a href='https://en.wikipedia.org/wiki/Seemant_Sehgal'>Seemant Sehgal</a>, Founder &amp; CEO of BreachLock, to learn more about how offensive security, such as red teaming and pen testing, fits into the cyber ecosystem. <a href='https://en.wikipedia.org/wiki/Seemant_Sehgal'>Seemant</a> highlights how his background as a practitioner has helped him better understand the pain points that customers feel and assist them in making the most of their budget.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:50 - Introducing Guest, <a href='https://en.wikipedia.org/wiki/Seemant_Sehgal'>Seemant Sehgal</a></p>
<p>02:47 - Penetration Testing vs Red Teaming</p>
<p>05:22 - What A Hacker Wants</p>
<p>06:17 - From our Sponsor, BreachLock</p>
<p>07:35 - There’s Always A ‘Low Hanging Fruit’</p>
<p>08:49 - Trusted Partners</p>
<p>10:49 - Closing Doors On Hackers</p>
<p>13:08 - Advice to Entrepreneurs: Knowing Your ‘Why’</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Seemant Sehgal:<a href='https://www.linkedin.com/in/s-sehgal/'> https://www.linkedin.com/in/s-sehgal/</a></p>
<p>Check out BreachLock:<a href='https://www.breachlock.com/'> https://www.breachlock.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron sits down at Black Hat with guest <a href='https://en.wikipedia.org/wiki/Seemant_Sehgal'>Seemant Sehgal</a>, Founder &amp; CEO of BreachLock, to learn more about how offensive security, such as red teaming and pen testing, fits into the cyber ecosystem. <a href='https://en.wikipedia.org/wiki/Seemant_Sehgal'>Seemant</a> highlights how his background as a practitioner has helped him better understand the pain points that customers feel and assist them in making the most of their budget.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:50 - Introducing Guest, <a href='https://en.wikipedia.org/wiki/Seemant_Sehgal'>Seemant Sehgal</a></p>
<p>02:47 - Penetration Testing vs Red Teaming</p>
<p>05:22 - What A Hacker Wants</p>
<p>06:17 - From our Sponsor, BreachLock</p>
<p>07:35 - There’s Always A ‘Low Hanging Fruit’</p>
<p>08:49 - Trusted Partners</p>
<p>10:49 - Closing Doors On Hackers</p>
<p>13:08 - Advice to Entrepreneurs: Knowing Your ‘Why’</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Seemant Sehgal:<a href='https://www.linkedin.com/in/s-sehgal/'> https://www.linkedin.com/in/s-sehgal/</a></p>
<p>Check out BreachLock:<a href='https://www.breachlock.com/'> https://www.breachlock.com/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4xt9a64nuhnx4zfg/Episodes_BreachLock_Offensive_Security_Unlocking_Hidden_ROI_with_Seemant_Sehgal7ipc7.mp3" length="22487535" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron sits down at Black Hat with guest Seemant Sehgal, Founder &amp; CEO of BreachLock, to learn more about how offensive security, such as red teaming and pen testing, fits into the cyber ecosystem. Seemant highlights how his background as a practitioner has helped him better understand the pain points that customers feel and assist them in making the most of their budget.
Impactful Moments:
00:00 - Welcome
00:50 - Introducing Guest, Seemant Sehgal
02:47 - Penetration Testing vs Red Teaming
05:22 - What A Hacker Wants
06:17 - From our Sponsor, BreachLock
07:35 - There’s Always A ‘Low Hanging Fruit’
08:49 - Trusted Partners
10:49 - Closing Doors On Hackers
13:08 - Advice to Entrepreneurs: Knowing Your ‘Why’
 
Links:
Connect with our guest, Seemant Sehgal: https://www.linkedin.com/in/s-sehgal/
Check out BreachLock: https://www.breachlock.com/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>915</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>340</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Black Hat 2024 Conference Pre-Game</title>
        <itunes:title>Black Hat 2024 Conference Pre-Game</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/black-hat-2024-conference-pre-game/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/black-hat-2024-conference-pre-game/#comments</comments>        <pubDate>Fri, 09 Aug 2024 09:49:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a0269ce1-b969-37b7-b2f3-6d72a4144fe3</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Jen welcome you to Vegas and discuss a little background on Black Hat and DEF CON and how to make the most of your time professionally.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:56 - Hello From Vegas!</p>
<p>01:41 - Conference Anxiety</p>
<p>03:43 - Origins of Black Hat</p>
<p>06:17 - Which Conference?</p>
<p>08:18 - Conference Strategy</p>
<p>11:47+ - You Can Only Pick One…</p>
<p> </p>
<p>Links:</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Jen welcome you to Vegas and discuss a little background on Black Hat and DEF CON and how to make the most of your time professionally.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:56 - Hello From Vegas!</p>
<p>01:41 - Conference Anxiety</p>
<p>03:43 - Origins of Black Hat</p>
<p>06:17 - Which Conference?</p>
<p>08:18 - Conference Strategy</p>
<p>11:47+ - You Can Only Pick One…</p>
<p> </p>
<p>Links:</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/f357583bba8e9qhc/HVS_episodes_08-07-24_BlackHat_Audio_1_9egf1.mp3" length="19457054" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Jen welcome you to Vegas and discuss a little background on Black Hat and DEF CON and how to make the most of your time professionally.
Impactful Moments:
00:00 - Welcome
00:56 - Hello From Vegas!
01:41 - Conference Anxiety
03:43 - Origins of Black Hat
06:17 - Which Conference?
08:18 - Conference Strategy
11:47+ - You Can Only Pick One…
 
Links:
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>797</itunes:duration>
                <itunes:episode>339</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Present and Future of AI in Cyber</title>
        <itunes:title>The Present and Future of AI in Cyber</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-present-and-future-of-ai-in-cyber/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-present-and-future-of-ai-in-cyber/#comments</comments>        <pubDate>Tue, 30 Jul 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/658e084a-f16f-3a94-8785-f01a09e6078c</guid>
                                    <description><![CDATA[<p>In this episode, Hosts Ron Eddings and Jen Langdon discuss questions about AI in Cyber. From the current state to where AI could be going, to resources to help you engage and up-level, there’s a little bit of everything for everyone in this episode.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:46 - Introduction</p>
<p>02:29 - Engineering AI</p>
<p>06:54 - Was it Made By AI?</p>
<p>09:07 - Join Our Mastermind</p>
<p>10:15 - AI in the Future</p>
<p>13:26 - AI in 2044</p>
<p>17:56 - AI &amp; Resources</p>
<p>19:40 - AI Resources!</p>
<p>20:55 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Check out some resources shared during this episode:</p>
<p><a href='https://www.futuretools.io/'>https://www.futuretools.io/</a>   <a href='https://theresanaiforthat.com/'>https://theresanaiforthat.com/</a></p>
<p><a href='https://www.google.com/books/edition/On_Intelligence/Qg2dmntfxmQC?hl=en&amp;gbpv=0'>https://www.google.com/books/edition/On_Intelligence/Qg2dmntfxmQC?hl=en&amp;gbpv=0</a></p>
<p><a href='https://www.youtube.com/channel/UCbfYPyITQ-7l4upoX8nvctg'>https://www.youtube.com/channel/UCbfYPyITQ-7l4upoX8nvctg</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Hosts Ron Eddings and Jen Langdon discuss questions about AI in Cyber. From the current state to where AI could be going, to resources to help you engage and up-level, there’s a little bit of everything for everyone in this episode.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:46 - Introduction</p>
<p>02:29 - Engineering AI</p>
<p>06:54 - Was it Made By AI?</p>
<p>09:07 - Join Our Mastermind</p>
<p>10:15 - AI in the Future</p>
<p>13:26 - AI in 2044</p>
<p>17:56 - AI &amp; Resources</p>
<p>19:40 - AI Resources!</p>
<p>20:55 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Check out some resources shared during this episode:</p>
<p><a href='https://www.futuretools.io/'>https://www.futuretools.io/</a>   <a href='https://theresanaiforthat.com/'>https://theresanaiforthat.com/</a></p>
<p><a href='https://www.google.com/books/edition/On_Intelligence/Qg2dmntfxmQC?hl=en&amp;gbpv=0'>https://www.google.com/books/edition/On_Intelligence/Qg2dmntfxmQC?hl=en&amp;gbpv=0</a></p>
<p><a href='https://www.youtube.com/channel/UCbfYPyITQ-7l4upoX8nvctg'>https://www.youtube.com/channel/UCbfYPyITQ-7l4upoX8nvctg</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/558de8ju2bygubir/HVS_Episode_07-30_AI-in-Cyber.mp3" length="35994087" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Hosts Ron Eddings and Jen Langdon discuss questions about AI in Cyber. From the current state to where AI could be going, to resources to help you engage and up-level, there’s a little bit of everything for everyone in this episode.
 
Impactful Moments:
00:00 - Welcome
00:46 - Introduction
02:29 - Engineering AI
06:54 - Was it Made By AI?
09:07 - Join Our Mastermind
10:15 - AI in the Future
13:26 - AI in 2044
17:56 - AI &amp; Resources
19:40 - AI Resources!
20:55 - One Step Better…
 
Links:
Check out some resources shared during this episode:
https://www.futuretools.io/   https://theresanaiforthat.com/
https://www.google.com/books/edition/On_Intelligence/Qg2dmntfxmQC?hl=en&amp;gbpv=0
https://www.youtube.com/channel/UCbfYPyITQ-7l4upoX8nvctg
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1438</itunes:duration>
                <itunes:episode>338</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Leaving an Impression: Strategies for Captivating a Massive Audience</title>
        <itunes:title>Leaving an Impression: Strategies for Captivating a Massive Audience</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/leaving-an-impression-strategies-for-captivating-a-massive-audience/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/leaving-an-impression-strategies-for-captivating-a-massive-audience/#comments</comments>        <pubDate>Tue, 23 Jul 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/df409e92-5a1b-3461-beef-6a91a8064fc3</guid>
                                    <description><![CDATA[<p>In this episode, hosts Ron Eddings and Jen Langdon discuss the power of storytelling through various media. Whether your goal is to create video content, deliver keynotes on stage, or be creative through other digital mediums, there will be something for everyone!</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:05 - Introductions</p>
<p>04:55 - Storytelling in Story Circle</p>
<p>09:23 - Crossing Across the Story Circle</p>
<p>12:15 - Join Our Mastermind!</p>
<p>12:57 - Is ‘Speaking’ Your Thing?</p>
<p>19:33 - Audience Considerations</p>
<p>22:24 - Speaking vs Writing</p>
<p>25:24 - Video/Digital Media</p>
<p>28:30 - Making it Captivating</p>
<p>32:03 - Last Reminders…</p>
<p> </p>
<p>Links:</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, hosts Ron Eddings and Jen Langdon discuss the power of storytelling through various media. Whether your goal is to create video content, deliver keynotes on stage, or be creative through other digital mediums, there will be something for everyone!</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:05 - Introductions</p>
<p>04:55 - Storytelling in Story Circle</p>
<p>09:23 - Crossing Across the Story Circle</p>
<p>12:15 - Join Our Mastermind!</p>
<p>12:57 - Is ‘Speaking’ Your Thing?</p>
<p>19:33 - Audience Considerations</p>
<p>22:24 - Speaking vs Writing</p>
<p>25:24 - Video/Digital Media</p>
<p>28:30 - Making it Captivating</p>
<p>32:03 - Last Reminders…</p>
<p> </p>
<p>Links:</p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bhdzrhymh2j97xai/HVS_CaptivatingStorytelling.mp3" length="48863380" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, hosts Ron Eddings and Jen Langdon discuss the power of storytelling through various media. Whether your goal is to create video content, deliver keynotes on stage, or be creative through other digital mediums, there will be something for everyone!
Impactful Moments:
00:00 - Welcome
01:05 - Introductions
04:55 - Storytelling in Story Circle
09:23 - Crossing Across the Story Circle
12:15 - Join Our Mastermind!
12:57 - Is ‘Speaking’ Your Thing?
19:33 - Audience Considerations
22:24 - Speaking vs Writing
25:24 - Video/Digital Media
28:30 - Making it Captivating
32:03 - Last Reminders…
 
Links:
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1949</itunes:duration>
                <itunes:episode>337</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How Can I Best Proactively Secure My SaaS?</title>
        <itunes:title>How Can I Best Proactively Secure My SaaS?</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-can-i-best-proactively-secure-my-saas/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-can-i-best-proactively-secure-my-saas/#comments</comments>        <pubDate>Wed, 17 Jul 2024 04:46:20 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3bc0672b-6f81-3444-8aa9-d88d978abc42</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder &amp; CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:59 - Introducing guest, Yoni Shohet</p>
<p>03:25 - Founding A SaaS Security Company</p>
<p>06:30 - What is SSPM?</p>
<p>08:27 - From our Sponsor, Valence</p>
<p>09:30 - Before Clicking ‘Allow’</p>
<p>11:54 - Users Want Their LLMs!</p>
<p>14:37 - Common Missteps</p>
<p>19:08 - Can You Manage SaaS w/o Technology?</p>
<p>24:15 - SaaS Breaches &amp; MFA &amp; APIs</p>
<p>32:42 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Yoni Shohet:<a href='https://www.linkedin.com/in/yonishohet/'> https://www.linkedin.com/in/yonishohet/</a></p>
<p>Check out Valence Security:<a href='https://www.valencesecurity.com'> https://www.valencesecurity.com</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder &amp; CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:59 - Introducing guest, Yoni Shohet</p>
<p>03:25 - Founding A SaaS Security Company</p>
<p>06:30 - What is SSPM?</p>
<p>08:27 - From our Sponsor, Valence</p>
<p>09:30 - Before Clicking ‘Allow’</p>
<p>11:54 - Users Want Their LLMs!</p>
<p>14:37 - Common Missteps</p>
<p>19:08 - Can You Manage SaaS w/o Technology?</p>
<p>24:15 - SaaS Breaches &amp; MFA &amp; APIs</p>
<p>32:42 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Yoni Shohet:<a href='https://www.linkedin.com/in/yonishohet/'> https://www.linkedin.com/in/yonishohet/</a></p>
<p>Check out Valence Security:<a href='https://www.valencesecurity.com'> https://www.valencesecurity.com</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/tfgqabpq6z3zaigd/HVM_Episodes_Valence_Yoni_Final.mp3" length="52009743" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder &amp; CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution.
Impactful Moments:
00:00 - Welcome
01:59 - Introducing guest, Yoni Shohet
03:25 - Founding A SaaS Security Company
06:30 - What is SSPM?
08:27 - From our Sponsor, Valence
09:30 - Before Clicking ‘Allow’
11:54 - Users Want Their LLMs!
14:37 - Common Missteps
19:08 - Can You Manage SaaS w/o Technology?
24:15 - SaaS Breaches &amp; MFA &amp; APIs
32:42 - One Step Better…
 
Links:
Connect with our guest, Yoni Shohet: https://www.linkedin.com/in/yonishohet/
Check out Valence Security: https://www.valencesecurity.com
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2076</itunes:duration>
                <itunes:episode>336</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What We All Should Be Talking About When It Comes to AI and Security</title>
        <itunes:title>What We All Should Be Talking About When It Comes to AI and Security</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-we-all-should-be-talking-about-when-it-comes-to-ai-and-security-with-anirban-banerjee-and-james-berthoty/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-we-all-should-be-talking-about-when-it-comes-to-ai-and-security-with-anirban-banerjee-and-james-berthoty/#comments</comments>        <pubDate>Tue, 09 Jul 2024 17:09:37 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/59667ab8-1a7f-3e0a-b27b-1699d26c7055</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings is joined by guests Anirban Banerjee, CEO and Co-Founder at Riscosity, and James Berthoty, Founder and Analyst at Latio Tech. Together they focus on data security, AI-driven product development, and the challenges of implementing AI solutions responsibly.</p>
<p>Anirban discusses the importance of organizational buy-in and well-defined policies, while James underscores the need for visibility and a cautious approach in integrating AI models. Be sure to tune in to the end to hear their unique advice at being more productive.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guests Anirban &amp; James</p>
<p>04:15 - The State of AI through Cyber</p>
<p>08:25 - Is AI a New Technology?</p>
<p>10:31 - AI Lets You Ship A Product</p>
<p>16:44 - Pros/Cons of AI &amp; DLP</p>
<p>23:57 - What SHOULD We Be Talking About?</p>
<p>27:31 - Process First!</p>
<p>30:00 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests Anirban &amp; James :</p>
<p><a href='https://www.linkedin.com/in/james-berthoty/'>https://www.linkedin.com/in/james-berthoty/</a><a href='https://www.linkedin.com/in/anirbanbanerjeephd/'> https://www.linkedin.com/in/anirbanbanerjeephd/</a></p>
<p>Check out Riscosity:<a href='https://www.riscosity.com/'> https://www.riscosity.com/</a></p>
<p>Get a Free Data Governance Audit:</p>
<p><a href='https://www.riscosity.com/free-data-governance-audit'>https://www.riscosity.com/free-data-governance-audit</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings is joined by guests Anirban Banerjee, CEO and Co-Founder at Riscosity, and James Berthoty, Founder and Analyst at Latio Tech. Together they focus on data security, AI-driven product development, and the challenges of implementing AI solutions responsibly.</p>
<p>Anirban discusses the importance of organizational buy-in and well-defined policies, while James underscores the need for visibility and a cautious approach in integrating AI models. Be sure to tune in to the end to hear their unique advice at being more productive.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guests Anirban &amp; James</p>
<p>04:15 - The State of AI through Cyber</p>
<p>08:25 - Is AI a New Technology?</p>
<p>10:31 - AI Lets You Ship A Product</p>
<p>16:44 - Pros/Cons of AI &amp; DLP</p>
<p>23:57 - What SHOULD We Be Talking About?</p>
<p>27:31 - Process First!</p>
<p>30:00 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests Anirban &amp; James :</p>
<p><a href='https://www.linkedin.com/in/james-berthoty/'>https://www.linkedin.com/in/james-berthoty/</a><a href='https://www.linkedin.com/in/anirbanbanerjeephd/'> https://www.linkedin.com/in/anirbanbanerjeephd/</a></p>
<p>Check out Riscosity:<a href='https://www.riscosity.com/'> https://www.riscosity.com/</a></p>
<p>Get a Free Data Governance Audit:</p>
<p><a href='https://www.riscosity.com/free-data-governance-audit'>https://www.riscosity.com/free-data-governance-audit</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6q7i5kqiyszwc85j/HVS_Riscosity_What_We_All_Should_Be_Talking_About_When_It_Comes_to_AI_and_Security_with_Anirban_Banerjee_and_James_Berthoty8j81q.mp3" length="60282370" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings is joined by guests Anirban Banerjee, CEO and Co-Founder at Riscosity, and James Berthoty, Founder and Analyst at Latio Tech. Together they focus on data security, AI-driven product development, and the challenges of implementing AI solutions responsibly.
Anirban discusses the importance of organizational buy-in and well-defined policies, while James underscores the need for visibility and a cautious approach in integrating AI models. Be sure to tune in to the end to hear their unique advice at being more productive.
Impactful Moments:
00:00 - Welcome
01:20 - Introducing guests Anirban &amp; James
04:15 - The State of AI through Cyber
08:25 - Is AI a New Technology?
10:31 - AI Lets You Ship A Product
16:44 - Pros/Cons of AI &amp; DLP
23:57 - What SHOULD We Be Talking About?
27:31 - Process First!
30:00 - One Step Better…
 
Links:
Connect with our guests Anirban &amp; James :
https://www.linkedin.com/in/james-berthoty/ https://www.linkedin.com/in/anirbanbanerjeephd/
Check out Riscosity: https://www.riscosity.com/
Get a Free Data Governance Audit:
https://www.riscosity.com/free-data-governance-audit
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1995</itunes:duration>
                <itunes:episode>335</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Navigating AI as a CISO with Whitney Palacios</title>
        <itunes:title>Navigating AI as a CISO with Whitney Palacios</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/navigating-ai-as-a-ciso-with-whitney-palacios/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/navigating-ai-as-a-ciso-with-whitney-palacios/#comments</comments>        <pubDate>Tue, 02 Jul 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8c2b7519-80fe-3efd-9bd7-c9c65f39895b</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at<a href='http://bigbear.ai'> BigBear.ai</a>. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offers sage insight into Security Operations Centers (SOCs), the need for diversity in tech leadership roles and closes out with helpful advice for rising CISOs.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:26 - Introducing guest, Whitney Palacios</p>
<p>04:03 - What Is A CISO? What Do You Do?</p>
<p>06:19 - SOC or No SOC?</p>
<p>08:40 - CISO Role &amp; Risk/Accountability</p>
<p>11:12 - “One of A Few CISOs”</p>
<p>12:00 - Join Our Mastermind!</p>
<p>15:21 - AI: Allowing Innovation</p>
<p>18:27 - AI Use Cases</p>
<p>20:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Whitney Palacios :<a href='https://www.linkedin.com/in/whitneypalacios/'> https://www.linkedin.com/in/whitneypalacios/</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:
<a href='http://hackervalley.com/livestreams'>hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at<a href='http://bigbear.ai'> BigBear.ai</a>. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offers sage insight into Security Operations Centers (SOCs), the need for diversity in tech leadership roles and closes out with helpful advice for rising CISOs.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:26 - Introducing guest, Whitney Palacios</p>
<p>04:03 - What Is A CISO? What Do You Do?</p>
<p>06:19 - SOC or No SOC?</p>
<p>08:40 - CISO Role &amp; Risk/Accountability</p>
<p>11:12 - “One of A Few CISOs”</p>
<p>12:00 - Join Our Mastermind!</p>
<p>15:21 - AI: Allowing Innovation</p>
<p>18:27 - AI Use Cases</p>
<p>20:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Whitney Palacios :<a href='https://www.linkedin.com/in/whitneypalacios/'> https://www.linkedin.com/in/whitneypalacios/</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<br>
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<br>
<a href='http://hackervalley.com/livestreams'>hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wk9shnzb3h88rj64/HVS_WhitneyPalacios_AUDIO_ONLY_FINAL_DRAFT01_1a2tfe.mp3" length="46460281" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at BigBear.ai. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offers sage insight into Security Operations Centers (SOCs), the need for diversity in tech leadership roles and closes out with helpful advice for rising CISOs.
 
Impactful Moments:
00:00 - Welcome
01:26 - Introducing guest, Whitney Palacios
04:03 - What Is A CISO? What Do You Do?
06:19 - SOC or No SOC?
08:40 - CISO Role &amp; Risk/Accountability
11:12 - “One of A Few CISOs”
12:00 - Join Our Mastermind!
15:21 - AI: Allowing Innovation
18:27 - AI Use Cases
20:30 - One Step Better…
 
Links:
Connect with our guest, Whitney Palacios : https://www.linkedin.com/in/whitneypalacios/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag:https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events:hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1363</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>334</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Power of AppSec, Cyber Education, and Friendship with Tanya Janca</title>
        <itunes:title>The Power of AppSec, Cyber Education, and Friendship with Tanya Janca</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-power-of-appsec-cyber-education-and-friendship-with-tanya-janca/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-power-of-appsec-cyber-education-and-friendship-with-tanya-janca/#comments</comments>        <pubDate>Tue, 25 Jun 2024 22:33:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3a180db1-84b0-3519-bf96-99e95f0708d4</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janca, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep, where she focuses on making application security education accessible, and the importance of building supportive communities in the tech industry.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guest, Tanya Janca</p>
<p>03:09 - “IDK How to Make SemGrep Rules…”</p>
<p>0707 - Finding Shadow IT &amp; Embezzlers</p>
<p>11:27 - Join Our Mastermind</p>
<p>12:09 - Becoming an AppSec Professional</p>
<p>15:22 - Elections CISO</p>
<p>18:00 - Speaking at Conferences</p>
<p>21:15 - Microsoft Calls Me One Day…</p>
<p>23:21 - Parting Ways; But Still Friends</p>
<p>24:30 - “Can You Train Our Devs?”</p>
<p>27:50 - Fairness Is Important</p>
<p>32:27 - Put Yourself Out There!</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Tanya Janca: <a href='https://www.linkedin.com/in/tanya-janca/'>https://www.linkedin.com/in/tanya-janca/</a></p>
<p>Check out SemGrep Academy: <a href='https://academy.semgrep.dev/'>https://academy.semgrep.dev/</a></p>
<p>We Hack Purple Podcast: <a href='https://wehackpurple.buzzsprout.com/'>https://wehackpurple.buzzsprout.com/</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events: <a href='http://hackervalley.com/livestreams'>hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janca, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep, where she focuses on making application security education accessible, and the importance of building supportive communities in the tech industry.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guest, Tanya Janca</p>
<p>03:09 - “IDK How to Make SemGrep Rules…”</p>
<p>0707 - Finding Shadow IT &amp; Embezzlers</p>
<p>11:27 - Join Our Mastermind</p>
<p>12:09 - Becoming an AppSec Professional</p>
<p>15:22 - Elections CISO</p>
<p>18:00 - Speaking at Conferences</p>
<p>21:15 - Microsoft Calls Me One Day…</p>
<p>23:21 - Parting Ways; But Still Friends</p>
<p>24:30 - “Can You Train Our Devs?”</p>
<p>27:50 - Fairness Is Important</p>
<p>32:27 - Put Yourself Out There!</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Tanya Janca: <a href='https://www.linkedin.com/in/tanya-janca/'>https://www.linkedin.com/in/tanya-janca/</a></p>
<p>Check out SemGrep Academy: <a href='https://academy.semgrep.dev/'>https://academy.semgrep.dev/</a></p>
<p>We Hack Purple Podcast: <a href='https://wehackpurple.buzzsprout.com/'>https://wehackpurple.buzzsprout.com/</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events: <a href='http://hackervalley.com/livestreams'>hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dhg67xgte82q53rm/HVS_2024Episodes_06-25-24TanyaJanca_Final.mp3" length="51726266" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janca, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep, where she focuses on making application security education accessible, and the importance of building supportive communities in the tech industry.
Impactful Moments:
00:00 - Welcome
01:20 - Introducing guest, Tanya Janca
03:09 - “IDK How to Make SemGrep Rules…”
0707 - Finding Shadow IT &amp; Embezzlers
11:27 - Join Our Mastermind
12:09 - Becoming an AppSec Professional
15:22 - Elections CISO
18:00 - Speaking at Conferences
21:15 - Microsoft Calls Me One Day…
23:21 - Parting Ways; But Still Friends
24:30 - “Can You Train Our Devs?”
27:50 - Fairness Is Important
32:27 - Put Yourself Out There!
 
Links:
Connect with our guest, Tanya Janca: https://www.linkedin.com/in/tanya-janca/
Check out SemGrep Academy: https://academy.semgrep.dev/
We Hack Purple Podcast: https://wehackpurple.buzzsprout.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2121</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>333</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Networking 2.0: The Future of Decentralized Networking &amp; Access Management</title>
        <itunes:title>Networking 2.0: The Future of Decentralized Networking &amp; Access Management</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/networking-20-the-future-of-decentralized-networking-access-management/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/networking-20-the-future-of-decentralized-networking-access-management/#comments</comments>        <pubDate>Tue, 18 Jun 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a079b24a-baaa-34f3-8c04-0470819ae165</guid>
                                    <description><![CDATA[<p>In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign</p>
<p>On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-source internet protocol that makes private and secure data sharing simple and intuitive, enabling any person, entity or thing to implement NIST Zero Trust principles into their solution.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>02:17 - Introducing, Colin Constable</p>
<p>03:42 - The Problem with the Current Internet</p>
<p>08:02 - The Catalyst Behind atProtocol®</p>
<p>11:12 - Nexus of Networking, Identity &amp; Privacy</p>
<p>14:19 - From our Sponsor, Atsign</p>
<p>15:23 - What’s Networking 2.0?</p>
<p>18:54 - Internet Anonymity &amp; Accountability</p>
<p>24:31 - Unique Solutions using atProtocol®</p>
<p> </p>
<p>Links:</p>
<p>Connect with Colin Constable:<a href='https://www.linkedin.com/in/colinconstable/'> https://www.linkedin.com/in/colinconstable/</a></p>
<p>Check out Atsign:<a href='https://atsign.com/'> https://atsign.com/</a></p>
<p>Read the atProtocol Whitepaper here:</p>
<p><a href='https://atsign.com/resources/white-papers/the-atprotocol/'>https://atsign.com/resources/white-papers/the-atprotocol/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign</p>
<p>On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-source internet protocol that makes private and secure data sharing simple and intuitive, enabling any person, entity or thing to implement NIST Zero Trust principles into their solution.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>02:17 - Introducing, Colin Constable</p>
<p>03:42 - The Problem with the Current Internet</p>
<p>08:02 - The Catalyst Behind atProtocol®</p>
<p>11:12 - Nexus of Networking, Identity &amp; Privacy</p>
<p>14:19 - From our Sponsor, Atsign</p>
<p>15:23 - What’s Networking 2.0?</p>
<p>18:54 - Internet Anonymity &amp; Accountability</p>
<p>24:31 - Unique Solutions using atProtocol®</p>
<p> </p>
<p>Links:</p>
<p>Connect with Colin Constable:<a href='https://www.linkedin.com/in/colinconstable/'> https://www.linkedin.com/in/colinconstable/</a></p>
<p>Check out Atsign:<a href='https://atsign.com/'> https://atsign.com/</a></p>
<p>Read the atProtocol Whitepaper here:</p>
<p><a href='https://atsign.com/resources/white-papers/the-atprotocol/'>https://atsign.com/resources/white-papers/the-atprotocol/</a></p>
<p> </p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zthtxwns9j3e8amq/Networking_20-_The_Future_of_Decentralized_Networking_Access_Management7fjvg.mp3" length="46804572" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign
On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-source internet protocol that makes private and secure data sharing simple and intuitive, enabling any person, entity or thing to implement NIST Zero Trust principles into their solution.
Impactful Moments:
00:00 - Welcome
02:17 - Introducing, Colin Constable
03:42 - The Problem with the Current Internet
08:02 - The Catalyst Behind atProtocol®
11:12 - Nexus of Networking, Identity &amp; Privacy
14:19 - From our Sponsor, Atsign
15:23 - What’s Networking 2.0?
18:54 - Internet Anonymity &amp; Accountability
24:31 - Unique Solutions using atProtocol®
 
Links:
Connect with Colin Constable: https://www.linkedin.com/in/colinconstable/
Check out Atsign: https://atsign.com/
Read the atProtocol Whitepaper here:
https://atsign.com/resources/white-papers/the-atprotocol/
 
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1938</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>332</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How AI is the Key Turning Point in TPRM with Paul Valente</title>
        <itunes:title>How AI is the Key Turning Point in TPRM with Paul Valente</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-ai-and-tprm-makes-security-the-dept-of-innovation-with-paul-valente/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-ai-and-tprm-makes-security-the-dept-of-innovation-with-paul-valente/#comments</comments>        <pubDate>Tue, 11 Jun 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1d496f49-d7bd-3b2e-a7cc-fdb3d3dc0928</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings enjoys a reprieve from the hectic RSA conference with guest Paul Valente, CEO of VISO Trust. Paul discusses how he used his extensive experience as a CISO to solve a huge pain point he was experiencing with third party risk management (TPRM) and how it prompted him and a colleague to start their own company to create the solution they had been wishing for.</p>
<p>However, nothing could be more exciting than the ways AI has expanded the potential for TPRM to change security outcomes and allow the security sector to drop the ‘department of no’ branding for good. Tune in to hear the whole story!</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:03 - Introducing guest, Paul Valente</p>
<p>04:49 - Core Pillars of Being a CISO</p>
<p>06:14 - Why Cyber Startup?</p>
<p>7:46 - AI: The Key Turning Point for TPRM</p>
<p>10:40 - Why Do Companies Need TPRM?</p>
<p>15:09 - From our Sponsor, VISO Trust</p>
<p>16:17 - Data &amp; Controlling Risk</p>
<p>22:35 - No Security Questionnaires!</p>
<p>24:14 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Paul Valente: <a href='https://www.linkedin.com/in/pauldvalente/'>https://www.linkedin.com/in/pauldvalente/</a></p>
<p>Check out VISO Trust: <a href='https://visotrust.com/hackervalley'>https://visotrust.com/hackervalley</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events: <a href='http://hackervalley.com/livestreams'>hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings enjoys a reprieve from the hectic RSA conference with guest Paul Valente, CEO of VISO Trust. Paul discusses how he used his extensive experience as a CISO to solve a huge pain point he was experiencing with third party risk management (TPRM) and how it prompted him and a colleague to start their own company to create the solution they had been wishing for.</p>
<p>However, nothing could be more exciting than the ways AI has expanded the potential for TPRM to change security outcomes and allow the security sector to drop the ‘department of no’ branding for good. Tune in to hear the whole story!</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:03 - Introducing guest, Paul Valente</p>
<p>04:49 - Core Pillars of Being a CISO</p>
<p>06:14 - Why Cyber Startup?</p>
<p>7:46 - AI: The Key Turning Point for TPRM</p>
<p>10:40 - Why Do Companies Need TPRM?</p>
<p>15:09 - From our Sponsor, VISO Trust</p>
<p>16:17 - Data &amp; Controlling Risk</p>
<p>22:35 - No Security Questionnaires!</p>
<p>24:14 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Paul Valente: <a href='https://www.linkedin.com/in/pauldvalente/'>https://www.linkedin.com/in/pauldvalente/</a></p>
<p>Check out VISO Trust: <a href='https://visotrust.com/hackervalley'>https://visotrust.com/hackervalley</a></p>
<p>Check out our upcoming events: <a href='https://www.hackervalley.com/livestreams'>https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events: <a href='http://hackervalley.com/livestreams'>hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ii85mwatb2nivmn4/HVM_VisoTrust_How_AI_and_TPRM_Makes_Security_the_Dept_of_Innovation_with_Paul_Valentea2g3p.mp3" length="37904562" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings enjoys a reprieve from the hectic RSA conference with guest Paul Valente, CEO of VISO Trust. Paul discusses how he used his extensive experience as a CISO to solve a huge pain point he was experiencing with third party risk management (TPRM) and how it prompted him and a colleague to start their own company to create the solution they had been wishing for.
However, nothing could be more exciting than the ways AI has expanded the potential for TPRM to change security outcomes and allow the security sector to drop the ‘department of no’ branding for good. Tune in to hear the whole story!
 
Impactful Moments:
00:00 - Welcome
01:03 - Introducing guest, Paul Valente
04:49 - Core Pillars of Being a CISO
06:14 - Why Cyber Startup?
7:46 - AI: The Key Turning Point for TPRM
10:40 - Why Do Companies Need TPRM?
15:09 - From our Sponsor, VISO Trust
16:17 - Data &amp; Controlling Risk
22:35 - No Security Questionnaires!
24:14 - One Step Better…
 
Links:
Connect with our guest, Paul Valente: https://www.linkedin.com/in/pauldvalente/
Check out VISO Trust: https://visotrust.com/hackervalley
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1547</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>331</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini</title>
        <itunes:title>A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/a-deep-dive-into-mssps-understanding-the-evolution-and-secrets-within-with-ricardo-nicolini/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/a-deep-dive-into-mssps-understanding-the-evolution-and-secrets-within-with-ricardo-nicolini/#comments</comments>        <pubDate>Tue, 04 Jun 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/aa09e55d-8bfa-3bad-83fa-18dcd171b2aa</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings and Jen Langdon explore the origins of MSSPs and the solutions they offer to the cybersecurity industry with insights from Ricardo Nicolini, CTO at Bulletproof. Ricardo will uncover the potential of MSSPs to alleviate headaches and reduce burnout in cybersecurity by detailing his personal experience with overcoming a ransomware attack in the City of Saint John.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>05:15 - Introducing guest, Ricardo Nicolini</p>
<p>07:21 - Find &amp; Prevent: FAST!</p>
<p>11:39 - Who MSSPs Support</p>
<p>13:48 - From our Sponsor, ContraForce</p>
<p>14:48 - City of Saint John &amp; Ransomware</p>
<p>20:02 - Implications of Ransomware</p>
<p>25:16 - SOC Burnout is Real</p>
<p>29:21 - Improving the SOC with the Right Person</p>
<p>35:46 - Is Reducing Cognitive Load Possible?</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Ricardo Nicolini :<a href='https://www.linkedin.com/in/rnicolini/'> https://www.linkedin.com/in/rnicolini/</a></p>
<p>Check out ContraForce:<a href='https://www.contraforce.com/'> https://www.contraforce.com/</a></p>
<p>Learn more about how Bulletproof helped the City of Saint John:</p>
<p><a href='https://content.bulletproofsi.com/read-cosj-case-study'>https://content.bulletproofsi.com/read-cosj-case-study</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings and Jen Langdon explore the origins of MSSPs and the solutions they offer to the cybersecurity industry with insights from Ricardo Nicolini, CTO at Bulletproof. Ricardo will uncover the potential of MSSPs to alleviate headaches and reduce burnout in cybersecurity by detailing his personal experience with overcoming a ransomware attack in the City of Saint John.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>05:15 - Introducing guest, Ricardo Nicolini</p>
<p>07:21 - Find &amp; Prevent: FAST!</p>
<p>11:39 - Who MSSPs Support</p>
<p>13:48 - From our Sponsor, ContraForce</p>
<p>14:48 - City of Saint John &amp; Ransomware</p>
<p>20:02 - Implications of Ransomware</p>
<p>25:16 - SOC Burnout is Real</p>
<p>29:21 - Improving the SOC with the Right Person</p>
<p>35:46 - Is Reducing Cognitive Load Possible?</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Ricardo Nicolini :<a href='https://www.linkedin.com/in/rnicolini/'> https://www.linkedin.com/in/rnicolini/</a></p>
<p>Check out ContraForce:<a href='https://www.contraforce.com/'> https://www.contraforce.com/</a></p>
<p>Learn more about how Bulletproof helped the City of Saint John:</p>
<p><a href='https://content.bulletproofsi.com/read-cosj-case-study'>https://content.bulletproofsi.com/read-cosj-case-study</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4c8nenyuawdc6y2y/HVM_RicardoNicolini_FINAL.mp3" length="58479399" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings and Jen Langdon explore the origins of MSSPs and the solutions they offer to the cybersecurity industry with insights from Ricardo Nicolini, CTO at Bulletproof. Ricardo will uncover the potential of MSSPs to alleviate headaches and reduce burnout in cybersecurity by detailing his personal experience with overcoming a ransomware attack in the City of Saint John.
Impactful Moments:
00:00 - Welcome
05:15 - Introducing guest, Ricardo Nicolini
07:21 - Find &amp; Prevent: FAST!
11:39 - Who MSSPs Support
13:48 - From our Sponsor, ContraForce
14:48 - City of Saint John &amp; Ransomware
20:02 - Implications of Ransomware
25:16 - SOC Burnout is Real
29:21 - Improving the SOC with the Right Person
35:46 - Is Reducing Cognitive Load Possible?
 
Links:
Connect with our guest Ricardo Nicolini : https://www.linkedin.com/in/rnicolini/
Check out ContraForce: https://www.contraforce.com/
Learn more about how Bulletproof helped the City of Saint John:
https://content.bulletproofsi.com/read-cosj-case-study
Check out our upcoming events: hackervalley.com/livestreams
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2405</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>330</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Zero Trust Tactics: Preventing Breaches with Ivan Fonseca &amp; Nick Cottrell</title>
        <itunes:title>Zero Trust Tactics: Preventing Breaches with Ivan Fonseca &amp; Nick Cottrell</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/zero-trust-tactics-preventing-breaches-with-ivan-fonseca-nick-cottrell/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/zero-trust-tactics-preventing-breaches-with-ivan-fonseca-nick-cottrell/#comments</comments>        <pubDate>Tue, 28 May 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a7a01383-4db7-3c5f-8acb-722e7615f381</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings teams up with Ivan Fonseca and Nick Cottrell, Cybersecurity Engineers at ThreatLocker, as they break down the anatomy of previous breaches and the attacker’s playbook using MITRE ATT&amp;CK. Ivan and Nick will take you through the defender’s perspective and will also share tools that are commonly used to defend breaches and discuss how Zero Trust can be implemented to better defend organizations.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:35 - Introducing guests, Ivan Fonseca and Nick Cottrell</p>
<p>04:39 - 3CX Breach &amp; Supply Chain Attacks</p>
<p>08:10 - Ring Fencing Defense</p>
<p>11:16 - Living Off the Hacker Valley Land</p>
<p>13:06 - From our Sponsor, ThreatLocker</p>
<p>13:56 - Hacker Mindset in the Op</p>
<p>18:45 - Zero Trust, Default Deny</p>
<p>24:23 - Common Attack Vectors</p>
<p>30:09 - 7 Zip is a Russian Application?</p>
<p>32:49 - Learning How to Defend Better</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests, Ivan Fonseca and Nick Cottrell :</p>
<p><a href='https://www.linkedin.com/in/ivan-fonseca-64139222b/'>https://www.linkedin.com/in/ivan-fonseca-64139222b/</a></p>
<p><a href='https://www.linkedin.com/in/nicholas-cottrell-083564165/'>https://www.linkedin.com/in/nicholas-cottrell-083564165/</a></p>
<p>Learn more about ThreatLocker: <a href='https://www.threatlocker.com/'>https://www.threatlocker.com/</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings teams up with Ivan Fonseca and Nick Cottrell, Cybersecurity Engineers at ThreatLocker, as they break down the anatomy of previous breaches and the attacker’s playbook using MITRE ATT&amp;CK. Ivan and Nick will take you through the defender’s perspective and will also share tools that are commonly used to defend breaches and discuss how Zero Trust can be implemented to better defend organizations.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:35 - Introducing guests, Ivan Fonseca and Nick Cottrell</p>
<p>04:39 - 3CX Breach &amp; Supply Chain Attacks</p>
<p>08:10 - Ring Fencing Defense</p>
<p>11:16 - Living Off the Hacker Valley Land</p>
<p>13:06 - From our Sponsor, ThreatLocker</p>
<p>13:56 - Hacker Mindset in the Op</p>
<p>18:45 - Zero Trust, Default Deny</p>
<p>24:23 - Common Attack Vectors</p>
<p>30:09 - 7 Zip is a Russian Application?</p>
<p>32:49 - Learning How to Defend Better</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests, Ivan Fonseca and Nick Cottrell :</p>
<p><a href='https://www.linkedin.com/in/ivan-fonseca-64139222b/'>https://www.linkedin.com/in/ivan-fonseca-64139222b/</a></p>
<p><a href='https://www.linkedin.com/in/nicholas-cottrell-083564165/'>https://www.linkedin.com/in/nicholas-cottrell-083564165/</a></p>
<p>Learn more about ThreatLocker: <a href='https://www.threatlocker.com/'>https://www.threatlocker.com/</a></p>
<p>Check out our upcoming events:<a href='https://www.hackervalley.com/livestreams'> https://www.hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mefg9ynappzx55c8/HVM_ThreatLocker_Zero_Trust_Tactics_Preventing_Breaches_with_Ivan_Fonseca_Nick_Cottrell6r43w.mp3" length="57733464" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings teams up with Ivan Fonseca and Nick Cottrell, Cybersecurity Engineers at ThreatLocker, as they break down the anatomy of previous breaches and the attacker’s playbook using MITRE ATT&amp;CK. Ivan and Nick will take you through the defender’s perspective and will also share tools that are commonly used to defend breaches and discuss how Zero Trust can be implemented to better defend organizations.
 
Impactful Moments:
00:00 - Welcome
01:35 - Introducing guests, Ivan Fonseca and Nick Cottrell
04:39 - 3CX Breach &amp; Supply Chain Attacks
08:10 - Ring Fencing Defense
11:16 - Living Off the Hacker Valley Land
13:06 - From our Sponsor, ThreatLocker
13:56 - Hacker Mindset in the Op
18:45 - Zero Trust, Default Deny
24:23 - Common Attack Vectors
30:09 - 7 Zip is a Russian Application?
32:49 - Learning How to Defend Better
 
Links:
Connect with our guests, Ivan Fonseca and Nick Cottrell :
https://www.linkedin.com/in/ivan-fonseca-64139222b/
https://www.linkedin.com/in/nicholas-cottrell-083564165/
Learn more about ThreatLocker: https://www.threatlocker.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2381</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>329</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Enterprise Browsers: Work’s Natural Next Step</title>
        <itunes:title>Enterprise Browsers: Work’s Natural Next Step</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/enterprise-browsers-work-s-natural-next-step/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/enterprise-browsers-work-s-natural-next-step/#comments</comments>        <pubDate>Tue, 21 May 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fadfe0d6-790f-381a-b7cd-ea2170ed5ff4</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings and Jen Langdon talk about the evolution of browsers and how enterprise browsers have entered to change the game for corporations. Special guest Bradon Rogers, Chief Customer Officer at Island, joins to explain how enterprise browsers expand capabilities in asset management, security, and user experience. They also discuss how enterprise browsers can streamline IT infrastructure, offering a glimpse into the future and AI's role in it.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>04:25 - Introducing guest, Bradon Rogers</p>
<p>07:23 - Extension vs Browser</p>
<p>14:53 - Security Use Cases</p>
<p>18:12 - From our Sponsor</p>
<p>19:34 - Better User Decisions</p>
<p>24:01 - Tool Reduction</p>
<p>26:24 - IT &amp; Security Should Play Nice</p>
<p>29:41 - Data Protection</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Bradon Rogers:<a href='https://www.linkedin.com/in/bradon/'> https://www.linkedin.com/in/bradon/</a></p>
<p>Check out Island’s website here:<a href='https://www.island.io/'> https://www.island.io/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings and Jen Langdon talk about the evolution of browsers and how enterprise browsers have entered to change the game for corporations. Special guest Bradon Rogers, Chief Customer Officer at Island, joins to explain how enterprise browsers expand capabilities in asset management, security, and user experience. They also discuss how enterprise browsers can streamline IT infrastructure, offering a glimpse into the future and AI's role in it.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>04:25 - Introducing guest, Bradon Rogers</p>
<p>07:23 - Extension vs Browser</p>
<p>14:53 - Security Use Cases</p>
<p>18:12 - From our Sponsor</p>
<p>19:34 - Better User Decisions</p>
<p>24:01 - Tool Reduction</p>
<p>26:24 - IT &amp; Security Should Play Nice</p>
<p>29:41 - Data Protection</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Bradon Rogers:<a href='https://www.linkedin.com/in/bradon/'> https://www.linkedin.com/in/bradon/</a></p>
<p>Check out Island’s website here:<a href='https://www.island.io/'> https://www.island.io/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/psz9xihpb73s2m43/HVM_Island_Enterprise_Browsers_Work_s_Natural_Next_Step_Audio98k6m.mp3" length="49401743" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings and Jen Langdon talk about the evolution of browsers and how enterprise browsers have entered to change the game for corporations. Special guest Bradon Rogers, Chief Customer Officer at Island, joins to explain how enterprise browsers expand capabilities in asset management, security, and user experience. They also discuss how enterprise browsers can streamline IT infrastructure, offering a glimpse into the future and AI's role in it.
Impactful Moments:
00:00 - Welcome
04:25 - Introducing guest, Bradon Rogers
07:23 - Extension vs Browser
14:53 - Security Use Cases
18:12 - From our Sponsor
19:34 - Better User Decisions
24:01 - Tool Reduction
26:24 - IT &amp; Security Should Play Nice
29:41 - Data Protection
 
Links:
Connect with our guest, Bradon Rogers: https://www.linkedin.com/in/bradon/
Check out Island’s website here: https://www.island.io/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2040</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>328</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Building Tech and Adding Value in the Era of AI with Josh Danielson</title>
        <itunes:title>Building Tech and Adding Value in the Era of AI with Josh Danielson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/building-tech-in-the-age-of-ai-with-joshua-danielson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/building-tech-in-the-age-of-ai-with-joshua-danielson/#comments</comments>        <pubDate>Tue, 14 May 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/737c7c9e-a64a-3dd2-ba28-9aec3d5d023d</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings talks with guest Josh Danielson, CEO at Kustos, about how his journey at a previous organization has led him to build and create new products in the industry. They’ll discuss everything from how AI is currently being used to how there are still many ways to optimize in the cybersecurity product and service space. Listen to learn more about how you could create the next great thing in cyber!</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:43 - Introducing guest, Josh Danielson</p>
<p>03:20 - Cutting Edge Tech</p>
<p>07:34 - To CISO or not to CISO</p>
<p>10:33 - Join Our Creative Mastermind</p>
<p>11:20 - Balancing Product &amp; Services</p>
<p>14:37 - Not Taking Advantage of AI</p>
<p>18:10 - Getting Better Value out of Tooling</p>
<p>21:35 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Josh Danielson:</p>
<p><a href='https://www.linkedin.com/in/joshua-danielson-a82b7342/'>https://www.linkedin.com/in/joshua-danielson-a82b7342/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings talks with guest Josh Danielson, CEO at Kustos, about how his journey at a previous organization has led him to build and create new products in the industry. They’ll discuss everything from how AI is currently being used to how there are still many ways to optimize in the cybersecurity product and service space. Listen to learn more about how you could create the next great thing in cyber!</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:43 - Introducing guest, Josh Danielson</p>
<p>03:20 - Cutting Edge Tech</p>
<p>07:34 - To CISO or not to CISO</p>
<p>10:33 - Join Our Creative Mastermind</p>
<p>11:20 - Balancing Product &amp; Services</p>
<p>14:37 - Not Taking Advantage of AI</p>
<p>18:10 - Getting Better Value out of Tooling</p>
<p>21:35 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Josh Danielson:</p>
<p><a href='https://www.linkedin.com/in/joshua-danielson-a82b7342/'>https://www.linkedin.com/in/joshua-danielson-a82b7342/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:<a href='https://store.hackervalley.com'> https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:<a href='https://hackervalley.com/discord'> https://hackervalley.com/discord</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Become a sponsor of the show to amplify your brand:<a href='https://hackervalley.com/work-with-us/'> https://hackervalley.com/work-with-us/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9py5d2nfe8jp96rq/Building_Tech_in_the_Age_of_AI_with_Josh_Danielsona17s0.mp3" length="35521811" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings talks with guest Josh Danielson, CEO at Kustos, about how his journey at a previous organization has led him to build and create new products in the industry. They’ll discuss everything from how AI is currently being used to how there are still many ways to optimize in the cybersecurity product and service space. Listen to learn more about how you could create the next great thing in cyber!
Impactful Moments:
00:00 - Welcome
00:43 - Introducing guest, Josh Danielson
03:20 - Cutting Edge Tech
07:34 - To CISO or not to CISO
10:33 - Join Our Creative Mastermind
11:20 - Balancing Product &amp; Services
14:37 - Not Taking Advantage of AI
18:10 - Getting Better Value out of Tooling
21:35 - One Step Better…
 
Links:
Connect with our guest, Josh Danielson:
https://www.linkedin.com/in/joshua-danielson-a82b7342/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Check out our upcoming events: hackervalley.com/livestreams
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1468</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>327</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Building Fast and Not Breaking Things with Shlomi Matichin</title>
        <itunes:title>Building Fast and Not Breaking Things with Shlomi Matichin</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/building-fast-and-not-breaking-things-with-shlomi-matichin/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/building-fast-and-not-breaking-things-with-shlomi-matichin/#comments</comments>        <pubDate>Tue, 07 May 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/376ec86e-8f90-3a41-9064-fab48a65a841</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings and guest Shlomi Matichin, Co-Founder &amp; CTO at Valence Security, discuss how the hurdles and triumphs in the journey of establishing Valence Security resulted in a reduction in SaaS misconfigurations and vulnerabilities.</p>
<p>Impactful Moments:</p>
<p>0:00 - Welcome</p>
<p>01:50 - Introducing guest, Shlomi Matichin</p>
<p>02:46 - Founder’s Journey</p>
<p>04:30 - Building Fast</p>
<p>07:37 - Building Fast vs Building Intentionally</p>
<p>08:13 - From Our Sponsor, Valence Security</p>
<p>09:18 - How SaaS Breaches Occur</p>
<p>13:38 - Google Workspace Security</p>
<p>19:55 - The Uninstall Journey</p>
<p>25:00 - What Worries You?</p>
<p>27:48 - Building SaaS Fast</p>
<p>31:08 - One Step Better</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Shlomi Matichin:</p>
<p><a href='https://www.linkedin.com/in/shlomi-matichin/'>https://www.linkedin.com/in/shlomi-matichin/</a></p>
<p>Check out Valence Security:<a href='http://valencesecurity.com'> valencesecurity.com</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings and guest Shlomi Matichin, Co-Founder &amp; CTO at Valence Security, discuss how the hurdles and triumphs in the journey of establishing Valence Security resulted in a reduction in SaaS misconfigurations and vulnerabilities.</p>
<p>Impactful Moments:</p>
<p>0:00 - Welcome</p>
<p>01:50 - Introducing guest, Shlomi Matichin</p>
<p>02:46 - Founder’s Journey</p>
<p>04:30 - Building Fast</p>
<p>07:37 - Building Fast vs Building Intentionally</p>
<p>08:13 - From Our Sponsor, Valence Security</p>
<p>09:18 - How SaaS Breaches Occur</p>
<p>13:38 - Google Workspace Security</p>
<p>19:55 - The Uninstall Journey</p>
<p>25:00 - What Worries You?</p>
<p>27:48 - Building SaaS Fast</p>
<p>31:08 - One Step Better</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Shlomi Matichin:</p>
<p><a href='https://www.linkedin.com/in/shlomi-matichin/'>https://www.linkedin.com/in/shlomi-matichin/</a></p>
<p>Check out Valence Security:<a href='http://valencesecurity.com'> valencesecurity.com</a></p>
<p>Check out our upcoming events:<a href='http://hackervalley.com/livestreams'> hackervalley.com/livestreams</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kwsepabuph8nhmyz/HVS_Shlomi_Matichin_ep8to9o.mp3" length="47197603" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings and guest Shlomi Matichin, Co-Founder &amp; CTO at Valence Security, discuss how the hurdles and triumphs in the journey of establishing Valence Security resulted in a reduction in SaaS misconfigurations and vulnerabilities.
Impactful Moments:
0:00 - Welcome
01:50 - Introducing guest, Shlomi Matichin
02:46 - Founder’s Journey
04:30 - Building Fast
07:37 - Building Fast vs Building Intentionally
08:13 - From Our Sponsor, Valence Security
09:18 - How SaaS Breaches Occur
13:38 - Google Workspace Security
19:55 - The Uninstall Journey
25:00 - What Worries You?
27:48 - Building SaaS Fast
31:08 - One Step Better
 
Links:
Connect with our guest, Shlomi Matichin:
https://www.linkedin.com/in/shlomi-matichin/
Check out Valence Security: valencesecurity.com
Check out our upcoming events: hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1946</itunes:duration>
                <itunes:episode>326</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Leaping Over the ‘BAR’ to Leading Cyber in Africa with Confidence Staveley</title>
        <itunes:title>Leaping Over the ‘BAR’ to Leading Cyber in Africa with Confidence Staveley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/leaping-over-the-bar-to-leading-cyber-in-africa-with-confidence-staveley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/leaping-over-the-bar-to-leading-cyber-in-africa-with-confidence-staveley/#comments</comments>        <pubDate>Tue, 30 Apr 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/262f0e7a-6980-3f42-90b1-769cae250308</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings gets to know guest Confidence Staveley, founder of Merkel Fence and CyberSafe Foundation. He uncovers Confidence’s inspiring story, not only about how she transforms her community and the people around her through her non-profit, but the grit she needed to overcome the obstacles to get to a career in cyber and build her own company. In addition to learning about the potential of Africa as a booming tech talent hub, you’ll better understand what it takes to foster that growth in the tech industry.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:44 - Introducing guest, Confidence Staveley</p>
<p>04:03 - Learning About Computers</p>
<p>06:46 - Women in Cyber &amp; Access to Tech Careers</p>
<p>12:30 - Pushing Forward &amp; Inspiring Others</p>
<p>15:05 - Solving the Cyber Problem</p>
<p>19:11 - Time Commitment to Get a Job in Cyber</p>
<p>24:45 - How CyberSafe Works</p>
<p>29:29 - Building a SOC in Africa</p>
<p>32:29 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Confidence Staveley:</p>
<p><a href='https://www.linkedin.com/in/confidencestaveley/'>https://www.linkedin.com/in/confidencestaveley/</a></p>
<p>Check out the CyberSafe Foundation:</p>
<p><a href='https://cybersafefoundation.org/'>https://cybersafefoundation.org/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings gets to know guest Confidence Staveley, founder of Merkel Fence and CyberSafe Foundation. He uncovers Confidence’s inspiring story, not only about how she transforms her community and the people around her through her non-profit, but the grit she needed to overcome the obstacles to get to a career in cyber and build her own company. In addition to learning about the potential of Africa as a booming tech talent hub, you’ll better understand what it takes to foster that growth in the tech industry.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:44 - Introducing guest, Confidence Staveley</p>
<p>04:03 - Learning About Computers</p>
<p>06:46 - Women in Cyber &amp; Access to Tech Careers</p>
<p>12:30 - Pushing Forward &amp; Inspiring Others</p>
<p>15:05 - Solving the Cyber Problem</p>
<p>19:11 - Time Commitment to Get a Job in Cyber</p>
<p>24:45 - How CyberSafe Works</p>
<p>29:29 - Building a SOC in Africa</p>
<p>32:29 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Confidence Staveley:</p>
<p><a href='https://www.linkedin.com/in/confidencestaveley/'>https://www.linkedin.com/in/confidencestaveley/</a></p>
<p>Check out the CyberSafe Foundation:</p>
<p><a href='https://cybersafefoundation.org/'>https://cybersafefoundation.org/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xei7i6hh4x82j8u8/HVS_Confidence_Staveley_Leaping_Over_the_BAR_to_Leading_Cyber_in_Africa7lqq7.mp3" length="51947140" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings gets to know guest Confidence Staveley, founder of Merkel Fence and CyberSafe Foundation. He uncovers Confidence’s inspiring story, not only about how she transforms her community and the people around her through her non-profit, but the grit she needed to overcome the obstacles to get to a career in cyber and build her own company. In addition to learning about the potential of Africa as a booming tech talent hub, you’ll better understand what it takes to foster that growth in the tech industry.
Impactful Moments:
00:00 - Welcome
00:44 - Introducing guest, Confidence Staveley
04:03 - Learning About Computers
06:46 - Women in Cyber &amp; Access to Tech Careers
12:30 - Pushing Forward &amp; Inspiring Others
15:05 - Solving the Cyber Problem
19:11 - Time Commitment to Get a Job in Cyber
24:45 - How CyberSafe Works
29:29 - Building a SOC in Africa
32:29 - One Step Better…
 
Links:
Connect with our guest, Confidence Staveley:
https://www.linkedin.com/in/confidencestaveley/
Check out the CyberSafe Foundation:
https://cybersafefoundation.org/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2145</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>325</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How to Hack your Career: Building a vCISO Business with Ayman Elsawah</title>
        <itunes:title>How to Hack your Career: Building a vCISO Business with Ayman Elsawah</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-to-hack-your-career-building-a-vciso-business-with-ayman-elsawah/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-to-hack-your-career-building-a-vciso-business-with-ayman-elsawah/#comments</comments>        <pubDate>Tue, 23 Apr 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/20e56ab5-83ad-33a1-aa07-5712b6b8b4c7</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings gets a chance to speak with Ayman Elsawah, Founder of Cloud Security Labs, and have him share his experience with becoming a vCISO. Ayman will break down the vast business of security consulting and help you determine the best approach and next steps to catalyze you on your way to owning your time and your own business.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:14 - Introducing guest, Ayman Elsawah</p>
<p>07:08 - Types of vCISOs</p>
<p>09:55 - How to Become a vCISO</p>
<p>13:40 - Join Our Mastermind!</p>
<p>14:24 - Is vCISO Right for You?</p>
<p>17:22 - Marketing as A vCISO</p>
<p>22:33 - Anticipated vCISO Salary</p>
<p>26:15 - vCISO Time Commitment</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ayman:</p>
<p><a href='https://www.linkedin.com/in/infosecleader/'>https://www.linkedin.com/in/infosecleader/</a></p>
<p>Twitter &amp; YouTube: @coffeewithayman</p>
<p>Check out Ayman’s vCISO Course:</p>
<p><a href='http://coffeewithayman.com/hackervalley'>coffeewithayman.com/hackervalley</a></p>
<p>—-------------------------------------------------------------------------</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings gets a chance to speak with Ayman Elsawah, Founder of Cloud Security Labs, and have him share his experience with becoming a vCISO. Ayman will break down the vast business of security consulting and help you determine the best approach and next steps to catalyze you on your way to owning your time and your own business.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:14 - Introducing guest, Ayman Elsawah</p>
<p>07:08 - Types of vCISOs</p>
<p>09:55 - How to Become a vCISO</p>
<p>13:40 - Join Our Mastermind!</p>
<p>14:24 - Is vCISO Right for You?</p>
<p>17:22 - Marketing as A vCISO</p>
<p>22:33 - Anticipated vCISO Salary</p>
<p>26:15 - vCISO Time Commitment</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ayman:</p>
<p><a href='https://www.linkedin.com/in/infosecleader/'>https://www.linkedin.com/in/infosecleader/</a></p>
<p>Twitter &amp; YouTube: @coffeewithayman</p>
<p>Check out Ayman’s vCISO Course:</p>
<p><a href='http://coffeewithayman.com/hackervalley'>coffeewithayman.com/hackervalley</a></p>
<p>—-------------------------------------------------------------------------</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/446n98ywqyq8muek/HVS_How_to_Hack_your_Career_Building_a_vCISO_Business_with_Ayman_Elsawah8iq0u.mp3" length="46055126" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings gets a chance to speak with Ayman Elsawah, Founder of Cloud Security Labs, and have him share his experience with becoming a vCISO. Ayman will break down the vast business of security consulting and help you determine the best approach and next steps to catalyze you on your way to owning your time and your own business.
Impactful Moments:
00:00 - Welcome
01:14 - Introducing guest, Ayman Elsawah
07:08 - Types of vCISOs
09:55 - How to Become a vCISO
13:40 - Join Our Mastermind!
14:24 - Is vCISO Right for You?
17:22 - Marketing as A vCISO
22:33 - Anticipated vCISO Salary
26:15 - vCISO Time Commitment
 
Links:
Connect with Ayman:
https://www.linkedin.com/in/infosecleader/
Twitter &amp; YouTube: @coffeewithayman
Check out Ayman’s vCISO Course:
coffeewithayman.com/hackervalley
—-------------------------------------------------------------------------
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1902</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>324</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hyperautomation, Open Security Data Architecture, and the Future of SIEM with Neal Humphrey</title>
        <itunes:title>Hyperautomation, Open Security Data Architecture, and the Future of SIEM with Neal Humphrey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hyperautomation-open-security-data-architecture-and-the-future-of-siem-with-neal-humphrey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hyperautomation-open-security-data-architecture-and-the-future-of-siem-with-neal-humphrey/#comments</comments>        <pubDate>Tue, 16 Apr 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/daa7e142-16b9-3d99-84ee-a0543cab72e0</guid>
                                    <description><![CDATA[<p>Ron Eddings and Neal Humphrey, Vice President of Market Strategy at Deepwatch, discuss the changes in Security Operations infrastructure, and how these changes in structure, data, and automation are going to impact operations in the near future. Their discussion will revolve around more than just SIEM, alerts, and responses; it will go into market changes, vendor movement, and how the future of SOC is demanding a shift in mindset and strategy beyond "Let a machine handle it..."</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:05 - Introducing guest, Neal Humphrey</p>
<p>03:09 - Looking Back at SecOps</p>
<p>06:11 - Modern SOC Wall</p>
<p>11:49 - Hyperautomation; the Future of SOAR?</p>
<p>15:02 - Hyperautomation &amp; Normalization</p>
<p>17:29 - From our Sponsor, Deepwatch</p>
<p>19:18 - OSDA &amp; Deepwatch</p>
<p>25:32 - Hyperautomaiton or OSDA 1st</p>
<p>30:25 - Can I Show The Value of A Tool?</p>
<p>34:30 - Who is OSDA White Paper for?</p>
<p>36:43 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Neal Humphrey:</p>
<p><a href='https://www.linkedin.com/in/neal-humphrey-b909773/'>https://www.linkedin.com/in/neal-humphrey-b909773/</a></p>
<p>Check out the White paper by Deepwatch:</p>
<p><a href='https://www.deepwatch.com/the-security-operations-center-cannot-hold/'>https://www.deepwatch.com/the-security-operations-center-cannot-hold/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ron Eddings and Neal Humphrey, Vice President of Market Strategy at Deepwatch, discuss the changes in Security Operations infrastructure, and how these changes in structure, data, and automation are going to impact operations in the near future. Their discussion will revolve around more than just SIEM, alerts, and responses; it will go into market changes, vendor movement, and how the future of SOC is demanding a shift in mindset and strategy beyond "Let a machine handle it..."</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:05 - Introducing guest, Neal Humphrey</p>
<p>03:09 - Looking Back at SecOps</p>
<p>06:11 - Modern SOC Wall</p>
<p>11:49 - Hyperautomation; the Future of SOAR?</p>
<p>15:02 - Hyperautomation &amp; Normalization</p>
<p>17:29 - From our Sponsor, Deepwatch</p>
<p>19:18 - OSDA &amp; Deepwatch</p>
<p>25:32 - Hyperautomaiton or OSDA 1st</p>
<p>30:25 - Can I Show The Value of A Tool?</p>
<p>34:30 - Who is OSDA White Paper for?</p>
<p>36:43 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Neal Humphrey:</p>
<p><a href='https://www.linkedin.com/in/neal-humphrey-b909773/'>https://www.linkedin.com/in/neal-humphrey-b909773/</a></p>
<p>Check out the White paper by Deepwatch:</p>
<p><a href='https://www.deepwatch.com/the-security-operations-center-cannot-hold/'>https://www.deepwatch.com/the-security-operations-center-cannot-hold/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/krvtfst8pbd2635j/Hyperautomation_Open_Security_Data_Architecture_and_the_Future_of_SIEM_with_Neal_Humphreyau4sq.mp3" length="58251170" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ron Eddings and Neal Humphrey, Vice President of Market Strategy at Deepwatch, discuss the changes in Security Operations infrastructure, and how these changes in structure, data, and automation are going to impact operations in the near future. Their discussion will revolve around more than just SIEM, alerts, and responses; it will go into market changes, vendor movement, and how the future of SOC is demanding a shift in mindset and strategy beyond "Let a machine handle it..."
Impactful Moments:
00:00 - Welcome
01:05 - Introducing guest, Neal Humphrey
03:09 - Looking Back at SecOps
06:11 - Modern SOC Wall
11:49 - Hyperautomation; the Future of SOAR?
15:02 - Hyperautomation &amp; Normalization
17:29 - From our Sponsor, Deepwatch
19:18 - OSDA &amp; Deepwatch
25:32 - Hyperautomaiton or OSDA 1st
30:25 - Can I Show The Value of A Tool?
34:30 - Who is OSDA White Paper for?
36:43 - One Step Better…
 
Links:
Connect with our guest, Neal Humphrey:
https://www.linkedin.com/in/neal-humphrey-b909773/
Check out the White paper by Deepwatch:
https://www.deepwatch.com/the-security-operations-center-cannot-hold/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2418</itunes:duration>
                <itunes:episode>323</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Securing Your SaaS and Cyber Influencer Networking with CRO Bob Horn</title>
        <itunes:title>Securing Your SaaS and Cyber Influencer Networking with CRO Bob Horn</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/securing-your-saas-and-cyber-influencer-networking-with-cro-bob-horn/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/securing-your-saas-and-cyber-influencer-networking-with-cro-bob-horn/#comments</comments>        <pubDate>Tue, 09 Apr 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ce4127c4-fc1c-37e9-927f-96f034f25687</guid>
                                    <description><![CDATA[<p>Ron Eddings sits down with Bob Horn, Chief Revenue Officer at Valence Security. Their conversation centers around the world of SaaS security, examining the current landscape and challenges in managing SaaS risks. Bob also shares experiences from his 25-year career in sales, focusing on the importance of storytelling in sales and innovative approaches of marketing through leveraging cybersecurity influencers.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:44 - Introducing guest, Bob Horn</p>
<p>03:36 - Sales &amp; Storytelling in Cybersecurity</p>
<p>07:13 - Current State of SaaS</p>
<p>09:28 - From our Sponsor, Valence Security</p>
<p>10:29 - More SaaS, More Problems</p>
<p>13:52 - Great Security Improves Your Team</p>
<p>17:01 - Consequence of Being Attacked</p>
<p>19:10 - Influencer &amp; In-Person Marketing</p>
<p>25:55 - The Future of SaaS</p>
<p>28:01 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Check out Valence Security:</p>
<p><a href='https://www.valencesecurity.com/'>https://www.valencesecurity.com/</a></p>
<p>Connect with our guest, Bob Horn:</p>
<p><a href='https://www.linkedin.com/in/bob-horn-699a70/'>https://www.linkedin.com/in/bob-horn-699a70/</a></p>
<p>Join us LIVE with Shlomi Matachin on Tuesday, April 16th at 12p ET / 9a PT:</p>
<p><a href='https://www.linkedin.com/events/7181368974062895106/comments/'>https://www.linkedin.com/events/7181368974062895106/comments/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ron Eddings sits down with Bob Horn, Chief Revenue Officer at Valence Security. Their conversation centers around the world of SaaS security, examining the current landscape and challenges in managing SaaS risks. Bob also shares experiences from his 25-year career in sales, focusing on the importance of storytelling in sales and innovative approaches of marketing through leveraging cybersecurity influencers.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:44 - Introducing guest, Bob Horn</p>
<p>03:36 - Sales &amp; Storytelling in Cybersecurity</p>
<p>07:13 - Current State of SaaS</p>
<p>09:28 - From our Sponsor, Valence Security</p>
<p>10:29 - More SaaS, More Problems</p>
<p>13:52 - Great Security Improves Your Team</p>
<p>17:01 - Consequence of Being Attacked</p>
<p>19:10 - Influencer &amp; In-Person Marketing</p>
<p>25:55 - The Future of SaaS</p>
<p>28:01 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Check out Valence Security:</p>
<p><a href='https://www.valencesecurity.com/'>https://www.valencesecurity.com/</a></p>
<p>Connect with our guest, Bob Horn:</p>
<p><a href='https://www.linkedin.com/in/bob-horn-699a70/'>https://www.linkedin.com/in/bob-horn-699a70/</a></p>
<p>Join us LIVE with Shlomi Matachin on Tuesday, April 16th at 12p ET / 9a PT:</p>
<p><a href='https://www.linkedin.com/events/7181368974062895106/comments/'>https://www.linkedin.com/events/7181368974062895106/comments/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ux7p83/Securing_Your_SaaS_and_Cyber_Influencer_Networking_with_CRO_Bob_Hornblayn.mp3" length="29043610" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ron Eddings sits down with Bob Horn, Chief Revenue Officer at Valence Security. Their conversation centers around the world of SaaS security, examining the current landscape and challenges in managing SaaS risks. Bob also shares experiences from his 25-year career in sales, focusing on the importance of storytelling in sales and innovative approaches of marketing through leveraging cybersecurity influencers.
Impactful Moments:
00:00 - Welcome
00:44 - Introducing guest, Bob Horn
03:36 - Sales &amp; Storytelling in Cybersecurity
07:13 - Current State of SaaS
09:28 - From our Sponsor, Valence Security
10:29 - More SaaS, More Problems
13:52 - Great Security Improves Your Team
17:01 - Consequence of Being Attacked
19:10 - Influencer &amp; In-Person Marketing
25:55 - The Future of SaaS
28:01 - One Step Better…
 
Links:
Check out Valence Security:
https://www.valencesecurity.com/
Connect with our guest, Bob Horn:
https://www.linkedin.com/in/bob-horn-699a70/
Join us LIVE with Shlomi Matachin on Tuesday, April 16th at 12p ET / 9a PT:
https://www.linkedin.com/events/7181368974062895106/comments/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1815</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>322</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>From ‘Hand-to-Hand Combat’ To Management in Cyber with Ofer Gayer</title>
        <itunes:title>From ‘Hand-to-Hand Combat’ To Management in Cyber with Ofer Gayer</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/from-hand-to-hand-combat-to-management-in-cyber-with-ofer-gayer/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/from-hand-to-hand-combat-to-management-in-cyber-with-ofer-gayer/#comments</comments>        <pubDate>Tue, 02 Apr 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d5ce99c8-6ffc-3468-9e5e-e78718a077f9</guid>
                                    <description><![CDATA[<p>HVS Host Ron Eddings chats it up with guest Ofer Gayer, VP of Product at Hunters. While both of them reminisce about their first love in security research, Ofer clarifies how he diverted his path and reached the VP stage, while also helping to level up his teams. They’ll conclude by discussing how AI is the ‘zeitgeist of our time’ and how you can get better at whatever you’re doing in cyber.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:10 - Introducing guest, Ofer Gayer</p>
<p>03:12 - ‘Start-up’ in Research</p>
<p>07:55 - Security Research- First Love</p>
<p>10:55 - “A lot of People Want to be Product Managers”</p>
<p>14:46 - “I Had IT Remove My Privileges”</p>
<p>18:20 - Transitioning to Visionary/Zeitgeist</p>
<p>25:30 - Embracing AI Solutions</p>
<p>32:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Ofer Gayer:</p>
<p><a href='https://www.linkedin.com/in/ofer-gayer/'>https://www.linkedin.com/in/ofer-gayer/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>HVS Host Ron Eddings chats it up with guest Ofer Gayer, VP of Product at Hunters. While both of them reminisce about their first love in security research, Ofer clarifies how he diverted his path and reached the VP stage, while also helping to level up his teams. They’ll conclude by discussing how AI is the ‘zeitgeist of our time’ and how you can get better at whatever you’re doing in cyber.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:10 - Introducing guest, Ofer Gayer</p>
<p>03:12 - ‘Start-up’ in Research</p>
<p>07:55 - Security Research- First Love</p>
<p>10:55 - “A lot of People Want to be Product Managers”</p>
<p>14:46 - “I Had IT Remove My Privileges”</p>
<p>18:20 - Transitioning to Visionary/Zeitgeist</p>
<p>25:30 - Embracing AI Solutions</p>
<p>32:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Ofer Gayer:</p>
<p><a href='https://www.linkedin.com/in/ofer-gayer/'>https://www.linkedin.com/in/ofer-gayer/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/66duva/From_Hand-to-Hand_Combat_To_Management_in_Cyber_with_Ofer_Gayer88lcx.mp3" length="51259561" type="audio/mpeg"/>
        <itunes:summary><![CDATA[HVS Host Ron Eddings chats it up with guest Ofer Gayer, VP of Product at Hunters. While both of them reminisce about their first love in security research, Ofer clarifies how he diverted his path and reached the VP stage, while also helping to level up his teams. They’ll conclude by discussing how AI is the ‘zeitgeist of our time’ and how you can get better at whatever you’re doing in cyber.
Impactful Moments:
00:00 - Welcome
01:10 - Introducing guest, Ofer Gayer
03:12 - ‘Start-up’ in Research
07:55 - Security Research- First Love
10:55 - “A lot of People Want to be Product Managers”
14:46 - “I Had IT Remove My Privileges”
18:20 - Transitioning to Visionary/Zeitgeist
25:30 - Embracing AI Solutions
32:30 - One Step Better…
 
Links:
Connect with our guest, Ofer Gayer:
https://www.linkedin.com/in/ofer-gayer/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2127</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>319</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>How Threat Actors Are Accessing Your SaaS Environments with Jaime Blasco</title>
        <itunes:title>How Threat Actors Are Accessing Your SaaS Environments with Jaime Blasco</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/how-threat-actors-are-accessing-your-saas-environments-with-jaime-blasco/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/how-threat-actors-are-accessing-your-saas-environments-with-jaime-blasco/#comments</comments>        <pubDate>Tue, 26 Mar 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d6f9b438-bb17-3a7a-b7e8-50da7b47e9d6</guid>
                                    <description><![CDATA[<p><a href='https://www.linkedin.com/in/ronaldeddings/'>Ron Eddings</a> and<a href='https://www.linkedin.com/in/jaimeblasco/'> Jaime Blasco</a>, Co-Founder and CTO at<a href='https://www.linkedin.com/company/nudge-security/'> Nudge Security</a>, discuss how well-known adversaries are taking advantage of enterprises that don’t have visibility into their full SaaS footprint, and therefore can’t secure it. Grab a front-row seat to gain a new perspective on your vulnerabilities through the eyes of an attacker.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:10 - Introducing guest, Jaime Blasco</p>
<p>02:30 - Real World Impact of SaaS Vulnerabilities</p>
<p>07:35 - Exploring AI &amp; Security Implications</p>
<p>09:50 - Evolution of Threat Actors &amp; Targeted Companies</p>
<p>15:45 - From our Sponsor, Nudge</p>
<p>17:17 - Attackers, Tokens &amp; Ticketing Systems</p>
<p>22:50 - Lazarus &amp; Malicious SaaS Apps</p>
<p>26:50 - The Attackers are Talking with You…</p>
<p>29:18 - Run it In the Cloud &amp; Make Honey Tokens</p>
<p>34:04 - Future of SaaS &amp; AI in Cybersecurity</p>
<p>39:00 - Increase Visibility, Reduce Risk</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest,<a href='https://www.linkedin.com/in/jaimeblasco/'> Jaime Blasco:</a></p>
<p>Check out our friends at<a href='http://nudgesecurity.com/hackervalley'> Nudge</a>:</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p><a href='https://www.linkedin.com/in/ronaldeddings/'>Ron Eddings</a> and<a href='https://www.linkedin.com/in/jaimeblasco/'> Jaime Blasco</a>, Co-Founder and CTO at<a href='https://www.linkedin.com/company/nudge-security/'> Nudge Security</a>, discuss how well-known adversaries are taking advantage of enterprises that don’t have visibility into their full SaaS footprint, and therefore can’t secure it. Grab a front-row seat to gain a new perspective on your vulnerabilities through the eyes of an attacker.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:10 - Introducing guest, Jaime Blasco</p>
<p>02:30 - Real World Impact of SaaS Vulnerabilities</p>
<p>07:35 - Exploring AI &amp; Security Implications</p>
<p>09:50 - Evolution of Threat Actors &amp; Targeted Companies</p>
<p>15:45 - From our Sponsor, Nudge</p>
<p>17:17 - Attackers, Tokens &amp; Ticketing Systems</p>
<p>22:50 - Lazarus &amp; Malicious SaaS Apps</p>
<p>26:50 - The Attackers are Talking with You…</p>
<p>29:18 - Run it In the Cloud &amp; Make Honey Tokens</p>
<p>34:04 - Future of SaaS &amp; AI in Cybersecurity</p>
<p>39:00 - Increase Visibility, Reduce Risk</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest,<a href='https://www.linkedin.com/in/jaimeblasco/'> Jaime Blasco:</a></p>
<p>Check out our friends at<a href='http://nudgesecurity.com/hackervalley'> Nudge</a>:</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hv232d/How_Threat_Actors_Are_Accessing_Your_SaaS_Environments_with_Jaime_Blasco8yut9.mp3" length="65536566" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ron Eddings and Jaime Blasco, Co-Founder and CTO at Nudge Security, discuss how well-known adversaries are taking advantage of enterprises that don’t have visibility into their full SaaS footprint, and therefore can’t secure it. Grab a front-row seat to gain a new perspective on your vulnerabilities through the eyes of an attacker.
 
Impactful Moments:
00:00 - Welcome
01:10 - Introducing guest, Jaime Blasco
02:30 - Real World Impact of SaaS Vulnerabilities
07:35 - Exploring AI &amp; Security Implications
09:50 - Evolution of Threat Actors &amp; Targeted Companies
15:45 - From our Sponsor, Nudge
17:17 - Attackers, Tokens &amp; Ticketing Systems
22:50 - Lazarus &amp; Malicious SaaS Apps
26:50 - The Attackers are Talking with You…
29:18 - Run it In the Cloud &amp; Make Honey Tokens
34:04 - Future of SaaS &amp; AI in Cybersecurity
39:00 - Increase Visibility, Reduce Risk
 
Links:
Connect with our guest, Jaime Blasco:
Check out our friends at Nudge:
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2714</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>321</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Future of Endpoint Threats and Why Zero Trust is the Only Option with Rob Allen</title>
        <itunes:title>The Future of Endpoint Threats and Why Zero Trust is the Only Option with Rob Allen</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-future-of-endpoint-threats-and-why-zero-trust-is-the-only-option-with-rob-allen/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-future-of-endpoint-threats-and-why-zero-trust-is-the-only-option-with-rob-allen/#comments</comments>        <pubDate>Wed, 20 Mar 2024 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a8e75754-d45e-3e41-a149-3f49670d66ff</guid>
                                    <description><![CDATA[<p>Get ready for a SPECIAL episode! Ron Eddings will take you on an inside look at Threatlocker’s rapidly growing event, Zero Trust World, and will talk with Rob Allen, Chief Product Officer at Threatlocker, to discuss what you can find out from your endpoints (hint: it’s more than remote access tools you didn’t know were running!)</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:24 - Zero Trust World Sneak Peek!</p>
<p>02:21 - From our Sponsor, Threatlocker</p>
<p>03:50 - Introducing guest, Rob Allen</p>
<p>05:03 - What’s Zero Trust World</p>
<p>10:40 - Technical Executive Leaders</p>
<p>16:24 - Managing from the Top Down</p>
<p>20:33 - More Than Allow Listing</p>
<p>24:38 - Rubber Ducky, You’re the One…</p>
<p>26:59 - Assume Breach</p>
<p>29:30 - Some Interesting Finds</p>
<p>35:55 - Where Most of the Action Happens</p>
<p>26:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Rob Allen:</p>
<p><a href='https://www.linkedin.com/in/threatlockerrob/'>https://www.linkedin.com/in/threatlockerrob/</a> </p>
<p>Check out <a href='https://www.threatlocker.com/'>https://www.threatlocker.com/</a>  to learn more!</p>
<p>See the Zero Trust World recap portion <a href='https://youtu.be/ehygzsoMijQ'>here</a> on our YouTube</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Get ready for a SPECIAL episode! Ron Eddings will take you on an inside look at Threatlocker’s rapidly growing event, Zero Trust World, and will talk with Rob Allen, Chief Product Officer at Threatlocker, to discuss what you can find out from your endpoints (hint: it’s more than remote access tools you didn’t know were running!)</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:24 - Zero Trust World Sneak Peek!</p>
<p>02:21 - From our Sponsor, Threatlocker</p>
<p>03:50 - Introducing guest, Rob Allen</p>
<p>05:03 - What’s Zero Trust World</p>
<p>10:40 - Technical Executive Leaders</p>
<p>16:24 - Managing from the Top Down</p>
<p>20:33 - More Than Allow Listing</p>
<p>24:38 - Rubber Ducky, You’re the One…</p>
<p>26:59 - Assume Breach</p>
<p>29:30 - Some Interesting Finds</p>
<p>35:55 - Where Most of the Action Happens</p>
<p>26:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Rob Allen:</p>
<p><a href='https://www.linkedin.com/in/threatlockerrob/'>https://www.linkedin.com/in/threatlockerrob/</a> </p>
<p>Check out <a href='https://www.threatlocker.com/'>https://www.threatlocker.com/</a>  to learn more!</p>
<p>See the Zero Trust World recap portion <a href='https://youtu.be/ehygzsoMijQ'>here</a> on our YouTube</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ckgtxr/The_Future_of_Endpoint_Threats_and_Why_Zero_Trust_is_the_Only_Option_with_Rob_Allen8jjar.mp3" length="76650912" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Get ready for a SPECIAL episode! Ron Eddings will take you on an inside look at Threatlocker’s rapidly growing event, Zero Trust World, and will talk with Rob Allen, Chief Product Officer at Threatlocker, to discuss what you can find out from your endpoints (hint: it’s more than remote access tools you didn’t know were running!)
 
Impactful Moments:
00:00 - Welcome
01:24 - Zero Trust World Sneak Peek!
02:21 - From our Sponsor, Threatlocker
03:50 - Introducing guest, Rob Allen
05:03 - What’s Zero Trust World
10:40 - Technical Executive Leaders
16:24 - Managing from the Top Down
20:33 - More Than Allow Listing
24:38 - Rubber Ducky, You’re the One…
26:59 - Assume Breach
29:30 - Some Interesting Finds
35:55 - Where Most of the Action Happens
26:30 - One Step Better…
 
Links:
Connect with our guest, Rob Allen:
https://www.linkedin.com/in/threatlockerrob/ 
Check out https://www.threatlocker.com/  to learn more!
See the Zero Trust World recap portion here on our YouTube
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2622</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>320</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Slugging it Out in the SOC to Find Your Niche in Cyber with Nate Malicoat</title>
        <itunes:title>Slugging it Out in the SOC to Find Your Niche in Cyber with Nate Malicoat</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/slugging-it-out-in-the-soc-to-find-your-niche-in-cyber-with-nate-malicoat/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/slugging-it-out-in-the-soc-to-find-your-niche-in-cyber-with-nate-malicoat/#comments</comments>        <pubDate>Tue, 05 Mar 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ca984cd9-3229-39bc-a8d4-07b15a5c0842</guid>
                                    <description><![CDATA[<p>Ron Eddings sits down in-person with Nate Malicoat, Threat Intel Engineer at ContraForce, for a down-to-earth interview about entering the cybersecurity workforce from the Marines.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guest, Nate Malicoat</p>
<p>03:00 - Marines to Computer Life</p>
<p>05:13 - Importance of Mentoring &amp; Mentors</p>
<p>10:04 - Participating in the Industry</p>
<p>12:42 - Why Aim For the CISO role?</p>
<p>14:40 - Be Persistent, But Not Annoying</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Nate Malicoat:</p>
<p><a href='https://www.linkedin.com/in/nate-malicoat-58760a143/'>https://www.linkedin.com/in/nate-malicoat-58760a143/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ron Eddings sits down in-person with Nate Malicoat, Threat Intel Engineer at ContraForce, for a down-to-earth interview about entering the cybersecurity workforce from the Marines.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guest, Nate Malicoat</p>
<p>03:00 - Marines to Computer Life</p>
<p>05:13 - Importance of Mentoring &amp; Mentors</p>
<p>10:04 - Participating in the Industry</p>
<p>12:42 - Why Aim For the CISO role?</p>
<p>14:40 - Be Persistent, But Not Annoying</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Nate Malicoat:</p>
<p><a href='https://www.linkedin.com/in/nate-malicoat-58760a143/'>https://www.linkedin.com/in/nate-malicoat-58760a143/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/89jx8u/Slugging_it_Out_in_the_SOC_to_Find_Your_Niche_in_Cyber_with_Nate_Malicoatbfaou.mp3" length="23889361" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ron Eddings sits down in-person with Nate Malicoat, Threat Intel Engineer at ContraForce, for a down-to-earth interview about entering the cybersecurity workforce from the Marines.
Impactful Moments:
00:00 - Welcome
01:20 - Introducing guest, Nate Malicoat
03:00 - Marines to Computer Life
05:13 - Importance of Mentoring &amp; Mentors
10:04 - Participating in the Industry
12:42 - Why Aim For the CISO role?
14:40 - Be Persistent, But Not Annoying
 
Links:
Connect with our guest, Nate Malicoat:
https://www.linkedin.com/in/nate-malicoat-58760a143/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>986</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>318</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Creating Value in the Cyber Industry with Nick Lantuh</title>
        <itunes:title>Creating Value in the Cyber Industry with Nick Lantuh</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/creating-value-in-the-cyber-industry-with-nick-lantuh/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/creating-value-in-the-cyber-industry-with-nick-lantuh/#comments</comments>        <pubDate>Tue, 27 Feb 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3b5eb375-3850-3d9e-9d40-e99ca9f44e2e</guid>
                                    <description><![CDATA[<p>Nick Lantuh, CEO of Interpres Security, joins Ron Eddings on the mic at Hacker Valley’s “On the Big Screen” event to talk about how Nick’s previous career experience have given him unique insight into the cybersecurity industry. Ron and Nick discuss everything from Nick’s immigrant background and his experience with helping customers, to threat modeling and starting up companies.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:05 - Introducing guest, Nick Lantuh</p>
<p>03:06 - The Differentiator</p>
<p>06:21 - Wanting to ‘Be Your Own Boss’</p>
<p>10:00 - Being the Executive Chairman</p>
<p>12:47 - The Go-To-Market Side</p>
<p>15:11 - The Turnaround</p>
<p>18:01 - Making the Ecosystem Better</p>
<p>21:20 - Bridging the Gap</p>
<p>24:14 - Exposure Management</p>
<p>29:59 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Nick Lantuh:</p>
<p><a href='https://www.linkedin.com/in/nicklantuh/'>https://www.linkedin.com/in/nicklantuh/</a></p>
<p>Check out Interpres Security:</p>
<p><a href='https://interpressecurity.com/'>https://interpressecurity.com/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Nick Lantuh, CEO of Interpres Security, joins Ron Eddings on the mic at Hacker Valley’s “On the Big Screen” event to talk about how Nick’s previous career experience have given him unique insight into the cybersecurity industry. Ron and Nick discuss everything from Nick’s immigrant background and his experience with helping customers, to threat modeling and starting up companies.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:05 - Introducing guest, Nick Lantuh</p>
<p>03:06 - The Differentiator</p>
<p>06:21 - Wanting to ‘Be Your Own Boss’</p>
<p>10:00 - Being the Executive Chairman</p>
<p>12:47 - The Go-To-Market Side</p>
<p>15:11 - The Turnaround</p>
<p>18:01 - Making the Ecosystem Better</p>
<p>21:20 - Bridging the Gap</p>
<p>24:14 - Exposure Management</p>
<p>29:59 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Nick Lantuh:</p>
<p><a href='https://www.linkedin.com/in/nicklantuh/'>https://www.linkedin.com/in/nicklantuh/</a></p>
<p>Check out Interpres Security:</p>
<p><a href='https://interpressecurity.com/'>https://interpressecurity.com/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jkaabw/Creating_Value_in_the_Cyber_Industry_with_Nick_Lantuh70sul.mp3" length="30493093" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Nick Lantuh, CEO of Interpres Security, joins Ron Eddings on the mic at Hacker Valley’s “On the Big Screen” event to talk about how Nick’s previous career experience have given him unique insight into the cybersecurity industry. Ron and Nick discuss everything from Nick’s immigrant background and his experience with helping customers, to threat modeling and starting up companies.
 
Impactful Moments:
00:00 - Welcome
01:05 - Introducing guest, Nick Lantuh
03:06 - The Differentiator
06:21 - Wanting to ‘Be Your Own Boss’
10:00 - Being the Executive Chairman
12:47 - The Go-To-Market Side
15:11 - The Turnaround
18:01 - Making the Ecosystem Better
21:20 - Bridging the Gap
24:14 - Exposure Management
29:59 - One Step Better…
 
Links:
Connect with our guest, Nick Lantuh:
https://www.linkedin.com/in/nicklantuh/
Check out Interpres Security:
https://interpressecurity.com/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1905</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>317</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>AI &amp; Phishing: Fighting Fire with Fire</title>
        <itunes:title>AI &amp; Phishing: Fighting Fire with Fire</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ai-phishing-fighting-fire-with-fire/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ai-phishing-fighting-fire-with-fire/#comments</comments>        <pubDate>Tue, 20 Feb 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2c560155-148d-33ae-b24e-044f3ca0bff3</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings is joined by <a href='https://www.linkedin.com/in/dixitvishal/'>Vishal Dixit</a>, Co-founder &amp; CTO at <a href='https://www.linkedin.com/company/graphus-inc-/'>Graphus Inc.</a>, and <a href='https://www.linkedin.com/in/sven-bechmann-product-management/'>Sven Bechmann</a>, Senior Product Manager of Email Security at <a href='https://www.linkedin.com/company/kaseya/'>Kaseya</a> to dig into how phishing attacks are evolving and how you can keep your business safe.</p>
<p> </p>
<p>Get the ultimate email security software and stop phishing attacks that others miss! Request a <a href='https://www.graphus.ai/hackervalley'>demo</a> from our friends at Graphus, today! -- and don't miss their <a href='https://www.graphus.ai/resources/5-minute-guide-to-phishing-attacks-and-prevention/?utm_source=701Rp000006wgDV'>5-minute guide</a> to phishing attacks and prevention. </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:37 - Introducing guests Vishal &amp; Sven</p>
<p>02:50 - The Current State of Phishing</p>
<p>06:40 - Phishing &amp; Career Path</p>
<p>10:47 - From our Sponsor, Graphus Inc</p>
<p>12:07 - Phishing &amp; Email Security</p>
<p>14:27 - “Security Is an Afterthought”</p>
<p>17:29 - What are Hackers Doing with AI?</p>
<p>23:08 - AI &amp; Phishing Detection</p>
<p>31:30 - Phishing Evolution</p>
<p>35:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests:</p>
<p>Vishal Dixit: <a href='https://www.linkedin.com/in/dixitvishal/'>https://www.linkedin.com/in/dixitvishal/</a></p>
<p>Sven Bechmann: <a href='https://www.linkedin.com/in/sven-bechmann-product-management/'>https://www.linkedin.com/in/sven-bechmann-product-management/</a></p>
<p>Learn more from <a href='http://Graphus.ai'>Graphus.ai</a>:</p>
<p><a href='https://www.graphus.ai/hackervalley'>https://www.graphus.ai/hackervalley</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings is joined by <a href='https://www.linkedin.com/in/dixitvishal/'>Vishal Dixit</a>, Co-founder &amp; CTO at <a href='https://www.linkedin.com/company/graphus-inc-/'>Graphus Inc.</a>, and <a href='https://www.linkedin.com/in/sven-bechmann-product-management/'>Sven Bechmann</a>, Senior Product Manager of Email Security at <a href='https://www.linkedin.com/company/kaseya/'>Kaseya</a> to dig into how phishing attacks are evolving and how you can keep your business safe.</p>
<p> </p>
<p>Get the ultimate email security software and stop phishing attacks that others miss! Request a <a href='https://www.graphus.ai/hackervalley'>demo</a> from our friends at Graphus, today! -- and don't miss their <a href='https://www.graphus.ai/resources/5-minute-guide-to-phishing-attacks-and-prevention/?utm_source=701Rp000006wgDV'>5-minute guide</a> to phishing attacks and prevention. </p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:37 - Introducing guests Vishal &amp; Sven</p>
<p>02:50 - The Current State of Phishing</p>
<p>06:40 - Phishing &amp; Career Path</p>
<p>10:47 - From our Sponsor, Graphus Inc</p>
<p>12:07 - Phishing &amp; Email Security</p>
<p>14:27 - “Security Is an Afterthought”</p>
<p>17:29 - What are Hackers Doing with AI?</p>
<p>23:08 - AI &amp; Phishing Detection</p>
<p>31:30 - Phishing Evolution</p>
<p>35:30 - One Step Better…</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guests:</p>
<p>Vishal Dixit: <a href='https://www.linkedin.com/in/dixitvishal/'>https://www.linkedin.com/in/dixitvishal/</a></p>
<p>Sven Bechmann: <a href='https://www.linkedin.com/in/sven-bechmann-product-management/'>https://www.linkedin.com/in/sven-bechmann-product-management/</a></p>
<p>Learn more from <a href='http://Graphus.ai'>Graphus.ai</a>:</p>
<p><a href='https://www.graphus.ai/hackervalley'>https://www.graphus.ai/hackervalley</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/h3fgjn/AI_Phishing-FightingFirewithFire7j630.mp3" length="36373193" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings is joined by Vishal Dixit, Co-founder &amp; CTO at Graphus Inc., and Sven Bechmann, Senior Product Manager of Email Security at Kaseya to dig into how phishing attacks are evolving and how you can keep your business safe.
 
Get the ultimate email security software and stop phishing attacks that others miss! Request a demo from our friends at Graphus, today! -- and don't miss their 5-minute guide to phishing attacks and prevention. 
 
Impactful Moments:
00:00 - Welcome
01:37 - Introducing guests Vishal &amp; Sven
02:50 - The Current State of Phishing
06:40 - Phishing &amp; Career Path
10:47 - From our Sponsor, Graphus Inc
12:07 - Phishing &amp; Email Security
14:27 - “Security Is an Afterthought”
17:29 - What are Hackers Doing with AI?
23:08 - AI &amp; Phishing Detection
31:30 - Phishing Evolution
35:30 - One Step Better…
 
Links:
Connect with our guests:
Vishal Dixit: https://www.linkedin.com/in/dixitvishal/
Sven Bechmann: https://www.linkedin.com/in/sven-bechmann-product-management/
Learn more from Graphus.ai:
https://www.graphus.ai/hackervalley
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2273</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>316</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Andrew Forgie's Path From Apache Mechanic to Cybersecurity Sales Leader and Mastering Cyber Sales</title>
        <itunes:title>Andrew Forgie's Path From Apache Mechanic to Cybersecurity Sales Leader and Mastering Cyber Sales</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/andrew-forgies-path-from-apache-mechanic-to-cybersecurity-sales-leader-and-mastering-cyber-sales/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/andrew-forgies-path-from-apache-mechanic-to-cybersecurity-sales-leader-and-mastering-cyber-sales/#comments</comments>        <pubDate>Wed, 14 Feb 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6a1c6c54-ca0e-38e6-9253-9469696e5c1f</guid>
                                    <description><![CDATA[<p>In this episode, Andrew Forgie takes us on his journey from his early days as an Apache helicopter mechanic in the military to his current role as a regional sales manager in cybersecurity. </p>
<p>Andrew shares his trials and challenges, the significant shift from being in a service role to mastering the art of sales in the highly competitive tech industry.</p>
<p>His story illustrates the power of adapting to change and the critical role of personal development in achieving professional success.</p>
<p>00:00 - Introduction
00:42 - Introduction to the episode and guest Andrew Forgie, regional sales manager at RMS.
01:29 - Andrew discusses his transition from the military to cybersecurity sales.
02:43 - Insight into Andrew's early struggles and successes in sales.
04:13 - How "Selling for Dummies" transformed Andrew's approach to sales.
06:02 - The importance of attitude and creating a buying environment in sales.
08:09 - Andrew shares his life vision exercise and its impact on his career.
12:09 - Discussion on the value of relationships in cybersecurity sales.
24:19 - Advice for those looking to enter or excel in cybersecurity sales.</p>
<p>Links:
Connect with our guest Andrew Forgie: https://www.linkedin.com/in/andrewforgie/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Andrew Forgie takes us on his journey from his early days as an Apache helicopter mechanic in the military to his current role as a regional sales manager in cybersecurity. </p>
<p>Andrew shares his trials and challenges, the significant shift from being in a service role to mastering the art of sales in the highly competitive tech industry.</p>
<p>His story illustrates the power of adapting to change and the critical role of personal development in achieving professional success.</p>
<p>00:00 - Introduction<br>
00:42 - Introduction to the episode and guest Andrew Forgie, regional sales manager at RMS.<br>
01:29 - Andrew discusses his transition from the military to cybersecurity sales.<br>
02:43 - Insight into Andrew's early struggles and successes in sales.<br>
04:13 - How "Selling for Dummies" transformed Andrew's approach to sales.<br>
06:02 - The importance of attitude and creating a buying environment in sales.<br>
08:09 - Andrew shares his life vision exercise and its impact on his career.<br>
12:09 - Discussion on the value of relationships in cybersecurity sales.<br>
24:19 - Advice for those looking to enter or excel in cybersecurity sales.</p>
<p>Links:<br>
Connect with our guest Andrew Forgie: https://www.linkedin.com/in/andrewforgie/<br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
https://www.patreon.com/hackervalleystudio<br>
Become a sponsor of the show to amplify your brand:<br>
https://hackervalley.com/work-with-us/<br>
Love Hacker Valley Studio? Pick up some swag:<br>
https://store.hackervalley.com<br>
Continue the conversation by joining our Discord:<br>
https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/y9z4zt/Andrew_Forgey_s_Path_From_Apache_Mechanic_to_Cybersecurity_Sales_Leader_and_Mastering_Cyber_Sales8gwu5.mp3" length="39127266" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Andrew Forgie takes us on his journey from his early days as an Apache helicopter mechanic in the military to his current role as a regional sales manager in cybersecurity. 
Andrew shares his trials and challenges, the significant shift from being in a service role to mastering the art of sales in the highly competitive tech industry.
His story illustrates the power of adapting to change and the critical role of personal development in achieving professional success.
00:00 - Introduction00:42 - Introduction to the episode and guest Andrew Forgie, regional sales manager at RMS.01:29 - Andrew discusses his transition from the military to cybersecurity sales.02:43 - Insight into Andrew's early struggles and successes in sales.04:13 - How "Selling for Dummies" transformed Andrew's approach to sales.06:02 - The importance of attitude and creating a buying environment in sales.08:09 - Andrew shares his life vision exercise and its impact on his career.12:09 - Discussion on the value of relationships in cybersecurity sales.24:19 - Advice for those looking to enter or excel in cybersecurity sales.
Links:Connect with our guest Andrew Forgie: https://www.linkedin.com/in/andrewforgie/Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioBecome a sponsor of the show to amplify your brand:https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag:https://store.hackervalley.comContinue the conversation by joining our Discord:https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1618</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>315</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Zinet Kemal's Journey From Ethiopian Immigrant to TEDx Speaker &amp; Cloud Security Engineer at Fortune</title>
        <itunes:title>Zinet Kemal's Journey From Ethiopian Immigrant to TEDx Speaker &amp; Cloud Security Engineer at Fortune</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/zinet-kemals-journey-from-ethiopian-immigrant-to-tedx-speaker-cloud-security-engineer-at-fortune/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/zinet-kemals-journey-from-ethiopian-immigrant-to-tedx-speaker-cloud-security-engineer-at-fortune/#comments</comments>        <pubDate>Tue, 06 Feb 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1d9126b2-0e72-3ba4-ba76-405530f95e2f</guid>
                                    <description><![CDATA[<p>In this episode of Hacker Valley Studio, we dive into the inspiring journey of Zinet Kamal, an immigrant from Ethiopia who has carved a niche for herself in cybersecurity. Despite starting her journey with limited access to technology and not having mentors until 2020, Zinet's resilience and passion led her to become a cloud security engineer at a Fortune 500 company. Her story is a testament to the human spirit's capability to overcome barriers and make significant strides in the tech industry.</p>
<p> </p>
<p>This episode is a story of personal growth, cultural transitions, and the drive to empower the next generation through education and cybersecurity awareness. As a mother of four, a multi-award-winning cybersecurity advocate, and a best-selling author, Zinet brings a unique perspective on the importance of diversity in tech and the role of mentorship in shaping future leaders.</p>
<p>00:00 - Welcome</p>
<p>01:32 - Introducing Guest, Zinet Kemal</p>
<p>03:09 - Growing up in Africa</p>
<p>07:12 - “I Never Had a Children’s Book”</p>
<p>12:52 - Culture Shock</p>
<p>16:02 - From Legal to Cybersecurity</p>
<p>18:50 - CCDC Competition</p>
<p>21:55 - Role of Community in Resetting</p>
<p>24:34 - “Oh No… Hacked Again!”</p>
<p>30:00 - Online Safety Empowerment</p>
<p>34:50 - Moving up in Cyber </p>
<p> </p>
<p>Links:</p>
<p>Connect with Zinet Kemal: <a href='https://www.linkedin.com/in/zinetkemal/'>https://www.linkedin.com/in/zinetkemal/</a></p>
<p>Zinet’s LinkedIn Course: </p>
<p>https://www.linkedin.com/learning/cybersecurity-careers-build-your-brand-in-cybersecurity/grow-your-cybersecurity-career-with-personal-branding?course</p>
<p>Check out Zinet's Books: https://www.amazon.com/stores/Zinet-Kemal/author/B099P5B8FD</p>
<p>Watch Zinet's TEDx Talk: https://www.youtube.com/watch?v=J61K1Gu97jM</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p>https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Hacker Valley Studio, we dive into the inspiring journey of Zinet Kamal, an immigrant from Ethiopia who has carved a niche for herself in cybersecurity. Despite starting her journey with limited access to technology and not having mentors until 2020, Zinet's resilience and passion led her to become a cloud security engineer at a Fortune 500 company. Her story is a testament to the human spirit's capability to overcome barriers and make significant strides in the tech industry.</p>
<p> </p>
<p>This episode is a story of personal growth, cultural transitions, and the drive to empower the next generation through education and cybersecurity awareness. As a mother of four, a multi-award-winning cybersecurity advocate, and a best-selling author, Zinet brings a unique perspective on the importance of diversity in tech and the role of mentorship in shaping future leaders.</p>
<p>00:00 - Welcome</p>
<p>01:32 - Introducing Guest, Zinet Kemal</p>
<p>03:09 - Growing up in Africa</p>
<p>07:12 - “I Never Had a Children’s Book”</p>
<p>12:52 - Culture Shock</p>
<p>16:02 - From Legal to Cybersecurity</p>
<p>18:50 - CCDC Competition</p>
<p>21:55 - Role of Community in Resetting</p>
<p>24:34 - “Oh No… Hacked Again!”</p>
<p>30:00 - Online Safety Empowerment</p>
<p>34:50 - Moving up in Cyber </p>
<p> </p>
<p>Links:</p>
<p>Connect with Zinet Kemal: <a href='https://www.linkedin.com/in/zinetkemal/'>https://www.linkedin.com/in/zinetkemal/</a></p>
<p>Zinet’s LinkedIn Course: </p>
<p>https://www.linkedin.com/learning/cybersecurity-careers-build-your-brand-in-cybersecurity/grow-your-cybersecurity-career-with-personal-branding?course</p>
<p>Check out Zinet's Books: https://www.amazon.com/stores/Zinet-Kemal/author/B099P5B8FD</p>
<p>Watch Zinet's TEDx Talk: https://www.youtube.com/watch?v=J61K1Gu97jM</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p>https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fhmfsc/Zinet_Kemal_s_Journey_From_Ethiopian_Immigrant_to_TedX_Speaker_Cloud_Security_Engineer_at_Fortune_500_Company6m5sg.mp3" length="65131930" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley Studio, we dive into the inspiring journey of Zinet Kamal, an immigrant from Ethiopia who has carved a niche for herself in cybersecurity. Despite starting her journey with limited access to technology and not having mentors until 2020, Zinet's resilience and passion led her to become a cloud security engineer at a Fortune 500 company. Her story is a testament to the human spirit's capability to overcome barriers and make significant strides in the tech industry.
 
This episode is a story of personal growth, cultural transitions, and the drive to empower the next generation through education and cybersecurity awareness. As a mother of four, a multi-award-winning cybersecurity advocate, and a best-selling author, Zinet brings a unique perspective on the importance of diversity in tech and the role of mentorship in shaping future leaders.
00:00 - Welcome
01:32 - Introducing Guest, Zinet Kemal
03:09 - Growing up in Africa
07:12 - “I Never Had a Children’s Book”
12:52 - Culture Shock
16:02 - From Legal to Cybersecurity
18:50 - CCDC Competition
21:55 - Role of Community in Resetting
24:34 - “Oh No… Hacked Again!”
30:00 - Online Safety Empowerment
34:50 - Moving up in Cyber 
 
Links:
Connect with Zinet Kemal: https://www.linkedin.com/in/zinetkemal/
Zinet’s LinkedIn Course: 
https://www.linkedin.com/learning/cybersecurity-careers-build-your-brand-in-cybersecurity/grow-your-cybersecurity-career-with-personal-branding?course
Check out Zinet's Books: https://www.amazon.com/stores/Zinet-Kemal/author/B099P5B8FD
Watch Zinet's TEDx Talk: https://www.youtube.com/watch?v=J61K1Gu97jM
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2319</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>314</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Paving the Path for CISOs of the Future with Gary Hayslip</title>
        <itunes:title>Paving the Path for CISOs of the Future with Gary Hayslip</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/paving-the-path-for-cisos-of-the-future-with-gary-hayslip/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/paving-the-path-for-cisos-of-the-future-with-gary-hayslip/#comments</comments>        <pubDate>Tue, 30 Jan 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a48bf46a-e772-3723-b7ea-c952383d9cd5</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings catches up with repeat guest, Gary Hayslip, CISO at SoftBank Investment Advisors and co-author of CISO Desk Reference guide. Gary explains that the varied nature of his current CISO role contrasts with the broader industry trends. He discusses how that nature plays into the CISO hiring process and career path, as well as how his books are helping to bridge the gap among professionals.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:59 - Introducing guest, Gary Hayslip</p>
<p>01:38 - The Path to Becoming a CISO</p>
<p>08:04 - CSO vs CISO</p>
<p>10:47 - “I'm firing you…”</p>
<p>15:03 - Interviewing for the CISO role</p>
<p>17:56 - Join Our Mastermind</p>
<p>18:39 - Being ‘Mr. Maybe’</p>
<p>21:41 - CISO- A Day in the Life</p>
<p>24:50 - Using Books to Pave the Way</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Gary Hayslip:</p>
<p><a href='https://www.linkedin.com/in/ghayslip/'>https://www.linkedin.com/in/ghayslip/</a></p>
<p>Check out Gary’s Books:</p>
<p><a href='https://www.amazon.com/stores/Gary-Hayslip/author/B01IJN838A?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true'>https://www.amazon.com/stores/Gary-Hayslip/author/B01IJN838A?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings catches up with repeat guest, Gary Hayslip, CISO at SoftBank Investment Advisors and co-author of CISO Desk Reference guide. Gary explains that the varied nature of his current CISO role contrasts with the broader industry trends. He discusses how that nature plays into the CISO hiring process and career path, as well as how his books are helping to bridge the gap among professionals.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>00:59 - Introducing guest, Gary Hayslip</p>
<p>01:38 - The Path to Becoming a CISO</p>
<p>08:04 - CSO vs CISO</p>
<p>10:47 - “I'm firing you…”</p>
<p>15:03 - Interviewing for the CISO role</p>
<p>17:56 - Join Our Mastermind</p>
<p>18:39 - Being ‘Mr. Maybe’</p>
<p>21:41 - CISO- A Day in the Life</p>
<p>24:50 - Using Books to Pave the Way</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Gary Hayslip:</p>
<p><a href='https://www.linkedin.com/in/ghayslip/'>https://www.linkedin.com/in/ghayslip/</a></p>
<p>Check out Gary’s Books:</p>
<p><a href='https://www.amazon.com/stores/Gary-Hayslip/author/B01IJN838A?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true'>https://www.amazon.com/stores/Gary-Hayslip/author/B01IJN838A?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kvetgh/Gary_Hayslip90ep4.mp3" length="28061406" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings catches up with repeat guest, Gary Hayslip, CISO at SoftBank Investment Advisors and co-author of CISO Desk Reference guide. Gary explains that the varied nature of his current CISO role contrasts with the broader industry trends. He discusses how that nature plays into the CISO hiring process and career path, as well as how his books are helping to bridge the gap among professionals.
 
Impactful Moments:
00:00 - Welcome
00:59 - Introducing guest, Gary Hayslip
01:38 - The Path to Becoming a CISO
08:04 - CSO vs CISO
10:47 - “I'm firing you…”
15:03 - Interviewing for the CISO role
17:56 - Join Our Mastermind
18:39 - Being ‘Mr. Maybe’
21:41 - CISO- A Day in the Life
24:50 - Using Books to Pave the Way
 
Links:
Connect with our guest Gary Hayslip:
https://www.linkedin.com/in/ghayslip/
Check out Gary’s Books:
https://www.amazon.com/stores/Gary-Hayslip/author/B01IJN838A?ref=ap_rdr&amp;isDramIntegrated=true&amp;shoppingPortalEnabled=true
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1753</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>313</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Untold Story of Browser Risks: Pioneering Enterprise Browser Security with Or Eshed</title>
        <itunes:title>The Untold Story of Browser Risks: Pioneering Enterprise Browser Security with Or Eshed</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-untold-story-of-browser-risks-pioneering-enterprise-browser-security-with-or-eshed/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-untold-story-of-browser-risks-pioneering-enterprise-browser-security-with-or-eshed/#comments</comments>        <pubDate>Tue, 23 Jan 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7eea1691-97d6-35a2-a04b-ce343ea7c709</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings and guest Or Eshed, CEO of Layer X, discuss how changes in IT infrastructure, employee behavior and malicious tech have created an era where browser security is a must. Or details how he is spearheading a movement to reposition browsers as our first line of defense.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>02:50 - Introducing guest, Or Eshed</p>
<p>05:27 - The Crime Scene: Where Employees Are</p>
<p>07:20 - Educating Users with a Browser Extension</p>
<p>10:13 - The Enablement Game</p>
<p>13:10 - How Malicious Browser Extensions Work</p>
<p>16:07 - From our Sponsor, Layer X</p>
<p>17:33 - Better Than EDR- Know Who Is Doing What</p>
<p>22:53 - Stop Account Takeovers- Stealthily</p>
<p>27:55 - Predictions &amp; GPT Use Case</p>
<p>33:16 - One Step Better…</p>
<p>Links:</p>
<p>Connect with our guest :</p>
<p><a href='https://www.linkedin.com/in/or-eshed/'>https://www.linkedin.com/in/or-eshed/</a></p>
<p>Check out Layer X:</p>
<p><a href='https://layerxsecurity.com/'>https://layerxsecurity.com/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings and guest Or Eshed, CEO of Layer X, discuss how changes in IT infrastructure, employee behavior and malicious tech have created an era where browser security is a must. Or details how he is spearheading a movement to reposition browsers as our first line of defense.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>02:50 - Introducing guest, Or Eshed</p>
<p>05:27 - The Crime Scene: Where Employees Are</p>
<p>07:20 - Educating Users with a Browser Extension</p>
<p>10:13 - The Enablement Game</p>
<p>13:10 - How Malicious Browser Extensions Work</p>
<p>16:07 - From our Sponsor, Layer X</p>
<p>17:33 - Better Than EDR- Know Who Is Doing What</p>
<p>22:53 - Stop Account Takeovers- Stealthily</p>
<p>27:55 - Predictions &amp; GPT Use Case</p>
<p>33:16 - One Step Better…</p>
<p>Links:</p>
<p>Connect with our guest :</p>
<p><a href='https://www.linkedin.com/in/or-eshed/'>https://www.linkedin.com/in/or-eshed/</a></p>
<p>Check out Layer X:</p>
<p><a href='https://layerxsecurity.com/'>https://layerxsecurity.com/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9yhdfg/Layer_x_v265agf.mp3" length="34508845" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings and guest Or Eshed, CEO of Layer X, discuss how changes in IT infrastructure, employee behavior and malicious tech have created an era where browser security is a must. Or details how he is spearheading a movement to reposition browsers as our first line of defense.
Impactful Moments:
00:00 - Welcome
02:50 - Introducing guest, Or Eshed
05:27 - The Crime Scene: Where Employees Are
07:20 - Educating Users with a Browser Extension
10:13 - The Enablement Game
13:10 - How Malicious Browser Extensions Work
16:07 - From our Sponsor, Layer X
17:33 - Better Than EDR- Know Who Is Doing What
22:53 - Stop Account Takeovers- Stealthily
27:55 - Predictions &amp; GPT Use Case
33:16 - One Step Better…
Links:
Connect with our guest :
https://www.linkedin.com/in/or-eshed/
Check out Layer X:
https://layerxsecurity.com/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2156</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>312</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cyber Defense Reinvented: The New Era of Attack Surface Management with Isaac Clayton</title>
        <itunes:title>Cyber Defense Reinvented: The New Era of Attack Surface Management with Isaac Clayton</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cyber-defense-reinvented-the-new-era-of-attack-surface-management/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cyber-defense-reinvented-the-new-era-of-attack-surface-management/#comments</comments>        <pubDate>Tue, 16 Jan 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7bfbe986-ba92-3e9f-93fd-df23a3cf5db0</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings talks with guest Isaac Clayton, Senior Research Engineer at NetSPI. Ron and Isaac discuss the importance of ASM for organizations of all sizes, the challenges of asset identification, and framing a practical strategy to handle ASM.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>03:00 - Introducing guest, Isaac Clayton</p>
<p>04:25 - Understanding ASM</p>
<p>07:57 - Factoring in Attackers</p>
<p>10:47 - “Admit it’s a hard problem”</p>
<p>12:35 - Challenges &amp; Surprises</p>
<p>15:03 - From our Sponsor, NetSPI</p>
<p>15:41 - The Right Medicine, The Right Dosage</p>
<p>19:04 - Zero Trust is Not Enough</p>
<p>20:37 - Prioritization— Baked In!</p>
<p>21:33 - The ASM Learning Curve</p>
<p>26:12 - “Not all ASM is Created Equal”</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Isaac Clayton :</p>
<p><a href='https://www.linkedin.com/in/isaac-clayton-24088696/'>https://www.linkedin.com/in/isaac-clayton-24088696/</a></p>
<p>Check out NetSPI:</p>
<p><a href='http://asm.netspi.com'>asm.netspi.com</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings talks with guest Isaac Clayton, Senior Research Engineer at NetSPI. Ron and Isaac discuss the importance of ASM for organizations of all sizes, the challenges of asset identification, and framing a practical strategy to handle ASM.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>03:00 - Introducing guest, Isaac Clayton</p>
<p>04:25 - Understanding ASM</p>
<p>07:57 - Factoring in Attackers</p>
<p>10:47 - “Admit it’s a hard problem”</p>
<p>12:35 - Challenges &amp; Surprises</p>
<p>15:03 - From our Sponsor, NetSPI</p>
<p>15:41 - The Right Medicine, The Right Dosage</p>
<p>19:04 - Zero Trust is Not Enough</p>
<p>20:37 - Prioritization— Baked In!</p>
<p>21:33 - The ASM Learning Curve</p>
<p>26:12 - “Not all ASM is Created Equal”</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Isaac Clayton :</p>
<p><a href='https://www.linkedin.com/in/isaac-clayton-24088696/'>https://www.linkedin.com/in/isaac-clayton-24088696/</a></p>
<p>Check out NetSPI:</p>
<p><a href='http://asm.netspi.com'>asm.netspi.com</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ixnkx2/NetSPI_2_FINAL.mp3" length="31482402" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings talks with guest Isaac Clayton, Senior Research Engineer at NetSPI. Ron and Isaac discuss the importance of ASM for organizations of all sizes, the challenges of asset identification, and framing a practical strategy to handle ASM.
 
Impactful Moments:
00:00 - Welcome
03:00 - Introducing guest, Isaac Clayton
04:25 - Understanding ASM
07:57 - Factoring in Attackers
10:47 - “Admit it’s a hard problem”
12:35 - Challenges &amp; Surprises
15:03 - From our Sponsor, NetSPI
15:41 - The Right Medicine, The Right Dosage
19:04 - Zero Trust is Not Enough
20:37 - Prioritization— Baked In!
21:33 - The ASM Learning Curve
26:12 - “Not all ASM is Created Equal”
 
Links:
Connect with our guest, Isaac Clayton :
https://www.linkedin.com/in/isaac-clayton-24088696/
Check out NetSPI:
asm.netspi.com
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1967</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>311</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cyber Resilience Unpacked: Securing Tomorrow Today with Bill Bernard</title>
        <itunes:title>Cyber Resilience Unpacked: Securing Tomorrow Today with Bill Bernard</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cyber-resilience-unpacked-securing-tomorrow-today-with-bill-bernard/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cyber-resilience-unpacked-securing-tomorrow-today-with-bill-bernard/#comments</comments>        <pubDate>Tue, 09 Jan 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/716c2936-1254-3672-96df-24214f2b5218</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings dives deep into crafting a resilient cybersecurity approach with guest speaker Bill Bernard, VP of Security Strategy at Deepwatch. Bill discusses the necessity of understanding business objectives to protect valuable assets but emphasizes focusing on risk-based strategies in addition to stronger detection and response mechanisms to help you play the long game.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>01:43 - Introducing guest, Bill Bernard</p>
<p>04:22 - Understanding Emerging Threats</p>
<p>06:19 - What’s Old is New Again</p>
<p>08:48 - Buy a Helmet, Not a Bodysuit</p>
<p>11:57 - Defining Cyber Resilience</p>
<p>15:30 - Deepwatch’s Strategy for Resilience</p>
<p>18:31 - From our Sponsor</p>
<p>20:03 - MDR and Effective MDR Engagements</p>
<p>27:18 - Where Does AI Fit In With MDR?</p>
<p>32:57 - Staying One Step More Resilient</p>
<p>35:05 - Deepwatch- The Right Fit for You</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Bill Bernard :</p>
<p><a href='https://www.linkedin.com/in/billbernardchicago/'>https://www.linkedin.com/in/billbernardchicago/</a></p>
<p>Take a Tour of the Deepwatch Managed Security Platform<a href='https://www.deepwatch.com/deepwatch-platform/#platform-tour'> https://www.deepwatch.com/deepwatch-platform/#platform-tour</a></p>
<p>Read the Move Beyond Detection and Response to Accelerate Cyber Resilience white paper, here:<a href='https://www.deepwatch.com/resource/go-beyond-cybersecurity-become-cyber-resilient/'> https://www.deepwatch.com/resource/go-beyond-cybersecurity-become-cyber-resilient/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a>...</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings dives deep into crafting a resilient cybersecurity approach with guest speaker Bill Bernard, VP of Security Strategy at Deepwatch. Bill discusses the necessity of understanding business objectives to protect valuable assets but emphasizes focusing on risk-based strategies in addition to stronger detection and response mechanisms to help you play the long game.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>01:43 - Introducing guest, Bill Bernard</p>
<p>04:22 - Understanding Emerging Threats</p>
<p>06:19 - What’s Old is New Again</p>
<p>08:48 - Buy a Helmet, Not a Bodysuit</p>
<p>11:57 - Defining Cyber Resilience</p>
<p>15:30 - Deepwatch’s Strategy for Resilience</p>
<p>18:31 - From our Sponsor</p>
<p>20:03 - MDR and Effective MDR Engagements</p>
<p>27:18 - Where Does AI Fit In With MDR?</p>
<p>32:57 - Staying One Step More Resilient</p>
<p>35:05 - Deepwatch- The Right Fit for You</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest, Bill Bernard :</p>
<p><a href='https://www.linkedin.com/in/billbernardchicago/'>https://www.linkedin.com/in/billbernardchicago/</a></p>
<p>Take a Tour of the Deepwatch Managed Security Platform<a href='https://www.deepwatch.com/deepwatch-platform/#platform-tour'> https://www.deepwatch.com/deepwatch-platform/#platform-tour</a></p>
<p>Read the Move Beyond Detection and Response to Accelerate Cyber Resilience white paper, here:<a href='https://www.deepwatch.com/resource/go-beyond-cybersecurity-become-cyber-resilient/'> https://www.deepwatch.com/resource/go-beyond-cybersecurity-become-cyber-resilient/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a>...</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ia5unk/Deepwatch_-_Cyber_Resilience_Unpacked-_Securing_Tomorrow_Todaya2to1.mp3" length="36469909" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings dives deep into crafting a resilient cybersecurity approach with guest speaker Bill Bernard, VP of Security Strategy at Deepwatch. Bill discusses the necessity of understanding business objectives to protect valuable assets but emphasizes focusing on risk-based strategies in addition to stronger detection and response mechanisms to help you play the long game.
 
Impactful Moments
00:00 - Welcome
01:43 - Introducing guest, Bill Bernard
04:22 - Understanding Emerging Threats
06:19 - What’s Old is New Again
08:48 - Buy a Helmet, Not a Bodysuit
11:57 - Defining Cyber Resilience
15:30 - Deepwatch’s Strategy for Resilience
18:31 - From our Sponsor
20:03 - MDR and Effective MDR Engagements
27:18 - Where Does AI Fit In With MDR?
32:57 - Staying One Step More Resilient
35:05 - Deepwatch- The Right Fit for You
 
Links:
Connect with our guest, Bill Bernard :
https://www.linkedin.com/in/billbernardchicago/
Take a Tour of the Deepwatch Managed Security Platform https://www.deepwatch.com/deepwatch-platform/#platform-tour
Read the Move Beyond Detection and Response to Accelerate Cyber Resilience white paper, here: https://www.deepwatch.com/resource/go-beyond-cybersecurity-become-cyber-resilient/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleys...
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2279</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>310</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Looking Backward to GROW Forward in Cybersecurity in 2024</title>
        <itunes:title>Looking Backward to GROW Forward in Cybersecurity in 2024</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/looking-backward-to-grow-forward-in-cybersecurity-in-2024/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/looking-backward-to-grow-forward-in-cybersecurity-in-2024/#comments</comments>        <pubDate>Tue, 02 Jan 2024 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7aae7d29-77cf-3893-91cb-a9e2e5939efe</guid>
                                    <description><![CDATA[<p>In this episode, we’ll take a walk down memory lane. Hacker Valley looks back to 2023 to bring you some of the best clips with great advice and insight into being more creative, reflective, and resourceful with the hopes of inspiring you in 2024 to grow beyond where you are today.</p>
<p>
Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:54 - A New Year is on the Way!</p>
<p>01:54 - ChatGPT and Cybersecurity</p>
<p>04:40 - Becoming an Industry Creative</p>
<p>07:47 - Leveraging AI in the Future with Storytelling - with Scott Sunderland</p>
<p>09:12 - Advice for your Content Creation Journey - with Jason Rebholz</p>
<p>11:15 - How to Start your Cybersecurity Book - with Kim Crawley</p>
<p>14:13 - Join our Mastermind</p>
<p>14:50 - The Right Platform for You - with Phillip Wylie</p>
<p>17:08 - Finding your Focus - with Simone Biles &amp; Amy Bream</p>
<p>20:41 - Leveraging Human Resources in Cyber</p>
<p> </p>
<p>Links:</p>
<p>Check out the episodes highlighted:</p>
<p>ChatGPT &amp; Industry Creative-<a href='https://www.youtube.com/watch?v=-u6m0SXFTmA'>https://www.youtube.com/watch?v=-u6m0SXFTmA</a></p>
<p>Scott Sunderland-<a href='https://www.youtube.com/watch?v=5pwTruINFiM'>https://www.youtube.com/watch?v=5pwTruINFiM</a></p>
<p>Jason Rebholz-<a href='https://www.youtube.com/watch?v=Ao81IRnffc8'>https://www.youtube.com/watch?v=Ao81IRnffc8</a></p>
<p>Kim Crawley-<a href='https://www.youtube.com/watch?v=rKny7kVeRM0'>https://www.youtube.com/watch?v=rKny7kVeRM0</a></p>
<p>Phillip Wylie-<a href='https://www.youtube.com/watch?v=z5B1E2vp0DY'>https://www.youtube.com/watch?v=z5B1E2vp0DY</a></p>
<p>Simone Biles &amp; Amy Bream-<a href='https://www.youtube.com/watch?v=DiebZS9s7sg'>https://www.youtube.com/watch?v=DiebZS9s7sg</a></p>
<p>Cyber Resources-<a href='https://www.youtube.com/watch?v=UoTk3w_78co'>https://www.youtube.com/watch?v=UoTk3w_78co</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a>...</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we’ll take a walk down memory lane. Hacker Valley looks back to 2023 to bring you some of the best clips with great advice and insight into being more creative, reflective, and resourceful with the hopes of inspiring you in 2024 to grow beyond where you are today.</p>
<p><br>
Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:54 - A New Year is on the Way!</p>
<p>01:54 - ChatGPT and Cybersecurity</p>
<p>04:40 - Becoming an Industry Creative</p>
<p>07:47 - Leveraging AI in the Future with Storytelling - with Scott Sunderland</p>
<p>09:12 - Advice for your Content Creation Journey - with Jason Rebholz</p>
<p>11:15 - How to Start your Cybersecurity Book - with Kim Crawley</p>
<p>14:13 - Join our Mastermind</p>
<p>14:50 - The Right Platform for You - with Phillip Wylie</p>
<p>17:08 - Finding your Focus - with Simone Biles &amp; Amy Bream</p>
<p>20:41 - Leveraging Human Resources in Cyber</p>
<p> </p>
<p>Links:</p>
<p>Check out the episodes highlighted:</p>
<p>ChatGPT &amp; Industry Creative-<a href='https://www.youtube.com/watch?v=-u6m0SXFTmA'>https://www.youtube.com/watch?v=-u6m0SXFTmA</a></p>
<p>Scott Sunderland-<a href='https://www.youtube.com/watch?v=5pwTruINFiM'>https://www.youtube.com/watch?v=5pwTruINFiM</a></p>
<p>Jason Rebholz-<a href='https://www.youtube.com/watch?v=Ao81IRnffc8'>https://www.youtube.com/watch?v=Ao81IRnffc8</a></p>
<p>Kim Crawley-<a href='https://www.youtube.com/watch?v=rKny7kVeRM0'>https://www.youtube.com/watch?v=rKny7kVeRM0</a></p>
<p>Phillip Wylie-<a href='https://www.youtube.com/watch?v=z5B1E2vp0DY'>https://www.youtube.com/watch?v=z5B1E2vp0DY</a></p>
<p>Simone Biles &amp; Amy Bream-<a href='https://www.youtube.com/watch?v=DiebZS9s7sg'>https://www.youtube.com/watch?v=DiebZS9s7sg</a></p>
<p>Cyber Resources-<a href='https://www.youtube.com/watch?v=UoTk3w_78co'>https://www.youtube.com/watch?v=UoTk3w_78co</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a>...</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/an6nae/Looking_Back_to_Grow_Forward_in_Cybersecurity_in_20249l3pk.mp3" length="22655940" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we’ll take a walk down memory lane. Hacker Valley looks back to 2023 to bring you some of the best clips with great advice and insight into being more creative, reflective, and resourceful with the hopes of inspiring you in 2024 to grow beyond where you are today.
Impactful Moments
00:00 - Welcome
00:54 - A New Year is on the Way!
01:54 - ChatGPT and Cybersecurity
04:40 - Becoming an Industry Creative
07:47 - Leveraging AI in the Future with Storytelling - with Scott Sunderland
09:12 - Advice for your Content Creation Journey - with Jason Rebholz
11:15 - How to Start your Cybersecurity Book - with Kim Crawley
14:13 - Join our Mastermind
14:50 - The Right Platform for You - with Phillip Wylie
17:08 - Finding your Focus - with Simone Biles &amp; Amy Bream
20:41 - Leveraging Human Resources in Cyber
 
Links:
Check out the episodes highlighted:
ChatGPT &amp; Industry Creative-https://www.youtube.com/watch?v=-u6m0SXFTmA
Scott Sunderland-https://www.youtube.com/watch?v=5pwTruINFiM
Jason Rebholz-https://www.youtube.com/watch?v=Ao81IRnffc8
Kim Crawley-https://www.youtube.com/watch?v=rKny7kVeRM0
Phillip Wylie-https://www.youtube.com/watch?v=z5B1E2vp0DY
Simone Biles &amp; Amy Bream-https://www.youtube.com/watch?v=DiebZS9s7sg
Cyber Resources-https://www.youtube.com/watch?v=UoTk3w_78co
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleys...
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1415</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>309</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What’s Lurking In Your Containers? AMBERSQUID Operations, Freejacking, and Microservice Exploitation</title>
        <itunes:title>What’s Lurking In Your Containers? AMBERSQUID Operations, Freejacking, and Microservice Exploitation</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-s-lurking-in-your-containers-ambersquid-operations-freejacking-and-microservice-exploitation/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-s-lurking-in-your-containers-ambersquid-operations-freejacking-and-microservice-exploitation/#comments</comments>        <pubDate>Tue, 19 Dec 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c48c8e3c-4ab8-3955-afbb-16ceb8144edc</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings, discusses new tactics of adversaries with Director of Threat Research at Sysdig, Michael Clark. Michael digs into the cloud and shares trends about the AMBERSQUID operation and how to protect yourself from potential container-based threats.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guest Michael Clark</p>
<p>03:09 - Finding AMBERSQUID</p>
<p>06:46 - Mining and Monitoring AWS Services</p>
<p>10:47 - Defending Against AMBERSQUID</p>
<p>14:03 - The Speed of Container-Based Threats</p>
<p>18:13 - The Costs of Freejacking</p>
<p>23:08 - Attribution &amp; The Future Threat</p>
<p>26:30 - CIEMs Like You Have Secrets</p>
<p> </p>
<p>Links:</p>
<p>Connect with Michael Clark:</p>
<p>https://www.linkedin.com/in/michaelclarkinpa/</p>
<p>Check out Sysdig’s Threat Research: https://sysdig.com/threat-research/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings, discusses new tactics of adversaries with Director of Threat Research at Sysdig, Michael Clark. Michael digs into the cloud and shares trends about the AMBERSQUID operation and how to protect yourself from potential container-based threats.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>01:20 - Introducing guest Michael Clark</p>
<p>03:09 - Finding AMBERSQUID</p>
<p>06:46 - Mining and Monitoring AWS Services</p>
<p>10:47 - Defending Against AMBERSQUID</p>
<p>14:03 - The Speed of Container-Based Threats</p>
<p>18:13 - The Costs of Freejacking</p>
<p>23:08 - Attribution &amp; The Future Threat</p>
<p>26:30 - CIEMs Like You Have Secrets</p>
<p> </p>
<p>Links:</p>
<p>Connect with Michael Clark:</p>
<p>https://www.linkedin.com/in/michaelclarkinpa/</p>
<p>Check out Sysdig’s Threat Research: https://sysdig.com/threat-research/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8fp29i/What_s_Lurking_In_Your_Containers_AMBERSQUID_Operations_Freejacking_and_Microservice_Exploitation_with_Michael_Clark8a7yw.mp3" length="22265984" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings, discusses new tactics of adversaries with Director of Threat Research at Sysdig, Michael Clark. Michael digs into the cloud and shares trends about the AMBERSQUID operation and how to protect yourself from potential container-based threats.
 
Impactful Moments
00:00 - Welcome
01:20 - Introducing guest Michael Clark
03:09 - Finding AMBERSQUID
06:46 - Mining and Monitoring AWS Services
10:47 - Defending Against AMBERSQUID
14:03 - The Speed of Container-Based Threats
18:13 - The Costs of Freejacking
23:08 - Attribution &amp; The Future Threat
26:30 - CIEMs Like You Have Secrets
 
Links:
Connect with Michael Clark:
https://www.linkedin.com/in/michaelclarkinpa/
Check out Sysdig’s Threat Research: https://sysdig.com/threat-research/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1391</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>308</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Pivotal Policy in the Age of AI with AJ Grotto</title>
        <itunes:title>Pivotal Policy in the Age of AI with AJ Grotto</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/pivotal-policy-in-the-age-of-ai-with-aj-grotto/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/pivotal-policy-in-the-age-of-ai-with-aj-grotto/#comments</comments>        <pubDate>Tue, 12 Dec 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/07b191c6-5eb9-3057-ae94-76e847311047</guid>
                                    <description><![CDATA[<p>In this episode, Host Chris Cochran chats it up with former White House Senior Director for Cyber Policy, AJ Grotto. AJ shares his viewpoints about the current state of AI policies, the potential risks and benefits of AI technology, and the challenges in crafting effective policies in the field of cybersecurity.

</p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:45 - Introducing guest, AJ Grotto</p>
<p>01:14 - Are Cyber and AI Separate?</p>
<p>03:37 - US Cyber Policy</p>
<p>08:06 - The Reality of AI Risk</p>
<p>11:20 - From Law to Cyber Policy</p>
<p>14:47 - Join our Mastermind!</p>
<p>15:36 - Policy Implementations</p>
<p>18:55 - Cyber Warfare and AI</p>
<p>22:13 - Advice for Getting into Cyber Policy</p>
<p> </p>
<p>Links:</p>
<p>Connect with AJ:</p>
<p><a href='https://www.linkedin.com/in/andrew-grotto-2534b510a/'>https://www.linkedin.com/in/andrew-grotto-2534b510a/</a></p>
<p>More about AJ and his current work:</p>
<p><a href='https://fsi.stanford.edu/people/andrew-j-grotto'>https://fsi.stanford.edu/people/andrew-j-grotto</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a>...</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Chris Cochran chats it up with former White House Senior Director for Cyber Policy, AJ Grotto. AJ shares his viewpoints about the current state of AI policies, the potential risks and benefits of AI technology, and the challenges in crafting effective policies in the field of cybersecurity.<br>
<br>
</p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:45 - Introducing guest, AJ Grotto</p>
<p>01:14 - Are Cyber and AI Separate?</p>
<p>03:37 - US Cyber Policy</p>
<p>08:06 - The Reality of AI Risk</p>
<p>11:20 - From Law to Cyber Policy</p>
<p>14:47 - Join our Mastermind!</p>
<p>15:36 - Policy Implementations</p>
<p>18:55 - Cyber Warfare and AI</p>
<p>22:13 - Advice for Getting into Cyber Policy</p>
<p> </p>
<p>Links:</p>
<p>Connect with AJ:</p>
<p><a href='https://www.linkedin.com/in/andrew-grotto-2534b510a/'>https://www.linkedin.com/in/andrew-grotto-2534b510a/</a></p>
<p>More about AJ and his current work:</p>
<p><a href='https://fsi.stanford.edu/people/andrew-j-grotto'>https://fsi.stanford.edu/people/andrew-j-grotto</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a>...</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/njzuta/AJ_Grotto-_FINAL_fixed_audio_7dd94.mp3" length="23124054" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Chris Cochran chats it up with former White House Senior Director for Cyber Policy, AJ Grotto. AJ shares his viewpoints about the current state of AI policies, the potential risks and benefits of AI technology, and the challenges in crafting effective policies in the field of cybersecurity.
Impactful Moments
00:00 - Welcome
00:45 - Introducing guest, AJ Grotto
01:14 - Are Cyber and AI Separate?
03:37 - US Cyber Policy
08:06 - The Reality of AI Risk
11:20 - From Law to Cyber Policy
14:47 - Join our Mastermind!
15:36 - Policy Implementations
18:55 - Cyber Warfare and AI
22:13 - Advice for Getting into Cyber Policy
 
Links:
Connect with AJ:
https://www.linkedin.com/in/andrew-grotto-2534b510a/
More about AJ and his current work:
https://fsi.stanford.edu/people/andrew-j-grotto
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleys...
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1445</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>307</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Ransomware: How to Use AI to Create a Readiness Kit with Scott Sutherland</title>
        <itunes:title>Ransomware: How to Use AI to Create a Readiness Kit with Scott Sutherland</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ransomware-how-to-use-ai-to-create-a-readiness-kit-with-scot-sutherland/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ransomware-how-to-use-ai-to-create-a-readiness-kit-with-scot-sutherland/#comments</comments>        <pubDate>Tue, 05 Dec 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7538ed68-9030-3c1e-9b6e-7bd82c46f3f9</guid>
                                    <description><![CDATA[<p>The adversary is using Artificial Intelligence. Why aren’t you?</p>
<p>In this episode, Host Chris Cochran talks with Scott Sutherland, VP of Research at NetSPI, about everyone’s favorite hot topics; ransomware and AI. Scott will detail his experience with simulating ransomware attack scenarios, as well as discussing the difficulties businesses face when dealing with ransomware threats and prevention mechanisms and how AI can be leveraged to help.</p>
<p>Impactful Moments
00:00 - Welcome
01:10 - Introducing guest, Scott Sunderland
03:24 - Interactions with Generative AI Chatbots
04:14 - Use of AI and Readiness
15:16 - A word from our Sponsor, NetSPI
15:55 - Using AI to develop Exercises
20:46 - Collaboration beats Adversaries
25:08 - Ransomware Bots
26:15 - Role of AI in Storytelling</p>
<p>Continuously keep pace with your expanding attack surface with the most comprehensive suite of offensive security solutions: <a href='https://www.netspi.com/hackervalley'>https://www.netspi.com/hackervalley</a>

</p>
<p>Links:
Connect with Scott Sutherland:
<a href='https://www.linkedin.com/in/scottpsutherland/'>https://www.linkedin.com/in/scottpsutherland/</a>
Learn more about our sponsor, NetSPI:
https://www.netspi.com/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The adversary is using Artificial Intelligence. Why aren’t you?</p>
<p>In this episode, Host Chris Cochran talks with Scott Sutherland, VP of Research at NetSPI, about everyone’s favorite hot topics; ransomware and AI. Scott will detail his experience with simulating ransomware attack scenarios, as well as discussing the difficulties businesses face when dealing with ransomware threats and prevention mechanisms and how AI can be leveraged to help.</p>
<p>Impactful Moments<br>
00:00 - Welcome<br>
01:10 - Introducing guest, Scott Sunderland<br>
03:24 - Interactions with Generative AI Chatbots<br>
04:14 - Use of AI and Readiness<br>
15:16 - A word from our Sponsor, NetSPI<br>
15:55 - Using AI to develop Exercises<br>
20:46 - Collaboration beats Adversaries<br>
25:08 - Ransomware Bots<br>
26:15 - Role of AI in Storytelling</p>
<p>Continuously keep pace with your expanding attack surface with the most comprehensive suite of offensive security solutions: <a href='https://www.netspi.com/hackervalley'>https://www.netspi.com/hackervalley</a><br>
<br>
</p>
<p>Links:<br>
Connect with Scott Sutherland:<br>
<a href='https://www.linkedin.com/in/scottpsutherland/'>https://www.linkedin.com/in/scottpsutherland/</a><br>
Learn more about our sponsor, NetSPI:<br>
https://www.netspi.com/<br>
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xijpdr/Ransomware_Readiness_Kitbci56.mp3" length="27459544" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The adversary is using Artificial Intelligence. Why aren’t you?
In this episode, Host Chris Cochran talks with Scott Sutherland, VP of Research at NetSPI, about everyone’s favorite hot topics; ransomware and AI. Scott will detail his experience with simulating ransomware attack scenarios, as well as discussing the difficulties businesses face when dealing with ransomware threats and prevention mechanisms and how AI can be leveraged to help.
Impactful Moments00:00 - Welcome01:10 - Introducing guest, Scott Sunderland03:24 - Interactions with Generative AI Chatbots04:14 - Use of AI and Readiness15:16 - A word from our Sponsor, NetSPI15:55 - Using AI to develop Exercises20:46 - Collaboration beats Adversaries25:08 - Ransomware Bots26:15 - Role of AI in Storytelling
Continuously keep pace with your expanding attack surface with the most comprehensive suite of offensive security solutions: https://www.netspi.com/hackervalley
Links:Connect with Scott Sutherland:https://www.linkedin.com/in/scottpsutherland/Learn more about our sponsor, NetSPI:https://www.netspi.com/Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudioBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1712</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>306</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cover Your SaaS: Navigating OAuth and SaaS Security Challenges</title>
        <itunes:title>Cover Your SaaS: Navigating OAuth and SaaS Security Challenges</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cover-your-saas-navigating-oauth-and-saas-security-challenges/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cover-your-saas-navigating-oauth-and-saas-security-challenges/#comments</comments>        <pubDate>Tue, 28 Nov 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9fd0f146-06d5-344f-a11d-e06043cf0eef</guid>
                                    <description><![CDATA[<p>SaaS misconfigurations may be responsible for up to 63% of security incidents.</p>
<p>Do your SaaS applications have risky OAuth grants and misconfigurations? Let’s not find out.</p>
<p>We will unravel the complexities of OAuth and how attackers are using OAuth to move from one app to another. Our special guest Jaime Blasco, co-founder and CTO at Nudge Security, shares techniques to protect your SaaS apps and identify risky and malicious OAuth grants.</p>
<p>Are you ready to cover your SaaS and avoid finding yourself in the hot seat? </p>
<p> </p>
<p>Show some love to our sponsor Nudge Security and win a Steam Deck: https://www.nudgesecurity.com/steamdeck</p>
<p> </p>
<p>Links:</p>
<p>Connect with Jamie Blasco:</p>
<p>https://www.linkedin.com/in/jaimeblasco/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>SaaS misconfigurations may be responsible for up to 63% of security incidents.</p>
<p>Do your SaaS applications have risky OAuth grants and misconfigurations? Let’s not find out.</p>
<p>We will unravel the complexities of OAuth and how attackers are using OAuth to move from one app to another. Our special guest Jaime Blasco, co-founder and CTO at Nudge Security, shares techniques to protect your SaaS apps and identify risky and malicious OAuth grants.</p>
<p>Are you ready to cover your SaaS and avoid finding yourself in the hot seat? </p>
<p> </p>
<p>Show some love to our sponsor Nudge Security and win a Steam Deck: https://www.nudgesecurity.com/steamdeck</p>
<p> </p>
<p>Links:</p>
<p>Connect with Jamie Blasco:</p>
<p>https://www.linkedin.com/in/jaimeblasco/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nip7pz/Cover_Your_SaaS-_Navigating_OAuth_and_SaaS_Security_Challenges83ihd.mp3" length="64986934" type="audio/mpeg"/>
        <itunes:summary><![CDATA[SaaS misconfigurations may be responsible for up to 63% of security incidents.
Do your SaaS applications have risky OAuth grants and misconfigurations? Let’s not find out.
We will unravel the complexities of OAuth and how attackers are using OAuth to move from one app to another. Our special guest Jaime Blasco, co-founder and CTO at Nudge Security, shares techniques to protect your SaaS apps and identify risky and malicious OAuth grants.
Are you ready to cover your SaaS and avoid finding yourself in the hot seat? 
 
Show some love to our sponsor Nudge Security and win a Steam Deck: https://www.nudgesecurity.com/steamdeck
 
Links:
Connect with Jamie Blasco:
https://www.linkedin.com/in/jaimeblasco/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2702</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>305</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Standing Out On LinkedIn as a Cybersecurity Professional with Chris Hughes</title>
        <itunes:title>Standing Out On LinkedIn as a Cybersecurity Professional with Chris Hughes</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/standing-out-on-linkedin-as-a-cybersecurity-professional-with-chris-hughes/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/standing-out-on-linkedin-as-a-cybersecurity-professional-with-chris-hughes/#comments</comments>        <pubDate>Tue, 21 Nov 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/791df754-9e51-3d71-bf5f-d66a040ef598</guid>
                                    <description><![CDATA[<p>In this episode, host Ron Eddings speaks with Chris Hughes, President at Aquia, Cyber Innovation Fellow at CISA, and cybersecurity legend. Special guest, Chris Hughes, was initially inspired to build a personal brand through a desire to mend his weaknesses and highlight his strengths. However, LinkedIn offered a platform to display his growth and learning, leading to him amassing over 50,000 followers! In addition to sharing his story, Chris will emphasize tips on how to start your own personal brand.</p>
<p> </p>
<p>Key Moments:</p>
<p>00:00 -Welcome 00:56 - Introducing Guest, Chris Hughes 
01:59 - Finding His Way to Cyber 
03:20 - Brand Building on LinkedIn 
05:19 - Power of Networking and Personal Branding 
11:32 - Be a Part of Cyber Creator Con! 
14:31 - The Impact of LinkedIn on Career Opportunities 
16:48 - The Art of Content Creation on LinkedIn 
20:16 - Cashing in on Career Capital 
22:05 - Advice for Building a Personal Brand</p>
<p> </p>
<p>Links: 
Follow Chris on LinkedIn: 
<a href='https://www.linkedin.com/in/resilientcyber/'>https://www.linkedin.com/in/resilientcyber/ </a>
Check out Chris’ Podcast: 
<a href='https://resilientcyber.substack.com/'>https://resilientcyber.substack.com/ </a>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/ </a>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Ron Eddings speaks with Chris Hughes, President at Aquia, Cyber Innovation Fellow at CISA, and cybersecurity legend. Special guest, Chris Hughes, was initially inspired to build a personal brand through a desire to mend his weaknesses and highlight his strengths. However, LinkedIn offered a platform to display his growth and learning, leading to him amassing over 50,000 followers! In addition to sharing his story, Chris will emphasize tips on how to start your own personal brand.</p>
<p> </p>
<p>Key Moments:</p>
<p>00:00 -Welcome 00:56 - Introducing Guest, Chris Hughes <br>
01:59 - Finding His Way to Cyber <br>
03:20 - Brand Building on LinkedIn <br>
05:19 - Power of Networking and Personal Branding <br>
11:32 - Be a Part of Cyber Creator Con! <br>
14:31 - The Impact of LinkedIn on Career Opportunities <br>
16:48 - The Art of Content Creation on LinkedIn <br>
20:16 - Cashing in on Career Capital <br>
22:05 - Advice for Building a Personal Brand</p>
<p> </p>
<p>Links: <br>
Follow Chris on LinkedIn: <br>
<a href='https://www.linkedin.com/in/resilientcyber/'>https://www.linkedin.com/in/resilientcyber/ </a><br>
Check out Chris’ Podcast: <br>
<a href='https://resilientcyber.substack.com/'>https://resilientcyber.substack.com/ </a><br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/ </a><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9d7xei/Chris_Hughes.mp3" length="22687287" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Ron Eddings speaks with Chris Hughes, President at Aquia, Cyber Innovation Fellow at CISA, and cybersecurity legend. Special guest, Chris Hughes, was initially inspired to build a personal brand through a desire to mend his weaknesses and highlight his strengths. However, LinkedIn offered a platform to display his growth and learning, leading to him amassing over 50,000 followers! In addition to sharing his story, Chris will emphasize tips on how to start your own personal brand.
 
Key Moments:
00:00 -Welcome 00:56 - Introducing Guest, Chris Hughes 01:59 - Finding His Way to Cyber 03:20 - Brand Building on LinkedIn 05:19 - Power of Networking and Personal Branding 11:32 - Be a Part of Cyber Creator Con! 14:31 - The Impact of LinkedIn on Career Opportunities 16:48 - The Art of Content Creation on LinkedIn 20:16 - Cashing in on Career Capital 22:05 - Advice for Building a Personal Brand
 
Links: Follow Chris on LinkedIn: https://www.linkedin.com/in/resilientcyber/ Check out Chris’ Podcast: https://resilientcyber.substack.com/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1417</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>304</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Adversarial AI: Navigating the Cybersecurity Landscape</title>
        <itunes:title>Adversarial AI: Navigating the Cybersecurity Landscape</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/adversarial-ai-navigating-the-cybersecurity-landscape/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/adversarial-ai-navigating-the-cybersecurity-landscape/#comments</comments>        <pubDate>Tue, 07 Nov 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9725305f-c459-34be-98eb-2aa18d8c2a32</guid>
                                    <description><![CDATA[<p>In this episode, host Ron Eddings is joined by Sr. Director of Red Team Operations at Coalfire, Pete Deros, to discuss the hottest topic around; adversarial AI. Ron and Pete discuss how AI is used and how the adversary is using AI so everyone can stay one step ahead of them as well.</p>
<p>Impactful Moments
00:00 - Welcome
</p>
<p>01:35 - Introducing Pete Deros</p>
<p>03:30 - More Easily Phished</p>
<p>05:09 - 11 Labs Video</p>
<p>06:42 - Is this AI or LLM?</p>
<p>9:18 - AI or LLMs: Who has the Speed?</p>
<p>10:36 - Fine Tuning LLMs</p>
<p>14:37 - WormGPT &amp; Hallucinations</p>
<p>17:01 - LLMs Changing Second to Second</p>
<p>18:38 - A Word From Our Sponsor</p>
<p>20:19 - ‘Write me Ransomware!'</p>
<p>23:24 - Working Around AI Roadblocks</p>
<p>28:00 - “Undetectable for A Human”</p>
<p>31:58 - Pete Can Help You Floss!</p>
<p>34:56 - OWASP Top 10 &amp; Resources</p>
<p>37:00 - Check out Coalfire</p>
<p> </p>
<p>Links:
Connect with our guest Pete Deros:
<a href='https://www.linkedin.com/in/pete-deros-94524b9a/'>https://www.linkedin.com/in/pete-deros-94524b9a/</a>
Coalfire’s Website:
<a href='https://www.coalfire.com/'>https://www.coalfire.com/</a>
Coalfire Securialities Report:
<a href='https://www.coalfire.com/insights/resources/reports/securealities-report-2023-compliance'>https://www.coalfire.com/insights/resources/reports/securealities-report-2023-compliance</a>
OWASP Top 10 LLM:
<a href='https://owasp.org/www-project-top-10-for-large-language-model-applications/'>https://owasp.org/www-project-top-10-for-large-language-model-applications/</a>
Join our creative mastermind and stand out as a cybersecurity professional:
<a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleystudio</a>
Become a sponsor of the show to amplify your brand:
<a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a>
Love Hacker Valley Studio? Pick up some swag:
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a>
Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Ron Eddings is joined by Sr. Director of Red Team Operations at Coalfire, Pete Deros, to discuss the hottest topic around; adversarial AI. Ron and Pete discuss how AI is used and how the adversary is using AI so everyone can stay one step ahead of them as well.</p>
<p>Impactful Moments<br>
00:00 - Welcome<br>
</p>
<p>01:35 - Introducing Pete Deros</p>
<p>03:30 - More Easily Phished</p>
<p>05:09 - 11 Labs Video</p>
<p>06:42 - Is this AI or LLM?</p>
<p>9:18 - AI or LLMs: Who has the Speed?</p>
<p>10:36 - Fine Tuning LLMs</p>
<p>14:37 - WormGPT &amp; Hallucinations</p>
<p>17:01 - LLMs Changing Second to Second</p>
<p>18:38 - A Word From Our Sponsor</p>
<p>20:19 - ‘Write me Ransomware!'</p>
<p>23:24 - Working Around AI Roadblocks</p>
<p>28:00 - “Undetectable for A Human”</p>
<p>31:58 - Pete Can Help You Floss!</p>
<p>34:56 - OWASP Top 10 &amp; Resources</p>
<p>37:00 - Check out Coalfire</p>
<p> </p>
<p>Links:<br>
Connect with our guest Pete Deros:<br>
<a href='https://www.linkedin.com/in/pete-deros-94524b9a/'>https://www.linkedin.com/in/pete-deros-94524b9a/</a><br>
Coalfire’s Website:<br>
<a href='https://www.coalfire.com/'>https://www.coalfire.com/</a><br>
Coalfire Securialities Report:<br>
<a href='https://www.coalfire.com/insights/resources/reports/securealities-report-2023-compliance'>https://www.coalfire.com/insights/resources/reports/securealities-report-2023-compliance</a><br>
OWASP Top 10 LLM:<br>
<a href='https://owasp.org/www-project-top-10-for-large-language-model-applications/'>https://owasp.org/www-project-top-10-for-large-language-model-applications/</a><br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
<a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleystudio</a><br>
Become a sponsor of the show to amplify your brand:<br>
<a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a><br>
Love Hacker Valley Studio? Pick up some swag:<br>
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a><br>
Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mhg7st/Coalfire_Livestream_FINAL75swc.mp3" length="57186893" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Ron Eddings is joined by Sr. Director of Red Team Operations at Coalfire, Pete Deros, to discuss the hottest topic around; adversarial AI. Ron and Pete discuss how AI is used and how the adversary is using AI so everyone can stay one step ahead of them as well.
Impactful Moments00:00 - Welcome
01:35 - Introducing Pete Deros
03:30 - More Easily Phished
05:09 - 11 Labs Video
06:42 - Is this AI or LLM?
9:18 - AI or LLMs: Who has the Speed?
10:36 - Fine Tuning LLMs
14:37 - WormGPT &amp; Hallucinations
17:01 - LLMs Changing Second to Second
18:38 - A Word From Our Sponsor
20:19 - ‘Write me Ransomware!'
23:24 - Working Around AI Roadblocks
28:00 - “Undetectable for A Human”
31:58 - Pete Can Help You Floss!
34:56 - OWASP Top 10 &amp; Resources
37:00 - Check out Coalfire
 
Links:Connect with our guest Pete Deros:https://www.linkedin.com/in/pete-deros-94524b9a/Coalfire’s Website:https://www.coalfire.com/Coalfire Securialities Report:https://www.coalfire.com/insights/resources/reports/securealities-report-2023-complianceOWASP Top 10 LLM:https://owasp.org/www-project-top-10-for-large-language-model-applications/Join our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioBecome a sponsor of the show to amplify your brand:https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag:https://store.hackervalley.comContinue the conversation by joining our Discord:
https://hackervalley.com/discord
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2377</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>303</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Protecting What You Can’t See with HD Moore</title>
        <itunes:title>Protecting What You Can’t See with HD Moore</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/protecting-what-you-can-t-see-with-hd-moore/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/protecting-what-you-can-t-see-with-hd-moore/#comments</comments>        <pubDate>Tue, 31 Oct 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/90822745-e81a-3208-ac9c-2709e6b808d1</guid>
                                    <description><![CDATA[<p>In this episode, host Ron Eddings is joined by Metasploit creator, co-founder and CEO of runZero, HD Moore. HD changed the world with Metasploit and he’s doing it again with runZero. Attack Surface Management can’t happen unless you have visibility into your home or company network and HD shares how he’s able to deliver that and so much more in his journey of creating runZero.</p>
<p>
Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:50 - Introducing guest, HD Moore</p>
<p>01:30 - Fixing the Root Cause</p>
<p>05:00 - runZero</p>
<p>10:54 - A New Kind of CAASM</p>
<p>12:00 - Uncover the Unknown</p>
<p>14:08 - runZero Raving</p>
<p>17:45 - “Trust me, you can scan OT”</p>
<p>20:10 - You Can Scan if You Want To</p>
<p>22:30 - Red to Blue Judo Skills</p>
<p>
Links:</p>
<p>Connect with our guest HD Moore:</p>
<p><a href='https://www.linkedin.com/in/hdmoore/'>https://www.linkedin.com/in/hdmoore/</a></p>
<p>Check out runZero:</p>
<p><a href='https://www.runzero.com/'>https://www.runzero.com/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a><a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbDdEalFqT0hzcmUyYmFTZEp4ZGFFTzdIT3VWUXxBQ3Jtc0tsTjMxSFhNXzNRTUxKLThqOXpLcEVFVUp4Q2FvWXhjUTR5cUhXR1N0eWpPLTkxNFA0bXpfMXZUd19pZlVzUWVZWjZFUmJicGlOM1VPR2cyYTBWbk4wS1VlN3JFUERxcEZpSGM1QlRVM052eDFkQUZ3VQ&amp;q=https%3A%2F%2Fwww.patreon.com%2Fhackervalleystudio.com&amp;v=Ao81IRnffc8'>...</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Ron Eddings is joined by Metasploit creator, co-founder and CEO of runZero, HD Moore. HD changed the world with Metasploit and he’s doing it again with runZero. Attack Surface Management can’t happen unless you have visibility into your home or company network and HD shares how he’s able to deliver that and so much more in his journey of creating runZero.</p>
<p><br>
Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:50 - Introducing guest, HD Moore</p>
<p>01:30 - Fixing the Root Cause</p>
<p>05:00 - runZero</p>
<p>10:54 - A New Kind of CAASM</p>
<p>12:00 - Uncover the Unknown</p>
<p>14:08 - runZero Raving</p>
<p>17:45 - “Trust me, you can scan OT”</p>
<p>20:10 - You Can Scan if You Want To</p>
<p>22:30 - Red to Blue Judo Skills</p>
<p><br>
Links:</p>
<p>Connect with our guest HD Moore:</p>
<p><a href='https://www.linkedin.com/in/hdmoore/'>https://www.linkedin.com/in/hdmoore/</a></p>
<p>Check out runZero:</p>
<p><a href='https://www.runzero.com/'>https://www.runzero.com/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleys'>https://www.patreon.com/hackervalleys</a><a href='https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbDdEalFqT0hzcmUyYmFTZEp4ZGFFTzdIT3VWUXxBQ3Jtc0tsTjMxSFhNXzNRTUxKLThqOXpLcEVFVUp4Q2FvWXhjUTR5cUhXR1N0eWpPLTkxNFA0bXpfMXZUd19pZlVzUWVZWjZFUmJicGlOM1VPR2cyYTBWbk4wS1VlN3JFUERxcEZpSGM1QlRVM052eDFkQUZ3VQ&amp;q=https%3A%2F%2Fwww.patreon.com%2Fhackervalleystudio.com&amp;v=Ao81IRnffc8'>...</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gq5n36/HD_Moore_Protecting_What_You_Can_t_See6l7yu.mp3" length="23203049" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Ron Eddings is joined by Metasploit creator, co-founder and CEO of runZero, HD Moore. HD changed the world with Metasploit and he’s doing it again with runZero. Attack Surface Management can’t happen unless you have visibility into your home or company network and HD shares how he’s able to deliver that and so much more in his journey of creating runZero.
Impactful Moments
00:00 - Welcome
00:50 - Introducing guest, HD Moore
01:30 - Fixing the Root Cause
05:00 - runZero
10:54 - A New Kind of CAASM
12:00 - Uncover the Unknown
14:08 - runZero Raving
17:45 - “Trust me, you can scan OT”
20:10 - You Can Scan if You Want To
22:30 - Red to Blue Judo Skills
Links:
Connect with our guest HD Moore:
https://www.linkedin.com/in/hdmoore/
Check out runZero:
https://www.runzero.com/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleys...
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1450</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>302</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Penetration Testing, Public Speaking, and Content Creation with Phillip Wylie</title>
        <itunes:title>Penetration Testing, Public Speaking, and Content Creation with Phillip Wylie</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/penetration-testing-public-speaking-and-content-creation-with-phillip-wylie/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/penetration-testing-public-speaking-and-content-creation-with-phillip-wylie/#comments</comments>        <pubDate>Tue, 24 Oct 2023 06:29:36 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/266ffa60-ccf9-3bba-9e07-b9c5774b3a4e</guid>
                                    <description><![CDATA[<p>In this episode, Ron Eddings is joined by Penetration Tester, Instructor, International Speaker, Best Selling Author, and Podcast Host, Phillip Wylie. Phillip shares how pen testing and the need to educate people helped motivate him to speak at conferences and become a central voice in the cyber community. But more than that, he explains how he’s helped so many people get started on a similar path.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Intro</p>
<p>00:50 - Introducing Phillip Wylie</p>
<p>02:10 - Penetration testing Started it All</p>
<p>05:10 - Pen testing is a Job?!</p>
<p>08:50 - The Conference Game</p>
<p>12:55 - Cheers to Toastmasters</p>
<p>14:23 - Content Creation &amp; Social Media Marketing</p>
<p>18:30 - Keeping it Simple</p>
<p>20:55 - Are you Smarter Than a 5th Grader?</p>
<p>25:30 - What’s next for Phillip?</p>
<p>26:35 - Getting into Creating</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Phillip Wylie:</p>
<p>https://www.linkedin.com/in/phillipwylie/</p>
<p>Phillip’s Book “The Pentester Blueprint”:</p>
<p>https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307/ref=asc_df_1119684307</p>
<p>Phillip’s Podcasts:</p>
<p>https://www.thehackermaker.com/phillip-wylie-show/</p>
<p>Check out our Previous Episode with Phillip:</p>
<p>https://www.axonius.com/plus/hacker-valley-on-the-road/on-the-road-at-bh-2022/phillip-wylie</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p>https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron Eddings is joined by Penetration Tester, Instructor, International Speaker, Best Selling Author, and Podcast Host, Phillip Wylie. Phillip shares how pen testing and the need to educate people helped motivate him to speak at conferences and become a central voice in the cyber community. But more than that, he explains how he’s helped so many people get started on a similar path.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Intro</p>
<p>00:50 - Introducing Phillip Wylie</p>
<p>02:10 - Penetration testing Started it All</p>
<p>05:10 - Pen testing is a Job?!</p>
<p>08:50 - The Conference Game</p>
<p>12:55 - Cheers to Toastmasters</p>
<p>14:23 - Content Creation &amp; Social Media Marketing</p>
<p>18:30 - Keeping it Simple</p>
<p>20:55 - Are you Smarter Than a 5th Grader?</p>
<p>25:30 - What’s next for Phillip?</p>
<p>26:35 - Getting into Creating</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Phillip Wylie:</p>
<p>https://www.linkedin.com/in/phillipwylie/</p>
<p>Phillip’s Book “The Pentester Blueprint”:</p>
<p>https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307/ref=asc_df_1119684307</p>
<p>Phillip’s Podcasts:</p>
<p>https://www.thehackermaker.com/phillip-wylie-show/</p>
<p>Check out our Previous Episode with Phillip:</p>
<p>https://www.axonius.com/plus/hacker-valley-on-the-road/on-the-road-at-bh-2022/phillip-wylie</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p>https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/djzxmn/Pentesting_Public_Speaking_and_Content_Creation_with_Phillip_Wylie80ox5.mp3" length="47528158" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings is joined by Penetration Tester, Instructor, International Speaker, Best Selling Author, and Podcast Host, Phillip Wylie. Phillip shares how pen testing and the need to educate people helped motivate him to speak at conferences and become a central voice in the cyber community. But more than that, he explains how he’s helped so many people get started on a similar path.
 
Impactful Moments:
00:00 - Intro
00:50 - Introducing Phillip Wylie
02:10 - Penetration testing Started it All
05:10 - Pen testing is a Job?!
08:50 - The Conference Game
12:55 - Cheers to Toastmasters
14:23 - Content Creation &amp; Social Media Marketing
18:30 - Keeping it Simple
20:55 - Are you Smarter Than a 5th Grader?
25:30 - What’s next for Phillip?
26:35 - Getting into Creating
 
Links:
Connect with our guest Phillip Wylie:
https://www.linkedin.com/in/phillipwylie/
Phillip’s Book “The Pentester Blueprint”:
https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307/ref=asc_df_1119684307
Phillip’s Podcasts:
https://www.thehackermaker.com/phillip-wylie-show/
Check out our Previous Episode with Phillip:
https://www.axonius.com/plus/hacker-valley-on-the-road/on-the-road-at-bh-2022/phillip-wylie
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1823</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>301</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Ruse and Deception: From Hollywood to Corporate Espionage with Robert Kerbeck</title>
        <itunes:title>Ruse and Deception: From Hollywood to Corporate Espionage with Robert Kerbeck</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ruse-and-deception-from-hollywood-to-corporate-espionage-with-robert-kerbeck/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ruse-and-deception-from-hollywood-to-corporate-espionage-with-robert-kerbeck/#comments</comments>        <pubDate>Tue, 17 Oct 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e45a683d-afec-37b9-82fd-2209fd459856</guid>
                                    <description><![CDATA[<p>In this episode, Host Ron Eddings interviews Robert Kerbeck, author of Ruse: Lying the American Dream from Hollywood to Wall Street. Robert shares how his professional acting skills helped his career in corporate spying and espionage.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:46 - Introducing guest, Robert Kerbeck</p>
<p>00:55 - …And That’s How I Became A Spy</p>
<p>03:00 - Creativity REELY Counts w/ Phishing</p>
<p>10:00 - Robert’s Phishing Training</p>
<p>14:22 - How Corporate Espionage Works</p>
<p>18:36 - “A Fraction of the Spying I Really Did”</p>
<p>20:52 - Hobnobbing with Hollywood</p>
<p>25:06 - Your Way out of a “Ruse” </p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Robert Kerbeck:</p>
<p>https://www.linkedin.com/in/robert-kerbeck-12aa7a11/</p>
<p>Read “Ruse: Lying the American Dream from Hollywood to Wall Street”:</p>
<p>https://www.amazon.com/Ruse-Lying-American-Hollywood-Street/dp/1586423169</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: </p>
<p>https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com/</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Host Ron Eddings interviews Robert Kerbeck, author of Ruse: Lying the American Dream from Hollywood to Wall Street. Robert shares how his professional acting skills helped his career in corporate spying and espionage.</p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:46 - Introducing guest, Robert Kerbeck</p>
<p>00:55 - …And That’s How I Became A Spy</p>
<p>03:00 - Creativity REELY Counts w/ Phishing</p>
<p>10:00 - Robert’s Phishing Training</p>
<p>14:22 - How Corporate Espionage Works</p>
<p>18:36 - “A Fraction of the Spying I Really Did”</p>
<p>20:52 - Hobnobbing with Hollywood</p>
<p>25:06 - Your Way out of a “Ruse” </p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Robert Kerbeck:</p>
<p>https://www.linkedin.com/in/robert-kerbeck-12aa7a11/</p>
<p>Read “Ruse: Lying the American Dream from Hollywood to Wall Street”:</p>
<p>https://www.amazon.com/Ruse-Lying-American-Hollywood-Street/dp/1586423169</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: </p>
<p>https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p>https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p>https://store.hackervalley.com/</p>
<p>Continue the conversation by joining our Discord:</p>
<p>https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vjc7sa/From_Hollywood_to_Corporate_Espionage_with_Robert_Kerbeck7g25a.mp3" length="49196872" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Host Ron Eddings interviews Robert Kerbeck, author of Ruse: Lying the American Dream from Hollywood to Wall Street. Robert shares how his professional acting skills helped his career in corporate spying and espionage.
 
Impactful Moments
00:00 - Welcome
00:46 - Introducing guest, Robert Kerbeck
00:55 - …And That’s How I Became A Spy
03:00 - Creativity REELY Counts w/ Phishing
10:00 - Robert’s Phishing Training
14:22 - How Corporate Espionage Works
18:36 - “A Fraction of the Spying I Really Did”
20:52 - Hobnobbing with Hollywood
25:06 - Your Way out of a “Ruse” 
 
Links:
Connect with our guest Robert Kerbeck:
https://www.linkedin.com/in/robert-kerbeck-12aa7a11/
Read “Ruse: Lying the American Dream from Hollywood to Wall Street”:
https://www.amazon.com/Ruse-Lying-American-Hollywood-Street/dp/1586423169
Join our creative mastermind and stand out as a cybersecurity professional: 
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com/
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1724</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>300</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Culture and ADHD with Kim Crawley</title>
        <itunes:title>Hacker Culture and ADHD with Kim Crawley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-culture-and-adhd-with-kim-crawley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-culture-and-adhd-with-kim-crawley/#comments</comments>        <pubDate>Tue, 10 Oct 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9cf14854-4eaa-3613-9e0b-b48c9adc63bf</guid>
                                    <description><![CDATA[<p>In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum and AI, Kim shares her love of computers as well as her passion for educating others through her writing. Lastly, Kim explains how she wrote her newest release, “Hacker Culture A-Z” while keeping it ADHD-friendly.</p>
<p>
Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:52 - Introducing guest, Kim Crawley</p>
<p>02:20 - Computers; A Forbidden Fruit</p>
<p>04:50 - Parents, PCs &amp; Printers</p>
<p>10:44 - Why Hacker Culture?</p>
<p>14:34 - Join our Mastermind!</p>
<p>15:16 - Quantifying Quantum</p>
<p>21:53 - ”AI is like Fire”</p>
<p>26:45 - Playing with Chat &amp; DALL-E</p>
<p>28:28 - ADHD &amp; Work</p>
<p>33:22 - How to Become an Author</p>
<p>
Links:</p>
<p>Connect with our guest Kim Crawley:</p>
<p><a href='https://linkedin.com/in/kimcrawley'>https://linkedin.com/in/kimcrawley</a></p>
<p>Pre-order “Hacker Culture A to Z” here:</p>
<p><a href='https://www.amazon.com/Hacker-Culture-Fundamentals-Cybersecurity-Hacking/dp/1098145674/'>https://www.amazon.com/Hacker-Culture-Fundamentals-Cybersecurity-Hacking/dp/1098145674/</a></p>
<p>Read “Hacker Culture A to Z” on the O’Reily Learning Platform:</p>
<p><a href='https://www.oreilly.com/library/view/hacker-culture-a/9781098145668/'>https://www.oreilly.com/library/view/hacker-culture-a/9781098145668/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a> </p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum and AI, Kim shares her love of computers as well as her passion for educating others through her writing. Lastly, Kim explains how she wrote her newest release, “Hacker Culture A-Z” while keeping it ADHD-friendly.</p>
<p><br>
Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>00:52 - Introducing guest, Kim Crawley</p>
<p>02:20 - Computers; A Forbidden Fruit</p>
<p>04:50 - Parents, PCs &amp; Printers</p>
<p>10:44 - Why Hacker Culture?</p>
<p>14:34 - Join our Mastermind!</p>
<p>15:16 - Quantifying Quantum</p>
<p>21:53 - ”AI is like Fire”</p>
<p>26:45 - Playing with Chat &amp; DALL-E</p>
<p>28:28 - ADHD &amp; Work</p>
<p>33:22 - How to Become an Author</p>
<p><br>
Links:</p>
<p>Connect with our guest Kim Crawley:</p>
<p><a href='https://linkedin.com/in/kimcrawley'>https://linkedin.com/in/kimcrawley</a></p>
<p>Pre-order “Hacker Culture A to Z” here:</p>
<p><a href='https://www.amazon.com/Hacker-Culture-Fundamentals-Cybersecurity-Hacking/dp/1098145674/'>https://www.amazon.com/Hacker-Culture-Fundamentals-Cybersecurity-Hacking/dp/1098145674/</a></p>
<p>Read “Hacker Culture A to Z” on the O’Reily Learning Platform:</p>
<p><a href='https://www.oreilly.com/library/view/hacker-culture-a/9781098145668/'>https://www.oreilly.com/library/view/hacker-culture-a/9781098145668/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a> </p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ehjzqz/Kim_Crawley_v2_1_6hvtw.mp3" length="41506737" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum and AI, Kim shares her love of computers as well as her passion for educating others through her writing. Lastly, Kim explains how she wrote her newest release, “Hacker Culture A-Z” while keeping it ADHD-friendly.
Impactful Moments
00:00 - Welcome
00:52 - Introducing guest, Kim Crawley
02:20 - Computers; A Forbidden Fruit
04:50 - Parents, PCs &amp; Printers
10:44 - Why Hacker Culture?
14:34 - Join our Mastermind!
15:16 - Quantifying Quantum
21:53 - ”AI is like Fire”
26:45 - Playing with Chat &amp; DALL-E
28:28 - ADHD &amp; Work
33:22 - How to Become an Author
Links:
Connect with our guest Kim Crawley:
https://linkedin.com/in/kimcrawley
Pre-order “Hacker Culture A to Z” here:
https://www.amazon.com/Hacker-Culture-Fundamentals-Cybersecurity-Hacking/dp/1098145674/
Read “Hacker Culture A to Z” on the O’Reily Learning Platform:
https://www.oreilly.com/library/view/hacker-culture-a/9781098145668/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio 
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2233</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>299</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Starting at the Endpoint with Danny Jenkins</title>
        <itunes:title>Starting at the Endpoint with Danny Jenkins</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/starting-at-the-endpoint-with-danny-jenkins/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/starting-at-the-endpoint-with-danny-jenkins/#comments</comments>        <pubDate>Tue, 03 Oct 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/76209a74-642e-3791-bc25-eb94baec483b</guid>
                                    <description><![CDATA[<p>In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero’s Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to persuading people to take a new approach -- this story has all of the villains and obstacles any cybersecurity champion will inevitably face and conquer!</p>
<p>Sponsor:
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Check out our friends at ThreatLocker today and let them know Hacker Valley sent you! <a href='https://threatlocker.com/?utm_source=sponsored-content&amp;utm_medium=podcast-interview&amp;utm_campaign=2023-09-hacker-valley-danny-jenkins-interview&amp;utm_content=about-danny'>https://www.threatlocker.com </a></p>
<p>Impactful Moments
00:00 - Welcome
00:55 - Introducing guest, Danny Jenkins
02:00 - The start of Danny’s journey
04:10 - Moments it changed
06:55 - The worst job in the world
08:36 - Starting with the endpoint
09:18 - An uphill battle
13:25 - Going all in
15:21 - A word about our sponsor!
16:35 - Zero to hero
18:47 - Trust and ringfencing
22:53 - What is zero trust?
25:00 - Zero trust at ThreatLocker
28:25 - Tools to make decisions
29:09 - Productivity tools? Not anymore!
31:10 - Making yourself more secure</p>
<p>Links:
Connect with our guest Danny Jenkins:
https://www.linkedin.com/in/dannyjenkinscyber/
Learn more about ThreatLocker:
https://www.ThreatLocker.com
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com/
Continue the conversation by joining our Discord:
https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero’s Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to persuading people to take a new approach -- this story has all of the villains and obstacles any cybersecurity champion will inevitably face and conquer!</p>
<p>Sponsor:<br>
Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Check out our friends at ThreatLocker today and let them know Hacker Valley sent you! <a href='https://threatlocker.com/?utm_source=sponsored-content&amp;utm_medium=podcast-interview&amp;utm_campaign=2023-09-hacker-valley-danny-jenkins-interview&amp;utm_content=about-danny'>https://www.threatlocker.com </a></p>
<p>Impactful Moments<br>
00:00 - Welcome<br>
00:55 - Introducing guest, Danny Jenkins<br>
02:00 - The start of Danny’s journey<br>
04:10 - Moments it changed<br>
06:55 - The worst job in the world<br>
08:36 - Starting with the endpoint<br>
09:18 - An uphill battle<br>
13:25 - Going all in<br>
15:21 - A word about our sponsor!<br>
16:35 - Zero to hero<br>
18:47 - Trust and ringfencing<br>
22:53 - What is zero trust?<br>
25:00 - Zero trust at ThreatLocker<br>
28:25 - Tools to make decisions<br>
29:09 - Productivity tools? Not anymore!<br>
31:10 - Making yourself more secure</p>
<p>Links:<br>
Connect with our guest Danny Jenkins:<br>
https://www.linkedin.com/in/dannyjenkinscyber/<br>
Learn more about ThreatLocker:<br>
https://www.ThreatLocker.com<br>
Join our creative mastermind and stand out as a cybersecurity professional:<br>
https://www.patreon.com/hackervalleystudio<br>
Become a sponsor of the show to amplify your brand:<br>
https://hackervalley.com/work-with-us/<br>
Love Hacker Valley Studio? Pick up some swag:<br>
https://store.hackervalley.com/<br>
Continue the conversation by joining our Discord:<br>
https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ddhz5d/Threat_Lockerat7th.mp3" length="32390254" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero’s Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to persuading people to take a new approach -- this story has all of the villains and obstacles any cybersecurity champion will inevitably face and conquer!
Sponsor:Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Check out our friends at ThreatLocker today and let them know Hacker Valley sent you! https://www.threatlocker.com 
Impactful Moments00:00 - Welcome00:55 - Introducing guest, Danny Jenkins02:00 - The start of Danny’s journey04:10 - Moments it changed06:55 - The worst job in the world08:36 - Starting with the endpoint09:18 - An uphill battle13:25 - Going all in15:21 - A word about our sponsor!16:35 - Zero to hero18:47 - Trust and ringfencing22:53 - What is zero trust?25:00 - Zero trust at ThreatLocker28:25 - Tools to make decisions29:09 - Productivity tools? Not anymore!31:10 - Making yourself more secure
Links:Connect with our guest Danny Jenkins:https://www.linkedin.com/in/dannyjenkinscyber/Learn more about ThreatLocker:https://www.ThreatLocker.comJoin our creative mastermind and stand out as a cybersecurity professional:https://www.patreon.com/hackervalleystudioBecome a sponsor of the show to amplify your brand:https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag:https://store.hackervalley.com/Continue the conversation by joining our Discord:https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2024</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>298</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Having Resilience In Your Cyber Career with Erika Eakins</title>
        <itunes:title>Having Resilience In Your Cyber Career with Erika Eakins</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/having-resilience-in-your-cyber-career-with-erika-eatkins/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/having-resilience-in-your-cyber-career-with-erika-eatkins/#comments</comments>        <pubDate>Tue, 26 Sep 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/675bc4bb-cba4-3814-b8b5-772527f70577</guid>
                                    <description><![CDATA[<p>In this episode, host Chris is joined by Erika Eakins — a cybersecurity sales ninja, podcaster, and co-founder at Teach Kids Tech. Erika opens up about her challenges entering tech and cybersecurity as a woman and her mission to serve the underrepresented. Erika also shares how the strength and resilience she acquired in childhood have helped to carry her through unexpected hardships in the industry like layoffs.</p>
<p>
Impactful Moments:</p>
<p>0:00-Welcome
00:50-Introducing guest, Erika Eakins
01:22-Erika’s origin story
05:43-Being judged on looks
07:10-”Why are you still in?!”
07:47-Where to find strength
10:40-Who are the Cyber Queens?
13:18-Join our mastermind!
14:02-Aiming to Overcome Obstacles
16:08-Reflection on Resilience
17:54-Teach Kids Tech
20:30-The legacy of Queens
23:23-Power of Positivity &amp; Support

Links: 
Connect with our guest Erika Eakins 
<a href='https://www.linkedin.com/in/eeakins/'>https://www.linkedin.com/in/eeakins/ </a>
Check out The Cyber Queens Podcast <a href='https://www.cyberqueenspodcast.com/'>https://www.cyberqueenspodcast.com/ </a>
Learn more about Teach Kids Tech
<a href='https://www.teachkidstech.net/'> https://www.teachkidstech.net/ </a>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/ </a>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com/'>https://store.hackervalley.com/ </a>
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Chris is joined by Erika Eakins — a cybersecurity sales ninja, podcaster, and co-founder at Teach Kids Tech. Erika opens up about her challenges entering tech and cybersecurity as a woman and her mission to serve the underrepresented. Erika also shares how the strength and resilience she acquired in childhood have helped to carry her through unexpected hardships in the industry like layoffs.</p>
<p><br>
Impactful Moments:</p>
<p>0:00-Welcome<br>
00:50-Introducing guest, Erika Eakins<br>
01:22-Erika’s origin story<br>
05:43-Being judged on looks<br>
07:10-”Why are you still in?!”<br>
07:47-Where to find strength<br>
10:40-Who are the Cyber Queens?<br>
13:18-Join our mastermind!<br>
14:02-Aiming to Overcome Obstacles<br>
16:08-Reflection on Resilience<br>
17:54-Teach Kids Tech<br>
20:30-The legacy of Queens<br>
23:23-Power of Positivity &amp; Support<br>
<br>
Links: <br>
Connect with our guest Erika Eakins <br>
<a href='https://www.linkedin.com/in/eeakins/'>https://www.linkedin.com/in/eeakins/ </a><br>
Check out The Cyber Queens Podcast <a href='https://www.cyberqueenspodcast.com/'>https://www.cyberqueenspodcast.com/ </a><br>
Learn more about Teach Kids Tech<br>
<a href='https://www.teachkidstech.net/'> https://www.teachkidstech.net/ </a><br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/ </a><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com/'>https://store.hackervalley.com/ </a><br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/g7bqn3/Erika_Eakins_b3atb.mp3" length="24918818" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Chris is joined by Erika Eakins — a cybersecurity sales ninja, podcaster, and co-founder at Teach Kids Tech. Erika opens up about her challenges entering tech and cybersecurity as a woman and her mission to serve the underrepresented. Erika also shares how the strength and resilience she acquired in childhood have helped to carry her through unexpected hardships in the industry like layoffs.
Impactful Moments:
0:00-Welcome00:50-Introducing guest, Erika Eakins01:22-Erika’s origin story05:43-Being judged on looks07:10-”Why are you still in?!”07:47-Where to find strength10:40-Who are the Cyber Queens?13:18-Join our mastermind!14:02-Aiming to Overcome Obstacles16:08-Reflection on Resilience17:54-Teach Kids Tech20:30-The legacy of Queens23:23-Power of Positivity &amp; SupportLinks: Connect with our guest Erika Eakins https://www.linkedin.com/in/eeakins/ Check out The Cyber Queens Podcast https://www.cyberqueenspodcast.com/ Learn more about Teach Kids Tech https://www.teachkidstech.net/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com/ Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1557</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>297</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Build vs. Buy: The Classic Technologist Conundrum</title>
        <itunes:title>Build vs. Buy: The Classic Technologist Conundrum</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/build-vs-buy-the-classic-technologist-conundrum/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/build-vs-buy-the-classic-technologist-conundrum/#comments</comments>        <pubDate>Tue, 19 Sep 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/54042e62-a909-3198-aa8a-257122365a81</guid>
                                    <description><![CDATA[<p>It’s a classic technologist conundrum: Should I build or buy the solution I need to solve a problem?</p>
<p>The “Build vs. Buy” conundrum is faced by technology teams worldwide. To help approach this riddle, Chris Cochran speaks to two industry veterans, Slavik Markovich co-founder &amp; CEO of Descope, and Rob Fry, co-founder of AKA Identity. </p>
<p>Whether you’re an entrepreneur, a CTO, or just tech-curious, this episode offers invaluable insights. Using the identity market as a case study, we’ll explore the multifaceted considerations needed to make the best choice for your team and organization.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>0:00 - Build vs. Buy: The Classic Technologist Conundrum</p>
<p>0:37 - Show Intro</p>
<p>0:57 - Introducing Slavik Markovich and Rob Fry</p>
<p>3:25 - Previous build vs. buy project</p>
<p>6:44 - Decision logic for build vs. buy </p>
<p>15:09 - How does tech sway your decision making?</p>
<p>19:44 - How does data impact decision making?</p>
<p>24:31 - How do processes influence decision making?</p>
<p>29:13 - Maintaining custom tech solutions over time</p>
<p>33:28 - Tenants for building a tech company</p>
<p>41:06 - Build authentication and user journey flows with Descope</p>
<p> </p>
<p>Links: </p>
<p>Learn more about Descope: https://www.descope.com/</p>
<p>Connect with our guest Slavik Markovich: https://www.linkedin.com/in/slavikm/</p>
<p>Connect with our guest Rob Fry: https://www.linkedin.com/in/fry-rob-g/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>It’s a classic technologist conundrum: Should I build or buy the solution I need to solve a problem?</p>
<p>The “Build vs. Buy” conundrum is faced by technology teams worldwide. To help approach this riddle, Chris Cochran speaks to two industry veterans, Slavik Markovich co-founder &amp; CEO of Descope, and Rob Fry, co-founder of AKA Identity. </p>
<p>Whether you’re an entrepreneur, a CTO, or just tech-curious, this episode offers invaluable insights. Using the identity market as a case study, we’ll explore the multifaceted considerations needed to make the best choice for your team and organization.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>0:00 - Build vs. Buy: The Classic Technologist Conundrum</p>
<p>0:37 - Show Intro</p>
<p>0:57 - Introducing Slavik Markovich and Rob Fry</p>
<p>3:25 - Previous build vs. buy project</p>
<p>6:44 - Decision logic for build vs. buy </p>
<p>15:09 - How does tech sway your decision making?</p>
<p>19:44 - How does data impact decision making?</p>
<p>24:31 - How do processes influence decision making?</p>
<p>29:13 - Maintaining custom tech solutions over time</p>
<p>33:28 - Tenants for building a tech company</p>
<p>41:06 - Build authentication and user journey flows with Descope</p>
<p> </p>
<p>Links: </p>
<p>Learn more about Descope: https://www.descope.com/</p>
<p>Connect with our guest Slavik Markovich: https://www.linkedin.com/in/slavikm/</p>
<p>Connect with our guest Rob Fry: https://www.linkedin.com/in/fry-rob-g/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/msf5qd/Build_Vs_Buy9aq1s.mp3" length="41685833" type="audio/mpeg"/>
        <itunes:summary><![CDATA[It’s a classic technologist conundrum: Should I build or buy the solution I need to solve a problem?
The “Build vs. Buy” conundrum is faced by technology teams worldwide. To help approach this riddle, Chris Cochran speaks to two industry veterans, Slavik Markovich co-founder &amp; CEO of Descope, and Rob Fry, co-founder of AKA Identity. 
Whether you’re an entrepreneur, a CTO, or just tech-curious, this episode offers invaluable insights. Using the identity market as a case study, we’ll explore the multifaceted considerations needed to make the best choice for your team and organization.
 
Impactful Moments:
0:00 - Build vs. Buy: The Classic Technologist Conundrum
0:37 - Show Intro
0:57 - Introducing Slavik Markovich and Rob Fry
3:25 - Previous build vs. buy project
6:44 - Decision logic for build vs. buy 
15:09 - How does tech sway your decision making?
19:44 - How does data impact decision making?
24:31 - How do processes influence decision making?
29:13 - Maintaining custom tech solutions over time
33:28 - Tenants for building a tech company
41:06 - Build authentication and user journey flows with Descope
 
Links: 
Learn more about Descope: https://www.descope.com/
Connect with our guest Slavik Markovich: https://www.linkedin.com/in/slavikm/
Connect with our guest Rob Fry: https://www.linkedin.com/in/fry-rob-g/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2605</itunes:duration>
                <itunes:episode>296</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>AI Is the Tool Not the Toolbox</title>
        <itunes:title>AI Is the Tool Not the Toolbox</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ai-is-the-tool-not-the-toolbox/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ai-is-the-tool-not-the-toolbox/#comments</comments>        <pubDate>Tue, 12 Sep 2023 05:30:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9c3e842e-f4f4-331e-a36b-b4a71f5dff84</guid>
                                    <description><![CDATA[<p>Embrace the AI Revolution in Cybersecurity! Ron Eddings explores the dynamic world of AI, from cybersecurity automation to anomaly detection. Learn how AI is being used by practitioners and creators to stay one step ahead of the adversary and the competition</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - Intro</p>
<p>1:35 - Origin into cybersecurity and automation</p>
<p>6:12 - What is Artificial Intelligence?</p>
<p>8:23 - Using AI to Classify Phishing Emails</p>
<p>11:32 - Descript and Claude2 to Summarize Content</p>
<p>17:54 - ChatGPT Advanced Data Analysis</p>
<p>21:41 - Top 4 AI Red Team Attacks</p>
<p>26:09 - Cybersecurity AI Disrupters</p>
<p>27:50 - Cybersecurity Creative Mastermind</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ron Eddings: https://www.linkedin.com/in/ronaldeddings/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Embrace the AI Revolution in Cybersecurity! Ron Eddings explores the dynamic world of AI, from cybersecurity automation to anomaly detection. Learn how AI is being used by practitioners and creators to stay one step ahead of the adversary and the competition</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - Intro</p>
<p>1:35 - Origin into cybersecurity and automation</p>
<p>6:12 - What is Artificial Intelligence?</p>
<p>8:23 - Using AI to Classify Phishing Emails</p>
<p>11:32 - Descript and Claude2 to Summarize Content</p>
<p>17:54 - ChatGPT Advanced Data Analysis</p>
<p>21:41 - Top 4 AI Red Team Attacks</p>
<p>26:09 - Cybersecurity AI Disrupters</p>
<p>27:50 - Cybersecurity Creative Mastermind</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ron Eddings: https://www.linkedin.com/in/ronaldeddings/</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com</p>
<p>Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p>Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p>Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3kfthr/AI_Is_the_Tool_Not_The_Toolbox863f0.mp3" length="42616931" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Embrace the AI Revolution in Cybersecurity! Ron Eddings explores the dynamic world of AI, from cybersecurity automation to anomaly detection. Learn how AI is being used by practitioners and creators to stay one step ahead of the adversary and the competition
 
Impactful Moments
0:00 - Intro
1:35 - Origin into cybersecurity and automation
6:12 - What is Artificial Intelligence?
8:23 - Using AI to Classify Phishing Emails
11:32 - Descript and Claude2 to Summarize Content
17:54 - ChatGPT Advanced Data Analysis
21:41 - Top 4 AI Red Team Attacks
26:09 - Cybersecurity AI Disrupters
27:50 - Cybersecurity Creative Mastermind
 
Links:
Connect with Ron Eddings: https://www.linkedin.com/in/ronaldeddings/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1714</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>295</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Security Teams Can’t Do It All with Rob Wood - REWIND</title>
        <itunes:title>Security Teams Can’t Do It All with Rob Wood - REWIND</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/security-teams-can-t-do-it-all-with-rob-wood-rewind/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/security-teams-can-t-do-it-all-with-rob-wood-rewind/#comments</comments>        <pubDate>Tue, 05 Sep 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a8e65e47-3029-34ee-84b1-8d713c3b92cb</guid>
                                    <description><![CDATA[<p>For this week's episode, we brought back a fan favorite Security Teams Can't Do It All. This episode features guest Rob Wood, CISO at CMS, who discusses the challenges of data silos in the workplace and the importance of supportive leadership.</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Rob Wood on <a href='https://www.linkedin.com/in/holycyberbatman/'>LinkedIn</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>For this week's episode, we brought back a fan favorite <em>Security Teams Can't Do It All. </em>This episode features guest Rob Wood, CISO at CMS, who discusses the challenges of data silos in the workplace and the importance of supportive leadership.</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Rob Wood on <a href='https://www.linkedin.com/in/holycyberbatman/'>LinkedIn</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3jc48v/Hacker_Valley_Podcast_Rob_Wood_v39nmxl.mp3" length="72440872" type="audio/mpeg"/>
        <itunes:summary><![CDATA[For this week's episode, we brought back a fan favorite Security Teams Can't Do It All. This episode features guest Rob Wood, CISO at CMS, who discusses the challenges of data silos in the workplace and the importance of supportive leadership.
 
Links:
Connect with our guest Rob Wood on LinkedIn
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio.com
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1801</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>294</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Art of Creating Cybersecurity Content With Jason Rebholz</title>
        <itunes:title>The Art of Creating Cybersecurity Content With Jason Rebholz</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-art-of-creating-cybersecurity-content-with-jason-rebholz/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-art-of-creating-cybersecurity-content-with-jason-rebholz/#comments</comments>        <pubDate>Tue, 29 Aug 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/074c68e1-d9d0-3d93-93cd-5f1031f7ac52</guid>
                                    <description><![CDATA[<p>In this episode, host Ron is joined by the CISO at Corvus Insurance, Jason Rebholz, to talk about the life of being a cybersecurity content creator. From his drive to create cyber content for technical and non-technical audiences to the sometimes harsh realities of content creation, Jason opens up about the importance of having passion and well-balanced goals.

</p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>01:12 - Introducing guest, Jason Rebholz</p>
<p>02:05 - Jason’s cybersecurity background</p>
<p>04:37 - Everybody loves a former CISO</p>
<p>06:16 - Creating digestable content for all</p>
<p>09:07 - The nuances of MFA</p>
<p>11:16 - Goal setting</p>
<p>14:06 - The harsh reality of content creation</p>
<p>18:56 - Bullets before canon balls</p>
<p>28:53 - Join our mastermind!</p>
<p>29:57 - Balance is key</p>
<p>31:25 - Mastering effective communication</p>
<p>33:29 - Advice for aspiring content creators</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Jason <a href='https://www.linkedin.com/in/jrebholz/'>https://www.linkedin.com/in/jrebholz/</a></p>
<p>Check out Jason’s YouTube channel <a href='https://www.youtube.com/@teachmecyber'>https://www.youtube.com/@teachmecyber</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Ron is joined by the CISO at Corvus Insurance, Jason Rebholz, to talk about the life of being a cybersecurity content creator. From his drive to create cyber content for technical and non-technical audiences to the sometimes harsh realities of content creation, Jason opens up about the importance of having passion and well-balanced goals.<br>
<br>
</p>
<p>Impactful Moments</p>
<p>00:00 - Welcome</p>
<p>01:12 - Introducing guest, Jason Rebholz</p>
<p>02:05 - Jason’s cybersecurity background</p>
<p>04:37 - Everybody loves a former CISO</p>
<p>06:16 - Creating digestable content for all</p>
<p>09:07 - The nuances of MFA</p>
<p>11:16 - Goal setting</p>
<p>14:06 - The harsh reality of content creation</p>
<p>18:56 - Bullets before canon balls</p>
<p>28:53 - Join our mastermind!</p>
<p>29:57 - Balance is key</p>
<p>31:25 - Mastering effective communication</p>
<p>33:29 - Advice for aspiring content creators</p>
<p> </p>
<p>Links:</p>
<p>Connect with our guest Jason <a href='https://www.linkedin.com/in/jrebholz/'>https://www.linkedin.com/in/jrebholz/</a></p>
<p>Check out Jason’s YouTube channel <a href='https://www.youtube.com/@teachmecyber'>https://www.youtube.com/@teachmecyber</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/w3ghev/The_Art_of_Creating_Cybersecurity_Content_with_Jason_Rebholz9elhn.mp3" length="55036712" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Ron is joined by the CISO at Corvus Insurance, Jason Rebholz, to talk about the life of being a cybersecurity content creator. From his drive to create cyber content for technical and non-technical audiences to the sometimes harsh realities of content creation, Jason opens up about the importance of having passion and well-balanced goals.
Impactful Moments
00:00 - Welcome
01:12 - Introducing guest, Jason Rebholz
02:05 - Jason’s cybersecurity background
04:37 - Everybody loves a former CISO
06:16 - Creating digestable content for all
09:07 - The nuances of MFA
11:16 - Goal setting
14:06 - The harsh reality of content creation
18:56 - Bullets before canon balls
28:53 - Join our mastermind!
29:57 - Balance is key
31:25 - Mastering effective communication
33:29 - Advice for aspiring content creators
 
Links:
Connect with our guest Jason https://www.linkedin.com/in/jrebholz/
Check out Jason’s YouTube channel https://www.youtube.com/@teachmecyber
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio.com
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2139</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>293</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Humility In Product Management with Eric Avigdor</title>
        <itunes:title>Humility In Product Management with Eric Avigdor</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/humility-in-product-management-with-eric-avigdor/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/humility-in-product-management-with-eric-avigdor/#comments</comments>        <pubDate>Tue, 22 Aug 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/30d65d4e-bff7-3c26-b8f8-e175d2ad0ba1</guid>
                                    <description><![CDATA[<p>In this episode, hosts Ron and Chris are joined by special guest Eric Avigdor, VP of Product Management at Votiro. With humility as the focal point, Eric details his journey as a Product Manager — sharing his unique approach to leadership and customer engagement, as well as the art of asking the right questions. Discover how Votiro is spearheading content security innovation, and don't miss Eric's advice for budding Product Managers eager to make their mark in the industry.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:10 - Introducing guest, Eric Avigdor</p>
<p>02:27 - Cybersecurity is like an orchestra</p>
<p>03:20 - Product Management vs Engineering</p>
<p>04:40 - Misconceptions of Product Management</p>
<p>07:09 - Understanding the product</p>
<p>08:18 - The realities of the job</p>
<p>10:51 - Tying the whole story together</p>
<p>13:32 - Why Votiro?</p>
<p>16:52 - Leading the way in innovation</p>
<p>19:05 - A word about our sponsor</p>
<p>21:24 - A use-case storytime</p>
<p>23:17 - Integrating where content resides</p>
<p>25:06 - Security + collaboration is the goal</p>
<p>27:50 - Advice for aspiring Product Managers</p>
<p>
Links:
Connect with Eric Avigdor:</p>
<p><a href='https://www.linkedin.com/in/eric-avigdor-0b561118/'>https://www.linkedin.com/in/eric-avigdor-0b561118/</a> </p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, hosts Ron and Chris are joined by special guest Eric Avigdor, VP of Product Management at Votiro. With humility as the focal point, Eric details his journey as a Product Manager — sharing his unique approach to leadership and customer engagement, as well as the art of asking the right questions. Discover how Votiro is spearheading content security innovation, and don't miss Eric's advice for budding Product Managers eager to make their mark in the industry.</p>
<p>Impactful Moments:</p>
<p>00:00 - Welcome</p>
<p>01:10 - Introducing guest, Eric Avigdor</p>
<p>02:27 - Cybersecurity is like an orchestra</p>
<p>03:20 - Product Management vs Engineering</p>
<p>04:40 - Misconceptions of Product Management</p>
<p>07:09 - Understanding the product</p>
<p>08:18 - The realities of the job</p>
<p>10:51 - Tying the whole story together</p>
<p>13:32 - Why Votiro?</p>
<p>16:52 - Leading the way in innovation</p>
<p>19:05 - A word about our sponsor</p>
<p>21:24 - A use-case storytime</p>
<p>23:17 - Integrating where content resides</p>
<p>25:06 - Security + collaboration is the goal</p>
<p>27:50 - Advice for aspiring Product Managers</p>
<p><br>
Links:<br>
Connect with Eric Avigdor:</p>
<p><a href='https://www.linkedin.com/in/eric-avigdor-0b561118/'>https://www.linkedin.com/in/eric-avigdor-0b561118/</a> </p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/asvu6a/Votiro_v2.mp3" length="38899671" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, hosts Ron and Chris are joined by special guest Eric Avigdor, VP of Product Management at Votiro. With humility as the focal point, Eric details his journey as a Product Manager — sharing his unique approach to leadership and customer engagement, as well as the art of asking the right questions. Discover how Votiro is spearheading content security innovation, and don't miss Eric's advice for budding Product Managers eager to make their mark in the industry.
Impactful Moments:
00:00 - Welcome
01:10 - Introducing guest, Eric Avigdor
02:27 - Cybersecurity is like an orchestra
03:20 - Product Management vs Engineering
04:40 - Misconceptions of Product Management
07:09 - Understanding the product
08:18 - The realities of the job
10:51 - Tying the whole story together
13:32 - Why Votiro?
16:52 - Leading the way in innovation
19:05 - A word about our sponsor
21:24 - A use-case storytime
23:17 - Integrating where content resides
25:06 - Security + collaboration is the goal
27:50 - Advice for aspiring Product Managers
Links:Connect with Eric Avigdor:
https://www.linkedin.com/in/eric-avigdor-0b561118/ 
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio.com
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1777</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>292</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Leadership In Cybersecurity with Marty Overman</title>
        <itunes:title>Leadership In Cybersecurity with Marty Overman</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/leadership-in-cybersecurity-with-marty-overman/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/leadership-in-cybersecurity-with-marty-overman/#comments</comments>        <pubDate>Tue, 15 Aug 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f425ebc7-15bc-3ecb-b08f-fdaa46e043ea</guid>
                                    <description><![CDATA[<p>Host Chris Cochran is joined by Marty Overman, Senior VP at Imperva, to discuss the importance of self-awareness and transparency in cybersecurity leadership. The two emphasize the need for leaders to recognize their strengths and weaknesses and understand and empathize with the needs and experiences of those they lead.</p>
<p>Impactful Moments 
00:00 - Welcome
00:52 - Introducing guest, Marty Overman
01:26 - What makes a great sales leader?
04:50 - The power of asking questions
07:27 - Building strong team cultures
11:58 - Creating opportunities for collaboration
14:28 - Setting goals and expectations
17:24 - Creating team identity together
24:15 - Identifying areas for improvement
28:09 - Psychological safety in leadership
30:12 - Creating a safe space
34:52 - Adults and the inner child
37:26 - Empathy and understanding</p>
<p>
Links:
Connect with Marty Overman:
<a href='https://www.linkedin.com/in/martyoverman/'>https://www.linkedin.com/in/martyoverman/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Host Chris Cochran is joined by Marty Overman, Senior VP at Imperva, to discuss the importance of self-awareness and transparency in cybersecurity leadership. The two emphasize the need for leaders to recognize their strengths and weaknesses and understand and empathize with the needs and experiences of those they lead.</p>
<p>Impactful Moments <br>
00:00 - Welcome<br>
00:52 - Introducing guest, Marty Overman<br>
01:26 - What makes a great sales leader?<br>
04:50 - The power of asking questions<br>
07:27 - Building strong team cultures<br>
11:58 - Creating opportunities for collaboration<br>
14:28 - Setting goals and expectations<br>
17:24 - Creating team identity together<br>
24:15 - Identifying areas for improvement<br>
28:09 - Psychological safety in leadership<br>
30:12 - Creating a safe space<br>
34:52 - Adults and the inner child<br>
37:26 - Empathy and understanding</p>
<p><br>
Links:<br>
Connect with Marty Overman:<br>
<a href='https://www.linkedin.com/in/martyoverman/'>https://www.linkedin.com/in/martyoverman/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional:</p>
<p><a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a></p>
<p>Become a sponsor of the show to amplify your brand:</p>
<p><a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag:</p>
<p><a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord:</p>
<p><a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dy4em8/08_08_Marty_overman_v3.mp3" length="41051403" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Host Chris Cochran is joined by Marty Overman, Senior VP at Imperva, to discuss the importance of self-awareness and transparency in cybersecurity leadership. The two emphasize the need for leaders to recognize their strengths and weaknesses and understand and empathize with the needs and experiences of those they lead.
Impactful Moments 00:00 - Welcome00:52 - Introducing guest, Marty Overman01:26 - What makes a great sales leader?04:50 - The power of asking questions07:27 - Building strong team cultures11:58 - Creating opportunities for collaboration14:28 - Setting goals and expectations17:24 - Creating team identity together24:15 - Identifying areas for improvement28:09 - Psychological safety in leadership30:12 - Creating a safe space34:52 - Adults and the inner child37:26 - Empathy and understanding
Links:Connect with Marty Overman:https://www.linkedin.com/in/martyoverman/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio.com
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2308</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>291</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>SaaS Opportunities &amp; Consequences of Using AI</title>
        <itunes:title>SaaS Opportunities &amp; Consequences of Using AI</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/saas-opportunities-consequences-of-using-ai/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/saas-opportunities-consequences-of-using-ai/#comments</comments>        <pubDate>Tue, 01 Aug 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/825db779-02e8-3eca-a952-8f4b799fac90</guid>
                                    <description><![CDATA[<p>In this episode, host Ron is joined by Jamie Blasco, co-founder and CTO at Nudge Security, to discuss the opportunities of SaaS as well as the security implications of AI. Jamie also considers the importance of striking a balance between productivity and security when employees adopt new tools. Lastly, he emphasizes his philosophy of treating employees as part of the solution and creating a culture where they feel valued and included in the company's security efforts.

</p>
<p>Impactful Moments: 
00:00 - Welcome 
01:35 - Introducing guest, Jamie Blasco 
02:25 - How does SaaS fit into AI today? 
03:52 - Areas of opportunity for AI &amp; SaaS 
05:17 - A walk down Jamie’s memory lane 
09:56 - Finding the shadow IT 
15:08 - What are the risks? 
18:26 - A word from our sponsor! 
20:40 - 3rd party risk &amp; data usage 
24:33 - Types of AI Nudge is utilizing 
26:38 - The premise behind Nudge 
30:50 - Employees as part of the solution 
33:13 - SaaS — critical but risky 
36:43 - Jamie’s final words of advice</p>
<p>
Links: 
Connect with Jamie Blasco: 
<a href='https://www.linkedin.com/in/jaimeblasco/'>https://www.linkedin.com/in/jaimeblasco/ </a>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com </a>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/ </a>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, host Ron is joined by Jamie Blasco, co-founder and CTO at Nudge Security, to discuss the opportunities of SaaS as well as the security implications of AI. Jamie also considers the importance of striking a balance between productivity and security when employees adopt new tools. Lastly, he emphasizes his philosophy of treating employees as part of the solution and creating a culture where they feel valued and included in the company's security efforts.<br>
<br>
</p>
<p>Impactful Moments: <br>
00:00 - Welcome <br>
01:35 - Introducing guest, Jamie Blasco <br>
02:25 - How does SaaS fit into AI today? <br>
03:52 - Areas of opportunity for AI &amp; SaaS <br>
05:17 - A walk down Jamie’s memory lane <br>
09:56 - Finding the shadow IT <br>
15:08 - What are the risks? <br>
18:26 - A word from our sponsor! <br>
20:40 - 3rd party risk &amp; data usage <br>
24:33 - Types of AI Nudge is utilizing <br>
26:38 - The premise behind Nudge <br>
30:50 - Employees as part of the solution <br>
33:13 - SaaS — critical but risky <br>
36:43 - Jamie’s final words of advice</p>
<p><br>
Links: <br>
Connect with Jamie Blasco: <br>
<a href='https://www.linkedin.com/in/jaimeblasco/'>https://www.linkedin.com/in/jaimeblasco/ </a><br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com </a><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/ </a><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xnk3ch/SAAS_Opportunities_and_Consequences_of_using_AI_FINAL9qq7j.mp3" length="59633439" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, host Ron is joined by Jamie Blasco, co-founder and CTO at Nudge Security, to discuss the opportunities of SaaS as well as the security implications of AI. Jamie also considers the importance of striking a balance between productivity and security when employees adopt new tools. Lastly, he emphasizes his philosophy of treating employees as part of the solution and creating a culture where they feel valued and included in the company's security efforts.
Impactful Moments: 00:00 - Welcome 01:35 - Introducing guest, Jamie Blasco 02:25 - How does SaaS fit into AI today? 03:52 - Areas of opportunity for AI &amp; SaaS 05:17 - A walk down Jamie’s memory lane 09:56 - Finding the shadow IT 15:08 - What are the risks? 18:26 - A word from our sponsor! 20:40 - 3rd party risk &amp; data usage 24:33 - Types of AI Nudge is utilizing 26:38 - The premise behind Nudge 30:50 - Employees as part of the solution 33:13 - SaaS — critical but risky 36:43 - Jamie’s final words of advice
Links: Connect with Jamie Blasco: https://www.linkedin.com/in/jaimeblasco/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2326</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>290</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Mastering The Art Of Storytelling In Cybersecurity</title>
        <itunes:title>Mastering The Art Of Storytelling In Cybersecurity</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/mastering-the-art-of-storytelling-in-cybersecurity/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/mastering-the-art-of-storytelling-in-cybersecurity/#comments</comments>        <pubDate>Tue, 25 Jul 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8006c70c-f950-3da2-8c03-64bd976acf1a</guid>
                                    <description><![CDATA[<p>How do you effectively persuade team members and stakeholders to take action, convey the importance of new projects, or request additional resources? Communicating technical security information often leads to disconnection or worse, falls on deaf ears. During this hour-long livestream, hosts Ron and Chris tackle how you can turn the tables by leveraging the primal power of storytelling, enhancing attention and engagement.

</p>
<p>Impactful Moments:
00:00 - Introduction
04:39 - Storytelling &amp; conveying information 
07:39 - How do I tell better stories?
14:25 - The Story Circle &amp; The Hero's Journey
22:11 - Understanding your audience
24:41 - Simplifying cybersecurity 
30:20 - The impact of storytelling
36:01 - Mastering storytelling in cybersecurity 

</p>
<p>Links:
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a> 
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> 
Love Hacker Valley Studio? Pick up some swag: 
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> 
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How do you effectively persuade team members and stakeholders to take action, convey the importance of new projects, or request additional resources? Communicating technical security information often leads to disconnection or worse, falls on deaf ears. During this hour-long livestream, hosts Ron and Chris tackle how you can turn the tables by leveraging the primal power of storytelling, enhancing attention and engagement.<br>
<br>
</p>
<p>Impactful Moments:<br>
00:00 - Introduction<br>
04:39 - Storytelling &amp; conveying information <br>
07:39 - How do I tell better stories?<br>
14:25 - The Story Circle &amp; The Hero's Journey<br>
22:11 - Understanding your audience<br>
24:41 - Simplifying cybersecurity <br>
30:20 - The impact of storytelling<br>
36:01 - Mastering storytelling in cybersecurity <br>
<br>
</p>
<p>Links:<br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a> <br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> <br>
Love Hacker Valley Studio? Pick up some swag: <br>
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> <br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/c4htxu/Mastering_The_Art_Of_Storytelling_In_Cybersecurity7qupc.mp3" length="36891212" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How do you effectively persuade team members and stakeholders to take action, convey the importance of new projects, or request additional resources? Communicating technical security information often leads to disconnection or worse, falls on deaf ears. During this hour-long livestream, hosts Ron and Chris tackle how you can turn the tables by leveraging the primal power of storytelling, enhancing attention and engagement.
Impactful Moments:00:00 - Introduction04:39 - Storytelling &amp; conveying information 07:39 - How do I tell better stories?14:25 - The Story Circle &amp; The Hero's Journey22:11 - Understanding your audience24:41 - Simplifying cybersecurity 30:20 - The impact of storytelling36:01 - Mastering storytelling in cybersecurity 
Links:Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2305</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>289</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacking, Innovation, &amp; the Formation of the First NSA Red Team with Jeff Man</title>
        <itunes:title>Hacking, Innovation, &amp; the Formation of the First NSA Red Team with Jeff Man</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacking-innovation-the-formation-of-the-first-nsa-red-team-with-jeff-man/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacking-innovation-the-formation-of-the-first-nsa-red-team-with-jeff-man/#comments</comments>        <pubDate>Tue, 18 Jul 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5716d3c2-1715-3cf8-b95e-a3412893fda9</guid>
                                    <description><![CDATA[<p>In this episode, Chris and Ron Eddings are joined by Jeff Man, a legend in cybersecurity. The conversation begins with Jeff sharing his experiences as a member of the first NSA red team and his involvement in groundbreaking projects. He discusses his early days working with computers at the National Security Agency (NSA) in the 1980s and his role in developing a software-based encryption system. Jeff also points to the significance of the first publicly available web browser and the impact it had on the internet and cybersecurity.</p>
<p>Later in the episode, Jeff talks about his transition from the NSA to the private sector and his focus on Payment Card Industry Data Security Standard (PCI DSS) compliance. He explains the importance of PCI and how it provides a framework for organizations to protect sensitive data and maintain secure networks.</p>
<p>Impactful Moments</p>
<p>0:00 - Intro</p>
<p>01:15 - Welcome Jeff Man</p>
<p>01:51 - Jeff’s introduction to computing and cybersecurity</p>
<p>09:25 - Creation of the first NSA Red Team</p>
<p>15:20 - Leaving NSA and Focusing on PCI</p>
<p>19:41 - Advice for Those Starting in Cybersecurity</p>
<p>21:53 - Staying up to date with Jeff Man</p>
<p>
Links:</p>
<p>Stay in touch with Jeff Man on LinkedIn: <a href='https://www.linkedin.com/in/jeffreyeman/'>https://www.linkedin.com/in/jeffreyeman/</a>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a> 
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> 
Love Hacker Valley Studio? Pick up some swag: 
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> 
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Chris and Ron Eddings are joined by Jeff Man, a legend in cybersecurity. The conversation begins with Jeff sharing his experiences as a member of the first NSA red team and his involvement in groundbreaking projects. He discusses his early days working with computers at the National Security Agency (NSA) in the 1980s and his role in developing a software-based encryption system. Jeff also points to the significance of the first publicly available web browser and the impact it had on the internet and cybersecurity.</p>
<p>Later in the episode, Jeff talks about his transition from the NSA to the private sector and his focus on Payment Card Industry Data Security Standard (PCI DSS) compliance. He explains the importance of PCI and how it provides a framework for organizations to protect sensitive data and maintain secure networks.</p>
<p>Impactful Moments</p>
<p>0:00 - Intro</p>
<p>01:15 - Welcome Jeff Man</p>
<p>01:51 - Jeff’s introduction to computing and cybersecurity</p>
<p>09:25 - Creation of the first NSA Red Team</p>
<p>15:20 - Leaving NSA and Focusing on PCI</p>
<p>19:41 - Advice for Those Starting in Cybersecurity</p>
<p>21:53 - Staying up to date with Jeff Man</p>
<p><br>
Links:</p>
<p>Stay in touch with Jeff Man on LinkedIn: <a href='https://www.linkedin.com/in/jeffreyeman/'>https://www.linkedin.com/in/jeffreyeman/</a><br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a> <br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> <br>
Love Hacker Valley Studio? Pick up some swag: <br>
<a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> <br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2dnpy3/Jeff_Man_HV9d6vj.mp3" length="54419882" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Chris and Ron Eddings are joined by Jeff Man, a legend in cybersecurity. The conversation begins with Jeff sharing his experiences as a member of the first NSA red team and his involvement in groundbreaking projects. He discusses his early days working with computers at the National Security Agency (NSA) in the 1980s and his role in developing a software-based encryption system. Jeff also points to the significance of the first publicly available web browser and the impact it had on the internet and cybersecurity.
Later in the episode, Jeff talks about his transition from the NSA to the private sector and his focus on Payment Card Industry Data Security Standard (PCI DSS) compliance. He explains the importance of PCI and how it provides a framework for organizations to protect sensitive data and maintain secure networks.
Impactful Moments
0:00 - Intro
01:15 - Welcome Jeff Man
01:51 - Jeff’s introduction to computing and cybersecurity
09:25 - Creation of the first NSA Red Team
15:20 - Leaving NSA and Focusing on PCI
19:41 - Advice for Those Starting in Cybersecurity
21:53 - Staying up to date with Jeff Man
Links:
Stay in touch with Jeff Man on LinkedIn: https://www.linkedin.com/in/jeffreyeman/Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1350</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>288</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Privacy by Design: The Future of Homomorphic Encryption &amp; Secure Data Analytics</title>
        <itunes:title>Privacy by Design: The Future of Homomorphic Encryption &amp; Secure Data Analytics</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/privacy-by-design-the-future-of-homomorphic-encryption-and-secure-data-analytics/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/privacy-by-design-the-future-of-homomorphic-encryption-and-secure-data-analytics/#comments</comments>        <pubDate>Tue, 11 Jul 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ec7c1f0b-ccd1-39ba-9dd0-dc2d31a3e1db</guid>
                                    <description><![CDATA[<p>In this episode, Chris and Ron interview Derek Wood from Duality Technologies, a leading privacy technology company to discuss the concept of homomorphic encryption and its significance in data security, privacy, and governance.</p>
<p>Homomorphic encryption enables users to perform computations on encrypted data without exposing it, revolutionizing the way data is used and analyzed. In this episode, the group discusses the challenges in the current data landscape, the importance of security and privacy, and the potential impact of duality's solutions in various industries such as finance and healthcare.</p>
<p>Check out Duality’s webinar, <a href='https://www.brighttalk.com/webcast/19414/589410?utm_source=hvm&amp;utm_medium=brighttalk&amp;utm_campaign=589410'>Why Data, Privacy, &amp; Security Leaders are Key to Growth &amp; Innovation</a></p>
<p>Impactful Moments:
00:00 - Introduction
01:09 - What is homomorphic encryption?
04:03 - Misconceptions of security and privacy
06:25 - What is Duality’s mission?
10:04 - Does Google Drive use homomorphic encryption?
13:08 - What homomorphic encryption enables
22:08 - Innovations that Duality is working on
24:37 - Secure data analytics and Homomorphic encryption
31:41 - Impact of AI and LLMs on security and privacy</p>
<p>Links:
Stay in touch with Derek Wood on LinkedIn: <a href='https://www.linkedin.com/in/drwood/'>https://www.linkedin.com/in/drwood/</a></p>
<p>Learn more about Duality Technologies: 
<a href='https://dualitytech.com/'>https://dualitytech.com/</a> 
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a> 
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> 
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> 
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Chris and Ron interview Derek Wood from Duality Technologies, a leading privacy technology company to discuss the concept of homomorphic encryption and its significance in data security, privacy, and governance.</p>
<p>Homomorphic encryption enables users to perform computations on encrypted data without exposing it, revolutionizing the way data is used and analyzed. In this episode, the group discusses the challenges in the current data landscape, the importance of security and privacy, and the potential impact of duality's solutions in various industries such as finance and healthcare.</p>
<p>Check out Duality’s webinar, <a href='https://www.brighttalk.com/webcast/19414/589410?utm_source=hvm&amp;utm_medium=brighttalk&amp;utm_campaign=589410'>Why Data, Privacy, &amp; Security Leaders are Key to Growth &amp; Innovation</a></p>
<p>Impactful Moments:<br>
00:00 - Introduction<br>
01:09 - What is homomorphic encryption?<br>
04:03 - Misconceptions of security and privacy<br>
06:25 - What is Duality’s mission?<br>
10:04 - Does Google Drive use homomorphic encryption?<br>
13:08 - What homomorphic encryption enables<br>
22:08 - Innovations that Duality is working on<br>
24:37 - Secure data analytics and Homomorphic encryption<br>
31:41 - Impact of AI and LLMs on security and privacy</p>
<p>Links:<br>
Stay in touch with Derek Wood on LinkedIn: <a href='https://www.linkedin.com/in/drwood/'>https://www.linkedin.com/in/drwood/</a></p>
<p>Learn more about Duality Technologies: <br>
<a href='https://dualitytech.com/'>https://dualitytech.com/</a> <br>
Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio.com'>https://www.patreon.com/hackervalleystudio.com</a> <br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> <br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> <br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hez7bp/Duality_Podcastbcmat.mp3" length="96181819" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Chris and Ron interview Derek Wood from Duality Technologies, a leading privacy technology company to discuss the concept of homomorphic encryption and its significance in data security, privacy, and governance.
Homomorphic encryption enables users to perform computations on encrypted data without exposing it, revolutionizing the way data is used and analyzed. In this episode, the group discusses the challenges in the current data landscape, the importance of security and privacy, and the potential impact of duality's solutions in various industries such as finance and healthcare.
Check out Duality’s webinar, Why Data, Privacy, &amp; Security Leaders are Key to Growth &amp; Innovation
Impactful Moments:00:00 - Introduction01:09 - What is homomorphic encryption?04:03 - Misconceptions of security and privacy06:25 - What is Duality’s mission?10:04 - Does Google Drive use homomorphic encryption?13:08 - What homomorphic encryption enables22:08 - Innovations that Duality is working on24:37 - Secure data analytics and Homomorphic encryption31:41 - Impact of AI and LLMs on security and privacy
Links:Stay in touch with Derek Wood on LinkedIn: https://www.linkedin.com/in/drwood/
Learn more about Duality Technologies: https://dualitytech.com/ Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2219</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>287</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Future of AI In Cybersecurity</title>
        <itunes:title>The Future of AI In Cybersecurity</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-future-of-ai-in-cybersecurity/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-future-of-ai-in-cybersecurity/#comments</comments>        <pubDate>Tue, 27 Jun 2023 06:39:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6e4bc47a-abd3-3602-bb07-b9c6abda1a47</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris explore the vast potential of AI in cybersecurity, including its ability to develop cybersecurity solutions, provide recommendations and predictions for cyber practitioners, and even assist attackers in identifying vulnerabilities and creating exploits. 

Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Impactful Moments:
00:00 - Introduction
00:56 - The future of AI in cybersecurity
02:24 - Addressing the elephant in the room
03:15 - Amplifying your productivity 
05:13 - AI & vulnerability management
09:00 - Remediating vulnerabilities with AI
11:41 - Join our community! 
12:32 - Coding, building, & developing
18:13 - Final thoughts</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris explore the vast potential of AI in cybersecurity, including its ability to develop cybersecurity solutions, provide recommendations and predictions for cyber practitioners, and even assist attackers in identifying vulnerabilities and creating exploits. <br>
<br>
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.com<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Impactful Moments:<br>
00:00 - Introduction<br>
00:56 - The future of AI in cybersecurity<br>
02:24 - Addressing the elephant in the room<br>
03:15 - Amplifying your productivity <br>
05:13 - AI & vulnerability management<br>
09:00 - Remediating vulnerabilities with AI<br>
11:41 - Join our community! <br>
12:32 - Coding, building, & developing<br>
18:13 - Final thoughts</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wzgukd/HV_Fututre_of_AI_in_Cybersecurityb1aeq.mp3" length="46591350" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris explore the vast potential of AI in cybersecurity, including its ability to develop cybersecurity solutions, provide recommendations and predictions for cyber practitioners, and even assist attackers in identifying vulnerabilities and creating exploits. Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio.comBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:00:00 - Introduction00:56 - The future of AI in cybersecurity02:24 - Addressing the elephant in the room03:15 - Amplifying your productivity 05:13 - AI & vulnerability management09:00 - Remediating vulnerabilities with AI11:41 - Join our community! 12:32 - Coding, building, & developing18:13 - Final thoughts]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1156</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>286</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Vulnerability Hunting &amp; AI with Brian Contos</title>
        <itunes:title>Vulnerability Hunting &amp; AI with Brian Contos</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/vulnerability-hunting-ai-with-brian-contos/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/vulnerability-hunting-ai-with-brian-contos/#comments</comments>        <pubDate>Tue, 20 Jun 2023 05:53:38 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/044803ae-1de6-3260-a427-87f79e504725</guid>
                                    <description><![CDATA[<p>In this episode, hosts Ron and Chris are joined by Brian Contos, Chief Strategy Officer at Sevco to discuss his “movie-like” career trajectory and the rise of artificial intelligence (AI) in cybersecurity. With two IPOs and eight acquisitions under his career belt, Brian expresses his passion for startups and how getting out of his comfort zone transformed his business knowledge. The group also dives into the rise of artificial intelligence and how it will revolutionize the cybersecurity landscape.</p>
<p>Stay in touch with Brian Contos: https://www.linkedin.com/in/briancontos/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleys...
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
<p>Impactful Moments:
00:00 - Intro
01:09 - Introducing Brian Contos
04:03 - Brian’s passion for startups
06:13 - Emerging tech & AI
07:50 - The intersection of AI & cybersecurity 
09:50 - The future impacts of AI
10:58 - How will AI enhance cybersecurity?
15:02 - Data assessment vs data integration
17:46 - Join our community!
18:48 - Getting out of your comfort zone
21:21 - Small touches lead to big finishes</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, hosts Ron and Chris are joined by Brian Contos, Chief Strategy Officer at Sevco to discuss his “movie-like” career trajectory and the rise of artificial intelligence (AI) in cybersecurity. With two IPOs and eight acquisitions under his career belt, Brian expresses his passion for startups and how getting out of his comfort zone transformed his business knowledge. The group also dives into the rise of artificial intelligence and how it will revolutionize the cybersecurity landscape.</p>
<p>Stay in touch with Brian Contos: https://www.linkedin.com/in/briancontos/<br>
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleys...<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com<br>
Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
<p>Impactful Moments:<br>
00:00 - Intro<br>
01:09 - Introducing Brian Contos<br>
04:03 - Brian’s passion for startups<br>
06:13 - Emerging tech & AI<br>
07:50 - The intersection of AI & cybersecurity <br>
09:50 - The future impacts of AI<br>
10:58 - How will AI enhance cybersecurity?<br>
15:02 - Data assessment vs data integration<br>
17:46 - Join our community!<br>
18:48 - Getting out of your comfort zone<br>
21:21 - Small touches lead to big finishes</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6ykxfs/Brian_Contos6bmn4.mp3" length="58404268" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, hosts Ron and Chris are joined by Brian Contos, Chief Strategy Officer at Sevco to discuss his “movie-like” career trajectory and the rise of artificial intelligence (AI) in cybersecurity. With two IPOs and eight acquisitions under his career belt, Brian expresses his passion for startups and how getting out of his comfort zone transformed his business knowledge. The group also dives into the rise of artificial intelligence and how it will revolutionize the cybersecurity landscape.
Stay in touch with Brian Contos: https://www.linkedin.com/in/briancontos/Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleys...Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:00:00 - Intro01:09 - Introducing Brian Contos04:03 - Brian’s passion for startups06:13 - Emerging tech & AI07:50 - The intersection of AI & cybersecurity 09:50 - The future impacts of AI10:58 - How will AI enhance cybersecurity?15:02 - Data assessment vs data integration17:46 - Join our community!18:48 - Getting out of your comfort zone21:21 - Small touches lead to big finishes]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1451</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>285</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Balancing Work &amp; Parenting In Cybersecurity</title>
        <itunes:title>Balancing Work &amp; Parenting In Cybersecurity</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/balancing-work-parenting-in-cybersecurity/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/balancing-work-parenting-in-cybersecurity/#comments</comments>        <pubDate>Tue, 13 Jun 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1d5c95be-07fa-3178-a6b3-4092cee4e229</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris discuss the challenges of balancing cybersecurity and parenting. Chris, a father of three, shares his experience of being a parent while also working in cybersecurity. They talk about the sacrifices that come with being a parent and how to prioritize family while still maintaining a career in cybersecurity. They also discuss the importance of having a plan but being flexible enough to adapt to unexpected situations. 

</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com/'>https://store.hackervalley.com</a>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>
Impactful Moments:
02:39 - Balancing cybersecurity and parenting
04:27- Maternity/paternity leave in cyber
08:33 - Skills in parenting for cybersecurity
10:36 - Career sacrifices
14:05 Parenting with a support system
17:31- Being more than a parent

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris discuss the challenges of balancing cybersecurity and parenting. Chris, a father of three, shares his experience of being a parent while also working in cybersecurity. They talk about the sacrifices that come with being a parent and how to prioritize family while still maintaining a career in cybersecurity. They also discuss the importance of having a plan but being flexible enough to adapt to unexpected situations. <br>
<br>
</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a><br>
Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com/'>https://store.hackervalley.com</a><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p><br>
Impactful Moments:<br>
02:39 - Balancing cybersecurity and parenting<br>
04:27- Maternity/paternity leave in cyber<br>
08:33 - Skills in parenting for cybersecurity<br>
10:36 - Career sacrifices<br>
14:05 Parenting with a support system<br>
17:31- Being more than a parent<br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qgphi8/Parenting_in_Cybersecurityaax5b.mp3" length="49594923" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris discuss the challenges of balancing cybersecurity and parenting. Chris, a father of three, shares his experience of being a parent while also working in cybersecurity. They talk about the sacrifices that come with being a parent and how to prioritize family while still maintaining a career in cybersecurity. They also discuss the importance of having a plan but being flexible enough to adapt to unexpected situations. 
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudioBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.comContinue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:02:39 - Balancing cybersecurity and parenting04:27- Maternity/paternity leave in cyber08:33 - Skills in parenting for cybersecurity10:36 - Career sacrifices14:05 Parenting with a support system17:31- Being more than a parent]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1227</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>284</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What Is Security Architecture?</title>
        <itunes:title>What Is Security Architecture?</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-is-security-architecture/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-is-security-architecture/#comments</comments>        <pubDate>Tue, 06 Jun 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e00ebcd5-40db-3b32-be58-5445a9e9c446</guid>
                                    <description><![CDATA[<p>In this episode of Hacker Valley Studio, Ron and Chris take a deep dive into all things Security Architecture and the essential skills you need to thrive in your role. Ron shares insights from his personal journey into security architecture as well as his expert advice on how to break in and stand out in the field. 

</p>
<p>Links:</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a>

</p>
<p>Impactful Moments:</p>
<p>01:22 - What is Security Architecture?</p>
<p>03:04 - Day in the life of a security architect</p>
<p>04:01 - Different types of security architects</p>
<p>06:01 - Ron’s journey into security architecture</p>
<p>07:49 - What skills do you need?</p>
<p>08:40 - Join our community!</p>
<p>09:21 - Ron’s best practices</p>
<p>10:24 - Finding the right solutions</p>
<p>11:36 - What is the salary potential?</p>
<p>12:59 - How to stand out</p>
<p>13:52 - Advice for those breaking into the field</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Hacker Valley Studio, Ron and Chris take a deep dive into all things Security Architecture and the essential skills you need to thrive in your role. Ron shares insights from his personal journey into security architecture as well as his expert advice on how to break in and stand out in the field. <br>
<br>
</p>
<p>Links:</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a><br>
<br>
</p>
<p>Impactful Moments:</p>
<p>01:22 - What is Security Architecture?</p>
<p>03:04 - Day in the life of a security architect</p>
<p>04:01 - Different types of security architects</p>
<p>06:01 - Ron’s journey into security architecture</p>
<p>07:49 - What skills do you need?</p>
<p>08:40 - Join our community!</p>
<p>09:21 - Ron’s best practices</p>
<p>10:24 - Finding the right solutions</p>
<p>11:36 - What is the salary potential?</p>
<p>12:59 - How to stand out</p>
<p>13:52 - Advice for those breaking into the field</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mrrjry/What_is_Security_Architecture6mqwd.mp3" length="38009828" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley Studio, Ron and Chris take a deep dive into all things Security Architecture and the essential skills you need to thrive in your role. Ron shares insights from his personal journey into security architecture as well as his expert advice on how to break in and stand out in the field. 
Links:
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:
01:22 - What is Security Architecture?
03:04 - Day in the life of a security architect
04:01 - Different types of security architects
06:01 - Ron’s journey into security architecture
07:49 - What skills do you need?
08:40 - Join our community!
09:21 - Ron’s best practices
10:24 - Finding the right solutions
11:36 - What is the salary potential?
12:59 - How to stand out
13:52 - Advice for those breaking into the field
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>940</itunes:duration>
                <itunes:episode>283</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Technical Dojos: Cultivating Skills and Navigating Change in Cybersecurity</title>
        <itunes:title>Technical Dojos: Cultivating Skills and Navigating Change in Cybersecurity</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/technical-dojos-cultivating-skills-and-navigating-change-in-cybersecurity/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/technical-dojos-cultivating-skills-and-navigating-change-in-cybersecurity/#comments</comments>        <pubDate>Tue, 30 May 2023 05:05:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/eaf37869-c83c-3c62-9d72-fbb85bf73d2f</guid>
                                    <description><![CDATA[<p>In this cybersecurity podcast episode, Chris Cochran and Ron Eddings discuss the concept of 'dojos' as environments for growth and learning, drawing on experiences from their own career paths in cybersecurity. The 'dojo' metaphor is applied to various life experiences, with an emphasis on cybersecurity communities and events. Chris describes his journey to the west coast where he lived in a hacker house, a form of dojo where he, along with his roommates, focused on cybersecurity, technology, personal growth, and development. This life-changing experience spurred the creation of their podcast.</p>
<p>Links: Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a> Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Impactful Moments:</p>
<p>0:00 - Intro</p>
<p>00:55 - What is a dojo?</p>
<p>02:25 - Technical/cybersecurity dojos</p>
<p>05:17 - Getting started</p>
<p>07:21 - What should you look for in a dojo community?</p>
<p>09:06 - How to level up and give back</p>
<p>10:14 - Join our community!</p>
<p>11:36 - When is it time to move on?</p>
<p>12:50 - Learning hurts - embrace it!</p>
<p>13:59 - What’s your next dojo?</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this cybersecurity podcast episode, Chris Cochran and Ron Eddings discuss the concept of 'dojos' as environments for growth and learning, drawing on experiences from their own career paths in cybersecurity. The 'dojo' metaphor is applied to various life experiences, with an emphasis on cybersecurity communities and events. Chris describes his journey to the west coast where he lived in a hacker house, a form of dojo where he, along with his roommates, focused on cybersecurity, technology, personal growth, and development. This life-changing experience spurred the creation of their podcast.</p>
<p>Links: Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a> Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a> Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a> Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Impactful Moments:</p>
<p>0:00 - Intro</p>
<p>00:55 - What is a dojo?</p>
<p>02:25 - Technical/cybersecurity dojos</p>
<p>05:17 - Getting started</p>
<p>07:21 - What should you look for in a dojo community?</p>
<p>09:06 - How to level up and give back</p>
<p>10:14 - Join our community!</p>
<p>11:36 - When is it time to move on?</p>
<p>12:50 - Learning hurts - embrace it!</p>
<p>13:59 - What’s your next dojo?</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ux3r2a/HV_Dojob8wxp.mp3" length="38564583" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this cybersecurity podcast episode, Chris Cochran and Ron Eddings discuss the concept of 'dojos' as environments for growth and learning, drawing on experiences from their own career paths in cybersecurity. The 'dojo' metaphor is applied to various life experiences, with an emphasis on cybersecurity communities and events. Chris describes his journey to the west coast where he lived in a hacker house, a form of dojo where he, along with his roommates, focused on cybersecurity, technology, personal growth, and development. This life-changing experience spurred the creation of their podcast.
Links: Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:
0:00 - Intro
00:55 - What is a dojo?
02:25 - Technical/cybersecurity dojos
05:17 - Getting started
07:21 - What should you look for in a dojo community?
09:06 - How to level up and give back
10:14 - Join our community!
11:36 - When is it time to move on?
12:50 - Learning hurts - embrace it!
13:59 - What’s your next dojo?]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>953</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>282</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Attack Surface Management: The Grit Needed for True Cyber Resilience with Nabil Hannan</title>
        <itunes:title>Attack Surface Management: The Grit Needed for True Cyber Resilience with Nabil Hannan</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/attack-surface-management-the-grit-needed-for-true-cyber-resilience-with-nabil-hannan/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/attack-surface-management-the-grit-needed-for-true-cyber-resilience-with-nabil-hannan/#comments</comments>        <pubDate>Tue, 23 May 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ce6389d7-74ce-3111-a1a3-76abfd381c31</guid>
                                    <description><![CDATA[<p>Join hosts Ron and Chris as they dive into the world of Attack Surface Management (ASM) in this episode recorded live at RSAC 2023. Special guest Nabil Hannan, a seasoned industry expert and Field CISO at NetSPI, shares his wealth of knowledge and expertise in this critical field. Together, they explore the evolving landscape of ASM, highlighting NetSPI's unique approach compared to other solution providers and shedding light on the state of ASM to empower listeners to enhance their security posture.

NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='https://www.netspi.com/HVM'>https://www.netspi.com/HVM</a>

Links: 
Connect with Nabil Hannan on LinkedIn: <a href='https://www.linkedin.com/in/nhannan/'>https://www.linkedin.com/in/nhannan/ </a>
Connect with us on LinkedIn: <a href='https://www.linkedin.com/company/hackervalleystudio'>https://www.linkedin.com/company/hackervalleystudio </a>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a>

</p>
<p>Impactful Moments:</p>
<p>01:08 - Introducing Nabil Hannan</p>
<p>01:25 - Relationship-building through play</p>
<p>04:39 - The power of authenticity</p>
<p>05:39 - What is a Field CISO?</p>
<p>07:02 - The rise of attack surface management</p>
<p>09:17 - What makes NetSPI different?</p>
<p>11:26 - A word from our sponsor</p>
<p>12:17 - Attack surface management for SMBs</p>
<p>15:15 - ASM solutions & false positives</p>
<p>17:16 - An ASM case study</p>
<p>21:15 - Red teaming influence on ASM</p>
<p>24:12 - Where do I get started with ASM?</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Join hosts Ron and Chris as they dive into the world of Attack Surface Management (ASM) in this episode recorded live at RSAC 2023. Special guest Nabil Hannan, a seasoned industry expert and Field CISO at NetSPI, shares his wealth of knowledge and expertise in this critical field. Together, they explore the evolving landscape of ASM, highlighting NetSPI's unique approach compared to other solution providers and shedding light on the state of ASM to empower listeners to enhance their security posture.<br>
<br>
NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='https://www.netspi.com/HVM'>https://www.netspi.com/HVM</a><br>
<br>
Links: <br>
Connect with Nabil Hannan on LinkedIn: <a href='https://www.linkedin.com/in/nhannan/'>https://www.linkedin.com/in/nhannan/ </a><br>
Connect with us on LinkedIn: <a href='https://www.linkedin.com/company/hackervalleystudio'>https://www.linkedin.com/company/hackervalleystudio </a><br>
Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com </a><br>
Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a><br>
<br>
</p>
<p>Impactful Moments:</p>
<p>01:08 - Introducing Nabil Hannan</p>
<p>01:25 - Relationship-building through play</p>
<p>04:39 - The power of authenticity</p>
<p>05:39 - What is a Field CISO?</p>
<p>07:02 - The rise of attack surface management</p>
<p>09:17 - What makes NetSPI different?</p>
<p>11:26 - A word from our sponsor</p>
<p>12:17 - Attack surface management for SMBs</p>
<p>15:15 - ASM solutions & false positives</p>
<p>17:16 - An ASM case study</p>
<p>21:15 - Red teaming influence on ASM</p>
<p>24:12 - Where do I get started with ASM?</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/g89yv8/NetSPI_Nabil_Hannan9f2dl.mp3" length="62116101" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Join hosts Ron and Chris as they dive into the world of Attack Surface Management (ASM) in this episode recorded live at RSAC 2023. Special guest Nabil Hannan, a seasoned industry expert and Field CISO at NetSPI, shares his wealth of knowledge and expertise in this critical field. Together, they explore the evolving landscape of ASM, highlighting NetSPI's unique approach compared to other solution providers and shedding light on the state of ASM to empower listeners to enhance their security posture.NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at https://www.netspi.com/HVMLinks: Connect with Nabil Hannan on LinkedIn: https://www.linkedin.com/in/nhannan/ Connect with us on LinkedIn: https://www.linkedin.com/company/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:
01:08 - Introducing Nabil Hannan
01:25 - Relationship-building through play
04:39 - The power of authenticity
05:39 - What is a Field CISO?
07:02 - The rise of attack surface management
09:17 - What makes NetSPI different?
11:26 - A word from our sponsor
12:17 - Attack surface management for SMBs
15:15 - ASM solutions & false positives
17:16 - An ASM case study
21:15 - Red teaming influence on ASM
24:12 - Where do I get started with ASM?]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1539</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>281</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>A Tale of Two Risks: Third-Party and SaaS Security</title>
        <itunes:title>A Tale of Two Risks: Third-Party and SaaS Security</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/a-tale-of-two-risks-third-party-and-saas-security/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/a-tale-of-two-risks-third-party-and-saas-security/#comments</comments>        <pubDate>Tue, 16 May 2023 09:10:14 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fb54d237-f9dd-3883-8701-cd232f847625</guid>
                                    <description><![CDATA[<p>In this episode, hosts Ron and Chris are joined by Paul Valente, CEO and co-founder of VISO Trust, and Bryan Wong, Sr. Security Analyst at Headspace, as they dive into the world of third-party risk in cybersecurity. With conversations ranging from the current state of third-party risk to identifying trustworthy vendors such as VISO Trust, they'll provide insights into how organizations manage partnerships in a scalable and secure way.

Say goodbye to frustration and hello to peace of mind with VISO TRUST! Visit <a href='https://visotrust.com/hackervalley/'>https://visotrust.com/hackervalley/</a> to learn how to transform your third-party risk management program.

</p>
<p>Links:</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a>

</p>
<p>Impactful Moments:</p>
<p>01:03 - Introducing Paul Valente & Bryan Wong</p>
<p>01:54 - The current state of third-party risk</p>
<p>02:46 - VISTO Trust — trust through transparency</p>
<p>04:43 - Headspace’s approach to 3rd party providers</p>
<p>05:23 - Managing risk successfully</p>
<p>07:44 - There’s a better way!</p>
<p>09:04 - Risk assessment & procurement</p>
<p>11:37 - VISO Trust & Headspace’s approach to AI</p>
<p>14:43 - A word from our sponsor</p>
<p>15:26 - The challenges of complete visibility</p>
<p>17:16 - Continuous, automated due diligence</p>
<p>18:52 - Identifying trustworthy vendors</p>
<p>21:34 - Doing more with less/cost-effectiveness</p>
<p>23:22 - Is 100% automation doable?</p>
<p>24:20 - You can have your cake and eat it too with third-parties</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, hosts Ron and Chris are joined by Paul Valente, CEO and co-founder of VISO Trust, and Bryan Wong, Sr. Security Analyst at Headspace, as they dive into the world of third-party risk in cybersecurity. With conversations ranging from the current state of third-party risk to identifying trustworthy vendors such as VISO Trust, they'll provide insights into how organizations manage partnerships in a scalable and secure way.<br>
<br>
Say goodbye to frustration and hello to peace of mind with VISO TRUST! Visit <a href='https://visotrust.com/hackervalley/'>https://visotrust.com/hackervalley/</a> to learn how to transform your third-party risk management program.<br>
<br>
</p>
<p>Links:</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a><br>
<br>
</p>
<p>Impactful Moments:</p>
<p>01:03 - Introducing Paul Valente & Bryan Wong</p>
<p>01:54 - The current state of third-party risk</p>
<p>02:46 - VISTO Trust — trust through transparency</p>
<p>04:43 - Headspace’s approach to 3rd party providers</p>
<p>05:23 - Managing risk successfully</p>
<p>07:44 - There’s a better way!</p>
<p>09:04 - Risk assessment & procurement</p>
<p>11:37 - VISO Trust & Headspace’s approach to AI</p>
<p>14:43 - A word from our sponsor</p>
<p>15:26 - The challenges of complete visibility</p>
<p>17:16 - Continuous, automated due diligence</p>
<p>18:52 - Identifying trustworthy vendors</p>
<p>21:34 - Doing more with less/cost-effectiveness</p>
<p>23:22 - Is 100% automation doable?</p>
<p>24:20 - You can have your cake and eat it too with third-parties</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nbaufp/A_Tale_of_Two_Risks-_VISO_Trust8rjns.mp3" length="62302604" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, hosts Ron and Chris are joined by Paul Valente, CEO and co-founder of VISO Trust, and Bryan Wong, Sr. Security Analyst at Headspace, as they dive into the world of third-party risk in cybersecurity. With conversations ranging from the current state of third-party risk to identifying trustworthy vendors such as VISO Trust, they'll provide insights into how organizations manage partnerships in a scalable and secure way.Say goodbye to frustration and hello to peace of mind with VISO TRUST! Visit https://visotrust.com/hackervalley/ to learn how to transform your third-party risk management program.
Links:
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:
01:03 - Introducing Paul Valente & Bryan Wong
01:54 - The current state of third-party risk
02:46 - VISTO Trust — trust through transparency
04:43 - Headspace’s approach to 3rd party providers
05:23 - Managing risk successfully
07:44 - There’s a better way!
09:04 - Risk assessment & procurement
11:37 - VISO Trust & Headspace’s approach to AI
14:43 - A word from our sponsor
15:26 - The challenges of complete visibility
17:16 - Continuous, automated due diligence
18:52 - Identifying trustworthy vendors
21:34 - Doing more with less/cost-effectiveness
23:22 - Is 100% automation doable?
24:20 - You can have your cake and eat it too with third-parties]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1544</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>280</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Paying the Piper in Cybersecurity: Balancing Success and Personal Life</title>
        <itunes:title>Paying the Piper in Cybersecurity: Balancing Success and Personal Life</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/paying-the-piper-in-cybersecurity-balancing-success-and-personal-life/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/paying-the-piper-in-cybersecurity-balancing-success-and-personal-life/#comments</comments>        <pubDate>Tue, 09 May 2023 05:24:38 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/31e0ed73-0c22-39f5-bbd8-ebe7d31413a6</guid>
                                    <description><![CDATA[<p class="p1">In this episode, Ron Eddings and Chris Cochran discuss the concept of "paying the piper" and its impact on their careers and personal lives. Paying the piper means facing the consequences of one's actions, whether they are good or bad. Chris shares his personal struggles and successes while working at Netflix, where he had to balance his career and family. Ron and Chris also discuss the importance of finding balance in one's life, understanding the consequences of one's actions, and recognizing the impact of one's legacy on both their family and the world.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Icarus’ Balloon: https://www.linkedin.com/pulse/icarus-balloon-short-story-chris-cochran-chris-cochran</p>
<p class="p1">Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p class="p1">Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p class="p1">Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p class="p1">Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
<p class="p2"> </p>
<p class="p1">Impactful Moments:</p>
<p class="p1">00:00 - Introduction</p>
<p class="p1">01:18 - What does it mean to ‘pay the piper’?</p>
<p class="p1">03:22 - Sacrifices and paying your dues</p>
<p class="p1">05:06 - Icarus’ Balloon</p>
<p class="p1">07:16 - Maintaining a balanced life</p>
<p class="p1">08:36 - Join our community!</p>
<p class="p1">09:40 - What is your legacy?</p>
<p class="p1">13:32 - Conflict = growth</p>
<p class="p1">15:27 - Learning to love the process</p>
<p class="p1">18:05 - The power of exploration</p>
<p class="p1">19:34 - Staying committed</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, Ron Eddings and Chris Cochran discuss the concept of "paying the piper" and its impact on their careers and personal lives. Paying the piper means facing the consequences of one's actions, whether they are good or bad. Chris shares his personal struggles and successes while working at Netflix, where he had to balance his career and family. Ron and Chris also discuss the importance of finding balance in one's life, understanding the consequences of one's actions, and recognizing the impact of one's legacy on both their family and the world.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Icarus’ Balloon: https://www.linkedin.com/pulse/icarus-balloon-short-story-chris-cochran-chris-cochran</p>
<p class="p1">Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio</p>
<p class="p1">Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/</p>
<p class="p1">Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
<p class="p1">Continue the conversation by joining our Discord: https://hackervalley.com/discord</p>
<p class="p2"> </p>
<p class="p1">Impactful Moments:</p>
<p class="p1">00:00 - Introduction</p>
<p class="p1">01:18 - What does it mean to ‘pay the piper’?</p>
<p class="p1">03:22 - Sacrifices and paying your dues</p>
<p class="p1">05:06 - Icarus’ Balloon</p>
<p class="p1">07:16 - Maintaining a balanced life</p>
<p class="p1">08:36 - Join our community!</p>
<p class="p1">09:40 - What is your legacy?</p>
<p class="p1">13:32 - Conflict = growth</p>
<p class="p1">15:27 - Learning to love the process</p>
<p class="p1">18:05 - The power of exploration</p>
<p class="p1">19:34 - Staying committed</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dfkb5m/HV_Paying_the_Piperakor4.mp3" length="52157763" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron Eddings and Chris Cochran discuss the concept of "paying the piper" and its impact on their careers and personal lives. Paying the piper means facing the consequences of one's actions, whether they are good or bad. Chris shares his personal struggles and successes while working at Netflix, where he had to balance his career and family. Ron and Chris also discuss the importance of finding balance in one's life, understanding the consequences of one's actions, and recognizing the impact of one's legacy on both their family and the world.
 
Links:
Icarus’ Balloon: https://www.linkedin.com/pulse/icarus-balloon-short-story-chris-cochran-chris-cochran
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
 
Impactful Moments:
00:00 - Introduction
01:18 - What does it mean to ‘pay the piper’?
03:22 - Sacrifices and paying your dues
05:06 - Icarus’ Balloon
07:16 - Maintaining a balanced life
08:36 - Join our community!
09:40 - What is your legacy?
13:32 - Conflict = growth
15:27 - Learning to love the process
18:05 - The power of exploration
19:34 - Staying committed]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1291</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>279</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>CISO Burnout and Gaps in Cybersecurity Detections with Jack Roehrig</title>
        <itunes:title>CISO Burnout and Gaps in Cybersecurity Detections with Jack Roehrig</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/ciso-burnout-and-gaps-in-cybersecurity-detections-with-jack-roehrig/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/ciso-burnout-and-gaps-in-cybersecurity-detections-with-jack-roehrig/#comments</comments>        <pubDate>Tue, 02 May 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/0be0c30a-e662-3d6d-8a73-361f29d5a11f</guid>
                                    <description><![CDATA[<p>In this podcast episode, Jack Roehrig, Technology Evangelist at Uptycs, discusses his experience with burnout and health issues due to his job as a Chief Information Security Officer (CISO). Jack has always known health is wealth and retired to Mexico for a few months to recover from his burnout. Despite telling himself he wouldn't work again, Jack discovered Uptycs, a leading XDR platform that has the opportunity to change cybersecurity and joined their team as Technology Evangelist. Links: Follow Jack Roehrig on</p>
<p>LinkedIn: <a href='https://www.linkedin.com/in/jackery/'>https://www.linkedin.com/in/jackery/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Impactful Moments:</p>
<p>00:00 - Introducing Jack Roehrig</p>
<p>01:40 - Jack’s security origin story</p>
<p>04:50 - The harsh realities of burnout in tech</p>
<p>05:33 - Finding peace in Mexico</p>
<p>07:51 - Working for your purpose</p>
<p>11:26 - From risk aversion to risk tolerance</p>
<p>13:51 - Join our community!</p>
<p>15:37 - Falling in love with XDR</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this podcast episode, Jack Roehrig, Technology Evangelist at Uptycs, discusses his experience with burnout and health issues due to his job as a Chief Information Security Officer (CISO). Jack has always known health is wealth and retired to Mexico for a few months to recover from his burnout. Despite telling himself he wouldn't work again, Jack discovered Uptycs, a leading XDR platform that has the opportunity to change cybersecurity and joined their team as Technology Evangelist. Links: Follow Jack Roehrig on</p>
<p>LinkedIn: <a href='https://www.linkedin.com/in/jackery/'>https://www.linkedin.com/in/jackery/</a></p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p>Impactful Moments:</p>
<p>00:00 - Introducing Jack Roehrig</p>
<p>01:40 - Jack’s security origin story</p>
<p>04:50 - The harsh realities of burnout in tech</p>
<p>05:33 - Finding peace in Mexico</p>
<p>07:51 - Working for your purpose</p>
<p>11:26 - From risk aversion to risk tolerance</p>
<p>13:51 - Join our community!</p>
<p>15:37 - Falling in love with XDR</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xggm7i/HV_Jack_Roehrig7kdl1.mp3" length="55030009" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this podcast episode, Jack Roehrig, Technology Evangelist at Uptycs, discusses his experience with burnout and health issues due to his job as a Chief Information Security Officer (CISO). Jack has always known health is wealth and retired to Mexico for a few months to recover from his burnout. Despite telling himself he wouldn't work again, Jack discovered Uptycs, a leading XDR platform that has the opportunity to change cybersecurity and joined their team as Technology Evangelist. Links: Follow Jack Roehrig on
LinkedIn: https://www.linkedin.com/in/jackery/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Impactful Moments:
00:00 - Introducing Jack Roehrig
01:40 - Jack’s security origin story
04:50 - The harsh realities of burnout in tech
05:33 - Finding peace in Mexico
07:51 - Working for your purpose
11:26 - From risk aversion to risk tolerance
13:51 - Join our community!
15:37 - Falling in love with XDR]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1365</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>278</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Critical Role of Empathy in Cybersecurity with Tracy Maleeff</title>
        <itunes:title>The Critical Role of Empathy in Cybersecurity with Tracy Maleeff</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-critical-role-of-empathy-in-cybersecurity-with-tracy-maleeff/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-critical-role-of-empathy-in-cybersecurity-with-tracy-maleeff/#comments</comments>        <pubDate>Tue, 25 Apr 2023 05:07:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7876b3b0-1c0b-3bd8-8475-ec376ff5041c</guid>
                                    <description><![CDATA[<p>In this episode, we explore the often-overlooked importance of empathy in the cybersecurity field. Our guest, Tracy Maleeff, shares her personal journey from community involvement to the industry and discusses how embracing empathy can lead to more effective threat intelligence and a stronger cybersecurity community.</p>
<p> </p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:42 - Tracy’s volunteer and community participation</p>
<p>05:58 - Empathy in cybersecurity, or lack thereof</p>
<p>10:36 - How to bring more empathy into cybersecurity</p>
<p>13:21 - Tracy’s threat intelligence aspirations</p>
<p>18:46 - Identifying the “perfect” employer</p>
<p>20:19 - Diversity of thought and empathy</p>
<p>22:44 - Farewell and outro</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we explore the often-overlooked importance of empathy in the cybersecurity field. Our guest, Tracy Maleeff, shares her personal journey from community involvement to the industry and discusses how embracing empathy can lead to more effective threat intelligence and a stronger cybersecurity community.</p>
<p> </p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio</a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p> </p>
<p>Impactful Moments:</p>
<p>00:00 - Introduction</p>
<p>01:42 - Tracy’s volunteer and community participation</p>
<p>05:58 - Empathy in cybersecurity, or lack thereof</p>
<p>10:36 - How to bring more empathy into cybersecurity</p>
<p>13:21 - Tracy’s threat intelligence aspirations</p>
<p>18:46 - Identifying the “perfect” employer</p>
<p>20:19 - Diversity of thought and empathy</p>
<p>22:44 - Farewell and outro</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/skyxtd/Tracy_Maleeff6u0x3.mp3" length="56675390" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we explore the often-overlooked importance of empathy in the cybersecurity field. Our guest, Tracy Maleeff, shares her personal journey from community involvement to the industry and discusses how embracing empathy can lead to more effective threat intelligence and a stronger cybersecurity community.
 
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
 
Impactful Moments:
00:00 - Introduction
01:42 - Tracy’s volunteer and community participation
05:58 - Empathy in cybersecurity, or lack thereof
10:36 - How to bring more empathy into cybersecurity
13:21 - Tracy’s threat intelligence aspirations
18:46 - Identifying the “perfect” employer
20:19 - Diversity of thought and empathy
22:44 - Farewell and outro]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1406</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>277</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>RSA With Purpose: Sealing Deals, Getting Hired, and Networking with Industry Leaders</title>
        <itunes:title>RSA With Purpose: Sealing Deals, Getting Hired, and Networking with Industry Leaders</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/rsa-with-purpose-sealing-deals-getting-hired-and-networking-with-industry-leaders/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/rsa-with-purpose-sealing-deals-getting-hired-and-networking-with-industry-leaders/#comments</comments>        <pubDate>Tue, 18 Apr 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/dae3cb84-8f8e-36e8-98ba-75caa815d5e8</guid>
                                    <description><![CDATA[<p>Head into RSA 2023 with a purpose. This episode is all about how to reach a win-win when sealing deals, getting hired, and networking.
If you want to catch up with the Hacker Valley Team during RSA be sure to jump into our discord. You can join by going to hackervalley.com/discord</p>
<p>Impactful Moments
00:00 - Intro
01:28 - Recapping our first time at RSA
03:02 - The 4 types of interactions 
05:27 - Purposeful relationship building
06:57 - The vendor experience at RSA
08:51 - Opportunities and mutual benefiting
12:20 - Join our community!
13:20 - Find your new role at RSA
17:02 - Who inspires us?
18:19 - Tips on making new connections
23:28 - Come meet us at RSA!</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Head into RSA 2023 with a purpose. This episode is all about how to reach a win-win when sealing deals, getting hired, and networking.<br>
If you want to catch up with the Hacker Valley Team during RSA be sure to jump into our discord. You can join by going to hackervalley.com/discord</p>
<p>Impactful Moments<br>
00:00 - Intro<br>
01:28 - Recapping our first time at RSA<br>
03:02 - The 4 types of interactions <br>
05:27 - Purposeful relationship building<br>
06:57 - The vendor experience at RSA<br>
08:51 - Opportunities and mutual benefiting<br>
12:20 - Join our community!<br>
13:20 - Find your new role at RSA<br>
17:02 - Who inspires us?<br>
18:19 - Tips on making new connections<br>
23:28 - Come meet us at RSA!</p>
<p>Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio<br>
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/<br>
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qah82h/RSA_with_Purpose8jj8m.mp3" length="58571224" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Head into RSA 2023 with a purpose. This episode is all about how to reach a win-win when sealing deals, getting hired, and networking.If you want to catch up with the Hacker Valley Team during RSA be sure to jump into our discord. You can join by going to hackervalley.com/discord
Impactful Moments00:00 - Intro01:28 - Recapping our first time at RSA03:02 - The 4 types of interactions 05:27 - Purposeful relationship building06:57 - The vendor experience at RSA08:51 - Opportunities and mutual benefiting12:20 - Join our community!13:20 - Find your new role at RSA17:02 - Who inspires us?18:19 - Tips on making new connections23:28 - Come meet us at RSA!
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudioBecome a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1456</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>276</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Mastering Focus with Simone Biles and Amy Bream at RSA</title>
        <itunes:title>Mastering Focus with Simone Biles and Amy Bream at RSA</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/mastering-focus-in-high-intensity-situations-with-simone-biles-and-amy-bream-at-rsa/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/mastering-focus-in-high-intensity-situations-with-simone-biles-and-amy-bream-at-rsa/#comments</comments>        <pubDate>Tue, 11 Apr 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/76932258-ebab-3328-9492-b3f722ac34c5</guid>
                                    <description><![CDATA[<p>RSA is right around the corner and we’re so excited because it’s one of our big opportunities to meet with you, our dedicated listener. If you want to catch up with the Hacker Valley Team be sure to jump into our discord. You can join by going to <a href='http://hackervalley.com/discord'>hackervalley.com/discord</a></p>
 
<p>Impactful Moments:</p>
<p>00:00 - Intro</p>
<p>01:24 - Introducing Amy Bream & Simone Biles</p>
<p>02:50 - What’s it like being at a cybersecurity conference?</p>
<p>04:20 - Persevering through adversity</p>
<p>05:28 - Consistency — according to Amy & Simone</p>
<p>07:20 - How to overcome imposter syndrome</p>
<p>10:15 - Advice on handling burnout</p>
<p>11:53 - Focus and goal planning</p>
<p>15:09 - Authenticity and staying true to yourself</p>
<p>17:07 - The Axonius partnership — the bridge between athletes and technologists</p>
<p>19:42 - Staying focused in high-intensity environments</p>
<p>22:45 - Simone Biles, as a “person”</p>
<p>24:23 - The mind/body connection</p>
<p>26:55 - Mastering the basics</p>
<p>31:11 - What does legacy mean to you?</p>
 
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>RSA is right around the corner and we’re so excited because it’s one of our big opportunities to meet with you, our dedicated listener. If you want to catch up with the Hacker Valley Team be sure to jump into our discord. You can join by going to <a href='http://hackervalley.com/discord'>hackervalley.com/discord</a></p>
 
<p>Impactful Moments:</p>
<p>00:00 - Intro</p>
<p>01:24 - Introducing Amy Bream & Simone Biles</p>
<p>02:50 - What’s it like being at a cybersecurity conference?</p>
<p>04:20 - Persevering through adversity</p>
<p>05:28 - Consistency — according to Amy & Simone</p>
<p>07:20 - How to overcome imposter syndrome</p>
<p>10:15 - Advice on handling burnout</p>
<p>11:53 - Focus and goal planning</p>
<p>15:09 - Authenticity and staying true to yourself</p>
<p>17:07 - The Axonius partnership — the bridge between athletes and technologists</p>
<p>19:42 - Staying focused in high-intensity environments</p>
<p>22:45 - Simone Biles, as a “person”</p>
<p>24:23 - The mind/body connection</p>
<p>26:55 - Mastering the basics</p>
<p>31:11 - What does legacy mean to you?</p>
 
<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5am4uh/HVS_Simone_Amy_RSA8oi24.mp3" length="85752864" type="audio/mpeg"/>
        <itunes:summary><![CDATA[RSA is right around the corner and we’re so excited because it’s one of our big opportunities to meet with you, our dedicated listener. If you want to catch up with the Hacker Valley Team be sure to jump into our discord. You can join by going to hackervalley.com/discord
 
Impactful Moments:
00:00 - Intro
01:24 - Introducing Amy Bream & Simone Biles
02:50 - What’s it like being at a cybersecurity conference?
04:20 - Persevering through adversity
05:28 - Consistency — according to Amy & Simone
07:20 - How to overcome imposter syndrome
10:15 - Advice on handling burnout
11:53 - Focus and goal planning
15:09 - Authenticity and staying true to yourself
17:07 - The Axonius partnership — the bridge between athletes and technologists
19:42 - Staying focused in high-intensity environments
22:45 - Simone Biles, as a “person”
24:23 - The mind/body connection
26:55 - Mastering the basics
31:11 - What does legacy mean to you?
 
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio 
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2139</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>275</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>What Is Cyber Threat Intelligence and How To Stand Out As Threat Intelligence Analyst</title>
        <itunes:title>What Is Cyber Threat Intelligence and How To Stand Out As Threat Intelligence Analyst</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-is-cyber-threat-intelligence-and-how-to-stand-out-as-threat-intelligence-analyst/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-is-cyber-threat-intelligence-and-how-to-stand-out-as-threat-intelligence-analyst/#comments</comments>        <pubDate>Tue, 04 Apr 2023 05:01:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9f7335e5-f507-3ebe-9a02-1af3e07770e5</guid>
                                    <description><![CDATA[<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Introduction</p>
<p>01:22 - What is Threat Intelligence?</p>
<p>02:17 - How did you get into Threat Intel?</p>
<p>03:20 - All Source vs Threat Intelligence</p>
<p>04:09 - What was the transition into cyber like?</p>
<p>07:03 - What is the salary potential for Threat Intel analysts?</p>
<p>09:00 - What skills do Threat Intel Analysts need?</p>
<p>10:09 - How to answer tough Threat Intel interview questions</p>
<p>10:47 - What does the first day on the job look like?</p>
<p>12:07 - What are the expectations of a Threat Intel Analyst?</p>
<p>13:18 - What expectations should an Intel Analyst have for their employer?</p>
<p>16:51 - Are threat intel feeds valuable?</p>
<p>18:26 - Chris’ first big threat intel “win”</p>
<p>22:24 - How have you changed as an analyst over the years?</p>
<p>24:22 - How to stand out in cybersecurity</p>
<p>27:24 - Advice for those breaking into Cyber Threat Intel</p>
<p> </p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Join our creative mastermind and stand out as a cybersecurity professional: <a href='https://www.patreon.com/hackervalleystudio'>https://www.patreon.com/hackervalleystudio </a></p>
<p>Become a sponsor of the show to amplify your brand: <a href='https://hackervalley.com/work-with-us/'>https://hackervalley.com/work-with-us/</a></p>
<p>Love Hacker Valley Studio? Pick up some swag: <a href='https://store.hackervalley.com'>https://store.hackervalley.com</a></p>
<p>Continue the conversation by joining our Discord: <a href='https://hackervalley.com/discord'>https://hackervalley.com/discord</a></p>
<p> </p>
<p>Impactful Moments</p>
<p>00:00 - Introduction</p>
<p>01:22 - What is Threat Intelligence?</p>
<p>02:17 - How did you get into Threat Intel?</p>
<p>03:20 - All Source vs Threat Intelligence</p>
<p>04:09 - What was the transition into cyber like?</p>
<p>07:03 - What is the salary potential for Threat Intel analysts?</p>
<p>09:00 - What skills do Threat Intel Analysts need?</p>
<p>10:09 - How to answer tough Threat Intel interview questions</p>
<p>10:47 - What does the first day on the job look like?</p>
<p>12:07 - What are the expectations of a Threat Intel Analyst?</p>
<p>13:18 - What expectations should an Intel Analyst have for their employer?</p>
<p>16:51 - Are threat intel feeds valuable?</p>
<p>18:26 - Chris’ first big threat intel “win”</p>
<p>22:24 - How have you changed as an analyst over the years?</p>
<p>24:22 - How to stand out in cybersecurity</p>
<p>27:24 - Advice for those breaking into Cyber Threat Intel</p>
<p> </p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cdg7uw/Threat_Intel8lo5w.mp3" length="70684359" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio 
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
 
Impactful Moments
00:00 - Introduction
01:22 - What is Threat Intelligence?
02:17 - How did you get into Threat Intel?
03:20 - All Source vs Threat Intelligence
04:09 - What was the transition into cyber like?
07:03 - What is the salary potential for Threat Intel analysts?
09:00 - What skills do Threat Intel Analysts need?
10:09 - How to answer tough Threat Intel interview questions
10:47 - What does the first day on the job look like?
12:07 - What are the expectations of a Threat Intel Analyst?
13:18 - What expectations should an Intel Analyst have for their employer?
16:51 - Are threat intel feeds valuable?
18:26 - Chris’ first big threat intel “win”
22:24 - How have you changed as an analyst over the years?
24:22 - How to stand out in cybersecurity
27:24 - Advice for those breaking into Cyber Threat Intel
 
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1758</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>274</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Emerging Cybersecurity Technologies with Jake Reynolds</title>
        <itunes:title>Emerging Cybersecurity Technologies with Jake Reynolds</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/emerging-cybersecurity-technologies-with-jake-reynolds/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/emerging-cybersecurity-technologies-with-jake-reynolds/#comments</comments>        <pubDate>Tue, 28 Mar 2023 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9394ca8e-19f6-378e-b16f-b76239d3fc4b</guid>
                                    <description><![CDATA[<p>Special Thanks to our sponsor NetSPI NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='http://netspi.com/HVM'>http://netspi.com/HVM </a></p>
<p> </p>
<p>This Hacker Valley Studio episode features Jake Reynolds, Head of Emerging Technology @ NetSPI.</p>
<p>We chat with Jake about:</p>
<p>0:00 - Welcome Jake Reynolds</p>
<p>2:30 - What is a full stack engineer?</p>
<p>4:39 - Having a large cybersecurity attack surface</p>
<p>6:00 - Attack surface trends</p>
<p>8:29 - Do cloud engineers need to know networking?</p>
<p>10:12 - Levels of abstraction in the cloud and making sense of it</p>
<p>12:13 - Does bug bounty help you with your job?</p>
<p>15:49 - Will we see network exploits again?</p>
<p>16:53 - Special question from NetSPI</p>
<p>17:31 - Which emerging technologies are you watching?</p>
<p>20:30 - Have we really reached the max of ChatGPT hypes?</p>
<p>24:33 - What AI/ML capability does cybersecurity need?</p>
<p>27:28 - How do we stack the deck against the hackers?

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>...........................</p>
<p>Links:</p>
<p>Connect with Jake Reynolds on <a href='https://www.linkedin.com/in/jreynoldsdev/'>LinkedIn</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Special Thanks to our sponsor NetSPI NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='http://netspi.com/HVM'>http://netspi.com/HVM </a></p>
<p> </p>
<p>This Hacker Valley Studio episode features Jake Reynolds, Head of Emerging Technology @ NetSPI.</p>
<p>We chat with Jake about:</p>
<p>0:00 - Welcome Jake Reynolds</p>
<p>2:30 - What is a full stack engineer?</p>
<p>4:39 - Having a large cybersecurity attack surface</p>
<p>6:00 - Attack surface trends</p>
<p>8:29 - Do cloud engineers need to know networking?</p>
<p>10:12 - Levels of abstraction in the cloud and making sense of it</p>
<p>12:13 - Does bug bounty help you with your job?</p>
<p>15:49 - Will we see network exploits again?</p>
<p>16:53 - Special question from NetSPI</p>
<p>17:31 - Which emerging technologies are you watching?</p>
<p>20:30 - Have we really reached the max of ChatGPT hypes?</p>
<p>24:33 - What AI/ML capability does cybersecurity need?</p>
<p>27:28 - How do we stack the deck against the hackers?<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>...........................</p>
<p>Links:</p>
<p>Connect with Jake Reynolds on <a href='https://www.linkedin.com/in/jreynoldsdev/'>LinkedIn</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pjkyx5/Jake_Reynolds876ge.mp3" length="75449863" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Special Thanks to our sponsor NetSPI NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM 
 
This Hacker Valley Studio episode features Jake Reynolds, Head of Emerging Technology @ NetSPI.
We chat with Jake about:
0:00 - Welcome Jake Reynolds
2:30 - What is a full stack engineer?
4:39 - Having a large cybersecurity attack surface
6:00 - Attack surface trends
8:29 - Do cloud engineers need to know networking?
10:12 - Levels of abstraction in the cloud and making sense of it
12:13 - Does bug bounty help you with your job?
15:49 - Will we see network exploits again?
16:53 - Special question from NetSPI
17:31 - Which emerging technologies are you watching?
20:30 - Have we really reached the max of ChatGPT hypes?
24:33 - What AI/ML capability does cybersecurity need?
27:28 - How do we stack the deck against the hackers?Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
...........................
Links:
Connect with Jake Reynolds on LinkedIn
Purchase an HVS t-shirt at our shop
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Continue the conversation by joining our Discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1875</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>273</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Accelerate Your Cybersecurity Career</title>
        <itunes:title>Accelerate Your Cybersecurity Career</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/accelerate-your-cybersecurity-career/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/accelerate-your-cybersecurity-career/#comments</comments>        <pubDate>Tue, 21 Mar 2023 05:01:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/077b4142-c33d-3878-bde0-c36054cdf321</guid>
                                    <description><![CDATA[





<p>In this episode of the podcast, Ron Eddings and Chris Cochran share insights and tips on how to navigate a career in cybersecurity. They discuss the importance of having the right mindset, finding the right career path, building a network, and negotiating a salary.</p>
<p>Ron and Chris emphasize the value of having a positive attitude and being open to learning and growth. They suggest exploring different areas within cybersecurity to find the best fit for your interests and skills. Additionally, they stress the importance of building a strong network, both online and in-person, to connect with industry professionals and stay up to date on the latest trends and technologies.</p>
<p>Ron offers advice on negotiating a salary and knowing your worth. Ron and Chris also encourage listeners to do their research and interview for multiple jobs to get a sense of market rates for different roles. They also discuss the taboo around discussing salaries in cybersecurity and offer suggestions on how to navigate this sensitive topic.</p>




<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='http://netspi.com/HVM'>http://netspi.com/HVM</a></p>




<p>...........................</p>
<p>Links:</p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>





]]></description>
                                                            <content:encoded><![CDATA[





<p>In this episode of the podcast, Ron Eddings and Chris Cochran share insights and tips on how to navigate a career in cybersecurity. They discuss the importance of having the right mindset, finding the right career path, building a network, and negotiating a salary.</p>
<p>Ron and Chris emphasize the value of having a positive attitude and being open to learning and growth. They suggest exploring different areas within cybersecurity to find the best fit for your interests and skills. Additionally, they stress the importance of building a strong network, both online and in-person, to connect with industry professionals and stay up to date on the latest trends and technologies.</p>
<p>Ron offers advice on negotiating a salary and knowing your worth. Ron and Chris also encourage listeners to do their research and interview for multiple jobs to get a sense of market rates for different roles. They also discuss the taboo around discussing salaries in cybersecurity and offer suggestions on how to navigate this sensitive topic.</p>




<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='http://netspi.com/HVM'>http://netspi.com/HVM</a></p>




<p>...........................</p>
<p>Links:</p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>





]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/57t5py/Accelerate_your_Cybersecurity_Career9gtoa.mp3" length="90513416" type="audio/mpeg"/>
        <itunes:summary><![CDATA[





In this episode of the podcast, Ron Eddings and Chris Cochran share insights and tips on how to navigate a career in cybersecurity. They discuss the importance of having the right mindset, finding the right career path, building a network, and negotiating a salary.
Ron and Chris emphasize the value of having a positive attitude and being open to learning and growth. They suggest exploring different areas within cybersecurity to find the best fit for your interests and skills. Additionally, they stress the importance of building a strong network, both online and in-person, to connect with industry professionals and stay up to date on the latest trends and technologies.
Ron offers advice on negotiating a salary and knowing your worth. Ron and Chris also encourage listeners to do their research and interview for multiple jobs to get a sense of market rates for different roles. They also discuss the taboo around discussing salaries in cybersecurity and offer suggestions on how to navigate this sensitive topic.




Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM




...........................
Links:
Purchase an HVS t-shirt at our shop
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Continue the conversation by joining our Discord





]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2242</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>272</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Leading Cybersecurity Incidents as Incident Commander and Responding to a Cyber Crisis</title>
        <itunes:title>Leading Cybersecurity Incidents as Incident Commander and Responding to a Cyber Crisis</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/leading-cybersecurity-incidents-as-incident-commander-and-responding-to-a-cyber-crisis/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/leading-cybersecurity-incidents-as-incident-commander-and-responding-to-a-cyber-crisis/#comments</comments>        <pubDate>Tue, 14 Mar 2023 05:08:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/35132cd7-2a5f-3096-ae72-507541bcc400</guid>
                                    <description><![CDATA[



<p>In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris tackle arguably one of the most difficult roles in cybersecurity: Incident Response. Drawing on his years of experience at organizations such as US Cyber Command, NSA, and Netflix, Chris shares his knowledge on what it takes to properly handle Severity 1, 2, and 3 level incidents. Together, Ron and Chris cover everything from the roles and responsibilities of an incident commander to the steps of bringing an incident to a close. Lastly, the two share their tips for improving incident response and steps that individuals and organizations can take to integrate incident command and communication efforts. </p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='http://netspi.com/HVM'>http://netspi.com/HVM</a></p>




<p>...........................</p>
<p>Links:</p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
]]></description>
                                                            <content:encoded><![CDATA[



<p>In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris tackle arguably one of the most difficult roles in cybersecurity: Incident Response. Drawing on his years of experience at organizations such as US Cyber Command, NSA, and Netflix, Chris shares his knowledge on what it takes to properly handle Severity 1, 2, and 3 level incidents. Together, Ron and Chris cover everything from the roles and responsibilities of an incident commander to the steps of bringing an incident to a close. Lastly, the two share their tips for improving incident response and steps that individuals and organizations can take to integrate incident command and communication efforts. </p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at <a href='http://netspi.com/HVM'>http://netspi.com/HVM</a></p>




<p>...........................</p>
<p>Links:</p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vnyd3a/Incident_Commanders_v38enxl.mp3" length="89587772" type="audio/mpeg"/>
        <itunes:summary><![CDATA[



In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris tackle arguably one of the most difficult roles in cybersecurity: Incident Response. Drawing on his years of experience at organizations such as US Cyber Command, NSA, and Netflix, Chris shares his knowledge on what it takes to properly handle Severity 1, 2, and 3 level incidents. Together, Ron and Chris cover everything from the roles and responsibilities of an incident commander to the steps of bringing an incident to a close. Lastly, the two share their tips for improving incident response and steps that individuals and organizations can take to integrate incident command and communication efforts. 
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM




...........................
Links:
Purchase an HVS t-shirt at our shop
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Continue the conversation by joining our Discord]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2229</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>271</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>If It’s Smart, It’s Vulnerable and the Evolution of Cybersecurity with Mikko Hypponen</title>
        <itunes:title>If It’s Smart, It’s Vulnerable and the Evolution of Cybersecurity with Mikko Hypponen</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/if-it-s-smart-it-s-vulnerable-and-the-evolution-of-cybersecurity-with-mikko-hypponen/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/if-it-s-smart-it-s-vulnerable-and-the-evolution-of-cybersecurity-with-mikko-hypponen/#comments</comments>        <pubDate>Tue, 07 Mar 2023 05:27:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/59848aaf-f4bc-3193-b058-bef2ac270cd1</guid>
                                    <description><![CDATA[


<p class="notranslate">In this episode, Chris and Ron are joined by author, TED Talk presenter, and Chief Research Officer at WithSecure, Mikko Hyppönen, to discuss the past, present, and future of cybersecurity. With over 30 years of experience in cybersecurity, Mikko shares his insights on everything from the importance of knowing and understanding the enemy to the security implications of smart devices.</p>







<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals</p>
<p>NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM</p>




<p>...........................</p>
<p>Links:</p>
<p>Connect with our guest Mikko Hyppönen on <a href='https://www.linkedin.com/in/hypponen/'>LinkedIn</a></p>
<p>Check out Mikko's book <a href='https://www.amazon.com/If-Its-Smart-Vulnerable/dp/1119895189'>If It's Smart, It's Vulnerable </a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[


<p class="notranslate">In this episode, Chris and Ron are joined by author, TED Talk presenter, and Chief Research Officer at WithSecure, Mikko Hyppönen, to discuss the past, present, and future of cybersecurity. With over 30 years of experience in cybersecurity, Mikko shares his insights on everything from the importance of knowing and understanding the enemy to the security implications of smart devices.</p>







<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals</p>
<p>NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM</p>




<p>...........................</p>
<p>Links:</p>
<p>Connect with our guest Mikko Hyppönen on <a href='https://www.linkedin.com/in/hypponen/'>LinkedIn</a></p>
<p>Check out Mikko's book <a href='https://www.amazon.com/If-Its-Smart-Vulnerable/dp/1119895189'>If It's Smart, It's Vulnerable </a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/piq83f/HV_EP_Mikko_Hypponen9srdt.mp3" length="78169762" type="audio/mpeg"/>
        <itunes:summary><![CDATA[


In this episode, Chris and Ron are joined by author, TED Talk presenter, and Chief Research Officer at WithSecure, Mikko Hyppönen, to discuss the past, present, and future of cybersecurity. With over 30 years of experience in cybersecurity, Mikko shares his insights on everything from the importance of knowing and understanding the enemy to the security implications of smart devices.







Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals
NetSPI has a team of skilled pen-testers that can help you find those critical vulnerabilities and become your partner in creating the right remediation game plan for you. Check them out at http://netspi.com/HVM




...........................
Links:
Connect with our guest Mikko Hyppönen on LinkedIn
Check out Mikko's book If It's Smart, It's Vulnerable 
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1944</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>270</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Resources That Changed How I Approach Cybersecurity</title>
        <itunes:title>Resources That Changed How I Approach Cybersecurity</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/resources-that-changed-how-i-approach-cybersecurity/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/resources-that-changed-how-i-approach-cybersecurity/#comments</comments>        <pubDate>Tue, 28 Feb 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/979f7555-5add-3687-b9c7-b44d550fa185</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, Chris Cochran and Ron Eddings discuss cybersecurity resources for learning and standing out in the field. In the episode, the two discuss SANS Institute posters for pentesting, purple teaming, and incident response. The two also showcase Google Hacking resources for finding domains of interest for cybersecurity.</p>
<p>Ron and Chris highlight how podcasts can be a great way to try out a book before buying it, as authors often share the best parts of their work when interviewed. Chris notes that the cybersecurity field is constantly evolving and that staying up-to-date is crucial. They emphasize that resources like books and podcasts can help professionals develop new skills and stay current with industry trends.</p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>...........................</p>
<p>Links:</p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, Chris Cochran and Ron Eddings discuss cybersecurity resources for learning and standing out in the field. In the episode, the two discuss SANS Institute posters for pentesting, purple teaming, and incident response. The two also showcase Google Hacking resources for finding domains of interest for cybersecurity.</p>
<p>Ron and Chris highlight how podcasts can be a great way to try out a book before buying it, as authors often share the best parts of their work when interviewed. Chris notes that the cybersecurity field is constantly evolving and that staying up-to-date is crucial. They emphasize that resources like books and podcasts can help professionals develop new skills and stay current with industry trends.</p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>...........................</p>
<p>Links:</p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qst9wn/HV_Impactful_Resources6oov8.mp3" length="72263989" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, Chris Cochran and Ron Eddings discuss cybersecurity resources for learning and standing out in the field. In the episode, the two discuss SANS Institute posters for pentesting, purple teaming, and incident response. The two also showcase Google Hacking resources for finding domains of interest for cybersecurity.
Ron and Chris highlight how podcasts can be a great way to try out a book before buying it, as authors often share the best parts of their work when interviewed. Chris notes that the cybersecurity field is constantly evolving and that staying up-to-date is crucial. They emphasize that resources like books and podcasts can help professionals develop new skills and stay current with industry trends.
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
...........................
Links:
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1790</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>269</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Pivotal Moments In Our Cybersecurity Career And Making Our First $100k In Cyber</title>
        <itunes:title>Pivotal Moments In Our Cybersecurity Career And Making Our First $100k In Cyber</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/pivotal-moments-in-our-cybersecurity-career-and-making-our-first-100k-in-cyber/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/pivotal-moments-in-our-cybersecurity-career-and-making-our-first-100k-in-cyber/#comments</comments>        <pubDate>Tue, 21 Feb 2023 05:01:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1e0b6fb6-1c92-3149-ae15-692f3e020687</guid>
                                    <description><![CDATA[<p>Welcome to the Hacker Valley Studio podcast, Ron Eddings and Chris Cochran reflect on their most pivotal moments in the industry. The two share personal stories that shaped their careers, from Chris' journey to landing his dream role at Netflix to Ron's early years in cybersecurity and hitting his career goal of earning $100k.</p>
<p>But it's not all about the money – Ron and Chris delve into the importance of money management and the harsh realities of poor spending habits. They also discuss the philosophy of staying present, having gratitude, and being available for life-changing opportunities, especially in the ever-evolving world of cybersecurity.</p>
<p>You'll also hear Ron's tips for success, including the power of breathwork, consistent self-development routines, and reading. And, surprisingly, how these practices even helped him meet his wife!</p>
<p>Whether you're just starting out in cybersecurity or looking to take your career to the next level, this cybersecurity podcast episode is perfect for anyone interested in learning from two experienced professionals who have been there, done that, and are still going strong.</p>
<p>...........................</p>
<p>Links:</p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Welcome to the Hacker Valley Studio podcast, Ron Eddings and Chris Cochran reflect on their most pivotal moments in the industry. The two share personal stories that shaped their careers, from Chris' journey to landing his dream role at Netflix to Ron's early years in cybersecurity and hitting his career goal of earning $100k.</p>
<p>But it's not all about the money – Ron and Chris delve into the importance of money management and the harsh realities of poor spending habits. They also discuss the philosophy of staying present, having gratitude, and being available for life-changing opportunities, especially in the ever-evolving world of cybersecurity.</p>
<p>You'll also hear Ron's tips for success, including the power of breathwork, consistent self-development routines, and reading. And, surprisingly, how these practices even helped him meet his wife!</p>
<p>Whether you're just starting out in cybersecurity or looking to take your career to the next level, this cybersecurity podcast episode is perfect for anyone interested in learning from two experienced professionals who have been there, done that, and are still going strong.</p>
<p>...........................</p>
<p>Links:</p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9jhic4/HV_Pivotal_Momentsak6c9.mp3" length="62950509" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Welcome to the Hacker Valley Studio podcast, Ron Eddings and Chris Cochran reflect on their most pivotal moments in the industry. The two share personal stories that shaped their careers, from Chris' journey to landing his dream role at Netflix to Ron's early years in cybersecurity and hitting his career goal of earning $100k.
But it's not all about the money – Ron and Chris delve into the importance of money management and the harsh realities of poor spending habits. They also discuss the philosophy of staying present, having gratitude, and being available for life-changing opportunities, especially in the ever-evolving world of cybersecurity.
You'll also hear Ron's tips for success, including the power of breathwork, consistent self-development routines, and reading. And, surprisingly, how these practices even helped him meet his wife!
Whether you're just starting out in cybersecurity or looking to take your career to the next level, this cybersecurity podcast episode is perfect for anyone interested in learning from two experienced professionals who have been there, done that, and are still going strong.
...........................
Links:
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1561</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>268</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>ChatGPT Can’t Take My Job and How To Become A Cyber Industry Creative</title>
        <itunes:title>ChatGPT Can’t Take My Job and How To Become A Cyber Industry Creative</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/chatgpt-can-t-take-my-job-and-how-to-become-a-cyber-industry-creative/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/chatgpt-can-t-take-my-job-and-how-to-become-a-cyber-industry-creative/#comments</comments>        <pubDate>Tue, 14 Feb 2023 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a876a9cd-ddcc-34cb-973d-efc63bf85399</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, hosts Ron Eddings and Chris Cochran explore the power of ChatGPT and attempt to build a Python script that scrapes BleepingComputer for the latest headlines.</p>
<p>Chris also takes a moment to reflect on the rise of the ‘Industry Creative’- a term he coined for individuals that leverage their practical industry experience into creating content for their community. The two share their predictions on the future of cybersecurity content creation, why the demand for content is higher than ever, and why they believe industry creatives are the most valuable practitioners in cybersecurity.</p>
<p>This cybersecurity podcast episode is perfect for anyone interested in advancing their understanding of the intersection between AI and cybersecurity. Enjoy!</p>
<p>...........................</p>
<p>Links:</p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, hosts Ron Eddings and Chris Cochran explore the power of ChatGPT and attempt to build a Python script that scrapes BleepingComputer for the latest headlines.</p>
<p>Chris also takes a moment to reflect on the rise of the ‘Industry Creative’- a term he coined for individuals that leverage their practical industry experience into creating content for their community. The two share their predictions on the future of cybersecurity content creation, why the demand for content is higher than ever, and why they believe industry creatives are the most valuable practitioners in cybersecurity.</p>
<p>This cybersecurity podcast episode is perfect for anyone interested in advancing their understanding of the intersection between AI and cybersecurity. Enjoy!</p>
<p>...........................</p>
<p>Links:</p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qfiy8r/HV_Chat_GPTapav9.mp3" length="79873415" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron Eddings and Chris Cochran explore the power of ChatGPT and attempt to build a Python script that scrapes BleepingComputer for the latest headlines.
Chris also takes a moment to reflect on the rise of the ‘Industry Creative’- a term he coined for individuals that leverage their practical industry experience into creating content for their community. The two share their predictions on the future of cybersecurity content creation, why the demand for content is higher than ever, and why they believe industry creatives are the most valuable practitioners in cybersecurity.
This cybersecurity podcast episode is perfect for anyone interested in advancing their understanding of the intersection between AI and cybersecurity. Enjoy!
...........................
Links:
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1986</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>267</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cybersecurity Layoffs and Diversity with McKenna Yeakey</title>
        <itunes:title>Cybersecurity Layoffs and Diversity with McKenna Yeakey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cybersecurity-layoffs-and-diversity-with-mckenna-yeakey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cybersecurity-layoffs-and-diversity-with-mckenna-yeakey/#comments</comments>        <pubDate>Tue, 07 Feb 2023 05:13:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e961040c-762e-3b7c-939a-7be3a4ee6e14</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio, hosts Ron and Chris are joined by McKenna Yeakey to talk about her experience with being laid off in cybersecurity and finding a new job. Mckenna shares her journey through the emotional and psychological struggles she faced during her layoff, and how she overcame feelings of self-doubt and worthiness. She also highlights the role her professional network and the cybersecurity community played in supporting her during this difficult time and how she ultimately landed her next gig.</p>
<p>McKenna also shares her insights on diversity and leadership in the cybersecurity industry, as a black woman in tech. She offers her perspective on what true inclusivity should look like, and how to identify companies that are actively promoting it. From her favorite leadership questions to ask during job interviews to tips on how to support others in the industry, McKenna shares it all.</p>
<p>This cybersecurity podcast episode is a must-listen for anyone looking to grow their cybersecurity career. This promises to be an inspiring and empowering resource for anyone facing job loss or seeking to improve their professional prospects in the cybersecurity field.</p>
<p>...........................</p>
<p>Links:</p>
<p>Stay up to date with McKenna Yeakey on <a href='https://www.linkedin.com/in/mckenna-yeakey/'>LinkedIn</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio, hosts Ron and Chris are joined by McKenna Yeakey to talk about her experience with being laid off in cybersecurity and finding a new job. Mckenna shares her journey through the emotional and psychological struggles she faced during her layoff, and how she overcame feelings of self-doubt and worthiness. She also highlights the role her professional network and the cybersecurity community played in supporting her during this difficult time and how she ultimately landed her next gig.</p>
<p>McKenna also shares her insights on diversity and leadership in the cybersecurity industry, as a black woman in tech. She offers her perspective on what true inclusivity should look like, and how to identify companies that are actively promoting it. From her favorite leadership questions to ask during job interviews to tips on how to support others in the industry, McKenna shares it all.</p>
<p>This cybersecurity podcast episode is a must-listen for anyone looking to grow their cybersecurity career. This promises to be an inspiring and empowering resource for anyone facing job loss or seeking to improve their professional prospects in the cybersecurity field.</p>
<p>...........................</p>
<p>Links:</p>
<p>Stay up to date with McKenna Yeakey on <a href='https://www.linkedin.com/in/mckenna-yeakey/'>LinkedIn</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7zkzqd/Hacker_Valley_Podcast_Mckenna_Yeakey9nrdk.mp3" length="84210246" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio, hosts Ron and Chris are joined by McKenna Yeakey to talk about her experience with being laid off in cybersecurity and finding a new job. Mckenna shares her journey through the emotional and psychological struggles she faced during her layoff, and how she overcame feelings of self-doubt and worthiness. She also highlights the role her professional network and the cybersecurity community played in supporting her during this difficult time and how she ultimately landed her next gig.
McKenna also shares her insights on diversity and leadership in the cybersecurity industry, as a black woman in tech. She offers her perspective on what true inclusivity should look like, and how to identify companies that are actively promoting it. From her favorite leadership questions to ask during job interviews to tips on how to support others in the industry, McKenna shares it all.
This cybersecurity podcast episode is a must-listen for anyone looking to grow their cybersecurity career. This promises to be an inspiring and empowering resource for anyone facing job loss or seeking to improve their professional prospects in the cybersecurity field.
...........................
Links:
Stay up to date with McKenna Yeakey on LinkedIn
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2085</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>266</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Unleashing the Power of Cybersecurity Purple Teams with Maril Vernon</title>
        <itunes:title>Unleashing the Power of Cybersecurity Purple Teams with Maril Vernon</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/unleashing-the-power-of-cybersecurity-purple-teams-with-maril-vernon/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/unleashing-the-power-of-cybersecurity-purple-teams-with-maril-vernon/#comments</comments>        <pubDate>Tue, 31 Jan 2023 05:03:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/0a486144-cc71-3d7a-86ce-9f48ffc4a8f0</guid>
                                    <description><![CDATA[<p>In this episode of the podcast, Maril Vernon joins Ron and Chris and discusses the importance of breaking down silos between cyber teams and inspiring individuals to drive their own careers in cybersecurity. Maril has been a key player in promoting the concept of purple teaming - the combination of red teaming and blue teaming to improve an organization's overall security posture. She discusses the importance of hands-on experience and practical knowledge over just having certifications.</p>
<p>Maril's approach to her career has been driven by her passion for the work and her desire to break down silos between different cybersecurity teams. She emphasizes that individuals can drive their own success in the field and take control of their careers, regardless of the limitations their organizations or the industry may impose. Through her collaborations with organizations such as Cyber Queens and nonprofit foundations, she hopes to provide more educational material to high school and college students to inspire the next generation of cybersecurity professionals.</p>
<p>Maril has big plans for the future, including starting a doctorate program in cybersecurity and working on several undisclosed projects that she promises to share in future podcasts. She hopes to leave a legacy of empowering individuals in the cybersecurity field and inspiring them to love their work and take control of their careers. </p>
<p>This cybersecurity podcast episode is a must-listen for anyone looking to pursue a career in cybersecurity and gain insight into the field from a successful professional.</p>
<p> </p>
<p>--------------</p>
<p>Links:</p>
<p>Stay up to date with Maril Vernon on <a href='https://www.linkedin.com/in/marilvernon/'>LinkedIn</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the podcast, Maril Vernon joins Ron and Chris and discusses the importance of breaking down silos between cyber teams and inspiring individuals to drive their own careers in cybersecurity. Maril has been a key player in promoting the concept of purple teaming - the combination of red teaming and blue teaming to improve an organization's overall security posture. She discusses the importance of hands-on experience and practical knowledge over just having certifications.</p>
<p>Maril's approach to her career has been driven by her passion for the work and her desire to break down silos between different cybersecurity teams. She emphasizes that individuals can drive their own success in the field and take control of their careers, regardless of the limitations their organizations or the industry may impose. Through her collaborations with organizations such as Cyber Queens and nonprofit foundations, she hopes to provide more educational material to high school and college students to inspire the next generation of cybersecurity professionals.</p>
<p>Maril has big plans for the future, including starting a doctorate program in cybersecurity and working on several undisclosed projects that she promises to share in future podcasts. She hopes to leave a legacy of empowering individuals in the cybersecurity field and inspiring them to love their work and take control of their careers. </p>
<p>This cybersecurity podcast episode is a must-listen for anyone looking to pursue a career in cybersecurity and gain insight into the field from a successful professional.</p>
<p> </p>
<p>--------------</p>
<p>Links:</p>
<p>Stay up to date with Maril Vernon on <a href='https://www.linkedin.com/in/marilvernon/'>LinkedIn</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/e7ppt3/Hacker_Valley_Podcast_Maril_Vernon9yf1l.mp3" length="81714329" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the podcast, Maril Vernon joins Ron and Chris and discusses the importance of breaking down silos between cyber teams and inspiring individuals to drive their own careers in cybersecurity. Maril has been a key player in promoting the concept of purple teaming - the combination of red teaming and blue teaming to improve an organization's overall security posture. She discusses the importance of hands-on experience and practical knowledge over just having certifications.
Maril's approach to her career has been driven by her passion for the work and her desire to break down silos between different cybersecurity teams. She emphasizes that individuals can drive their own success in the field and take control of their careers, regardless of the limitations their organizations or the industry may impose. Through her collaborations with organizations such as Cyber Queens and nonprofit foundations, she hopes to provide more educational material to high school and college students to inspire the next generation of cybersecurity professionals.
Maril has big plans for the future, including starting a doctorate program in cybersecurity and working on several undisclosed projects that she promises to share in future podcasts. She hopes to leave a legacy of empowering individuals in the cybersecurity field and inspiring them to love their work and take control of their careers. 
This cybersecurity podcast episode is a must-listen for anyone looking to pursue a career in cybersecurity and gain insight into the field from a successful professional.
 
--------------
Links:
Stay up to date with Maril Vernon on LinkedIn
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2035</itunes:duration>
                <itunes:episode>265</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Security Teams Can’t Do It All with Rob Wood CISO @ CMS</title>
        <itunes:title>Security Teams Can’t Do It All with Rob Wood CISO @ CMS</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/security-teams-can-t-do-it-all-with-rob-wood-ciso-cms/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/security-teams-can-t-do-it-all-with-rob-wood-ciso-cms/#comments</comments>        <pubDate>Tue, 24 Jan 2023 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ef67da3f-8d2b-306b-ad87-eaa5dee0201d</guid>
                                    <description><![CDATA[<p>In this episode of Hacker Valley Studio, Rob Wood, Chief Information Security Officer (CISO) at CMS, discusses the challenges of data silos within organizations. Rob explains that security teams often operate in silos, with different departments focusing on various aspects of security, such as incident management, compliance, and penetration testing. One way to improve this is by flattening the organizational structure and finding ways to work together in the same data environments, using the same data tools. This would allow teams to collaborate better and share information, improving overall security.</p>
<p>In the episode, Rob also highlights the importance of supportive leadership and culture in driving change and the impact of the mission in his work. Ron picks up on two key elements - people and communication - as important in cybersecurity and business, as breakdowns often happen due to lack of communication. Chris mentions how he is hard on leaders who create toxic environments or use fear and intimidation to lead their teams. He also notes that he is starting to see a different kind of leader in the technical space, one that knows a lot, and is intelligent but also knows how to talk to people and make them feel seen. The conversation then shifts to where this change in leadership is coming from.</p>
<p>Rob Wood suggests that it is the next wave of leaders coming in, as there are more leadership opportunities available. He also notes that there are many people moving into security from diverse fields, creating a polymath effect of blended disciplines. This helps humble people and allows them to be more human. He also mentions that his own career path was not traditional, as he studied sports management in college and transitioned into an internship in cybersecurity.</p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>--------------</p>
<p>Links:</p>
<p>Stay up to date with Rob Wood on <a href='https://www.linkedin.com/in/holycyberbatman/'>LinkedIn</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Hacker Valley Studio, Rob Wood, Chief Information Security Officer (CISO) at CMS, discusses the challenges of data silos within organizations. Rob explains that security teams often operate in silos, with different departments focusing on various aspects of security, such as incident management, compliance, and penetration testing. One way to improve this is by flattening the organizational structure and finding ways to work together in the same data environments, using the same data tools. This would allow teams to collaborate better and share information, improving overall security.</p>
<p>In the episode, Rob also highlights the importance of supportive leadership and culture in driving change and the impact of the mission in his work. Ron picks up on two key elements - people and communication - as important in cybersecurity and business, as breakdowns often happen due to lack of communication. Chris mentions how he is hard on leaders who create toxic environments or use fear and intimidation to lead their teams. He also notes that he is starting to see a different kind of leader in the technical space, one that knows a lot, and is intelligent but also knows how to talk to people and make them feel seen. The conversation then shifts to where this change in leadership is coming from.</p>
<p>Rob Wood suggests that it is the next wave of leaders coming in, as there are more leadership opportunities available. He also notes that there are many people moving into security from diverse fields, creating a polymath effect of blended disciplines. This helps humble people and allows them to be more human. He also mentions that his own career path was not traditional, as he studied sports management in college and transitioned into an internship in cybersecurity.</p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>--------------</p>
<p>Links:</p>
<p>Stay up to date with Rob Wood on <a href='https://www.linkedin.com/in/holycyberbatman/'>LinkedIn</a></p>
<p>Join our <a href='https://www.patreon.com/hackervalleystudio'>Patreon monthly creative mastermind</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/t9tkft/Hacker_Valley_Podcast_Rob_Wood_v3bg4g5.mp3" length="72440872" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley Studio, Rob Wood, Chief Information Security Officer (CISO) at CMS, discusses the challenges of data silos within organizations. Rob explains that security teams often operate in silos, with different departments focusing on various aspects of security, such as incident management, compliance, and penetration testing. One way to improve this is by flattening the organizational structure and finding ways to work together in the same data environments, using the same data tools. This would allow teams to collaborate better and share information, improving overall security.
In the episode, Rob also highlights the importance of supportive leadership and culture in driving change and the impact of the mission in his work. Ron picks up on two key elements - people and communication - as important in cybersecurity and business, as breakdowns often happen due to lack of communication. Chris mentions how he is hard on leaders who create toxic environments or use fear and intimidation to lead their teams. He also notes that he is starting to see a different kind of leader in the technical space, one that knows a lot, and is intelligent but also knows how to talk to people and make them feel seen. The conversation then shifts to where this change in leadership is coming from.
Rob Wood suggests that it is the next wave of leaders coming in, as there are more leadership opportunities available. He also notes that there are many people moving into security from diverse fields, creating a polymath effect of blended disciplines. This helps humble people and allows them to be more human. He also mentions that his own career path was not traditional, as he studied sports management in college and transitioned into an internship in cybersecurity.
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
--------------
Links:
Stay up to date with Rob Wood on LinkedIn
Join our Patreon monthly creative mastermind
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1801</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>264</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Advocating for Better Security in Healthcare with Taylor Lehmann</title>
        <itunes:title>Advocating for Better Security in Healthcare with Taylor Lehmann</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/advocating-for-better-healthcare-security-with-taylor-lehmann/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/advocating-for-better-healthcare-security-with-taylor-lehmann/#comments</comments>        <pubDate>Tue, 17 Jan 2023 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/691db8c5-4b96-332a-944c-c1737fa64bfe</guid>
                                    <description><![CDATA[<p>Taylor Lehmann, Director of Office of the CISO at Google Cloud, has made it his mission to make healthcare and life sciences more secure and strategic for everyone. Joining our security podcast this week, Taylor talks about how security and strategy have to start with people— from properly managing them to realistically motivating them. Healthcare is in need of some serious security TLC and Taylor is ready to tackle the difficult questions about how personal medical data can stay safe in a constantly evolving environment.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[01:47] Motivating your team & understanding your real cyber constraints</p>
<p>[06:19] Creating a shared, measurable goal for every team</p>
<p>[14:26] The haves and have-nots of healthcare security</p>
<p>[22:08] Revolutionizing the security standard of healthcare</p>
<p>[25:16] How to not fail your future self

</p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>--------------</p>
<p>Links:</p>
<p>Keep up with our guest Taylor Lehmann on <a href='https://www.linkedin.com/in/tlehmanncyber/'>LinkedIn</a> and <a href='https://twitter.com/BostonCyberGuy'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Taylor Lehmann, Director of Office of the CISO at Google Cloud, has made it his mission to make healthcare and life sciences more secure and strategic for everyone. Joining our security podcast this week, Taylor talks about how security and strategy have to start with people— from properly managing them to realistically motivating them. Healthcare is in need of some serious security TLC and Taylor is ready to tackle the difficult questions about how personal medical data can stay safe in a constantly evolving environment.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[01:47] Motivating your team & understanding your real cyber constraints</p>
<p>[06:19] Creating a shared, measurable goal for every team</p>
<p>[14:26] The haves and have-nots of healthcare security</p>
<p>[22:08] Revolutionizing the security standard of healthcare</p>
<p>[25:16] How to not fail your future self<br>
<br>
</p>
<p>Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.</p>
<p>--------------</p>
<p>Links:</p>
<p>Keep up with our guest Taylor Lehmann on <a href='https://www.linkedin.com/in/tlehmanncyber/'>LinkedIn</a> and <a href='https://twitter.com/BostonCyberGuy'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4pj2fr/HVS_audio_Taylor_Lehmann_v38p799.mp3" length="38773336" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Taylor Lehmann, Director of Office of the CISO at Google Cloud, has made it his mission to make healthcare and life sciences more secure and strategic for everyone. Joining our security podcast this week, Taylor talks about how security and strategy have to start with people— from properly managing them to realistically motivating them. Healthcare is in need of some serious security TLC and Taylor is ready to tackle the difficult questions about how personal medical data can stay safe in a constantly evolving environment.
 
Timecoded Guide:
[01:47] Motivating your team & understanding your real cyber constraints
[06:19] Creating a shared, measurable goal for every team
[14:26] The haves and have-nots of healthcare security
[22:08] Revolutionizing the security standard of healthcare
[25:16] How to not fail your future self
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
--------------
Links:
Keep up with our guest Taylor Lehmann on LinkedIn and Twitter
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1615</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>263</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Solving Fundamental Cybersecurity Problems with Maxime Lamothe-Brassard</title>
        <itunes:title>Solving Fundamental Cybersecurity Problems with Maxime Lamothe-Brassard</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/stepping-up-to-solve-fundamental-cybersecurity-problems-with-maxime-lamothe-brassard/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/stepping-up-to-solve-fundamental-cybersecurity-problems-with-maxime-lamothe-brassard/#comments</comments>        <pubDate>Tue, 10 Jan 2023 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/bbf0a1de-706f-3031-8830-71956b521d12</guid>
                                    <description><![CDATA[<p>Maxime “Max” Lamothe-Brassard, Founder of LimaCharlie, brings a tech-focused community perspective and a history of working at Google to the Hacker Valley security podcast this week. Inspired by the internal motivation to empower others and build what didn’t exist, Maxime created LimaCharlie to help security teams automate and manage security operations. In this episode, Max walks through his founder’s journey and points out the problems that are begging for innovative solutions from the brightest minds in cyber.

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[01:59] Improving community & empowering practitioners</p>
<p>[06:04] Leaving Google for LimaCharlie</p>
<p>[10:55] Unpacking the incentivization problem of cyber </p>
<p>[16:21] Targeted products vs massive suites of problem solvers</p>
<p>[21:29] Looking at a red team-less future</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Maxime Lamothe-Brassard on <a href='https://www.linkedin.com/in/maximelb/'>LinkedIn</a></p>
<p>Learn more about LimaCharlie on <a href='https://www.linkedin.com/company/limacharlieio/'>LinkedIn</a> and <a href='https://limacharlie.io/about'>the LimaCharlie website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Maxime “Max” Lamothe-Brassard, Founder of LimaCharlie, brings a tech-focused community perspective and a history of working at Google to the Hacker Valley security podcast this week. Inspired by the internal motivation to empower others and build what didn’t exist, Maxime created LimaCharlie to help security teams automate and manage security operations. In this episode, Max walks through his founder’s journey and points out the problems that are begging for innovative solutions from the brightest minds in cyber.<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[01:59] Improving community & empowering practitioners</p>
<p>[06:04] Leaving Google for LimaCharlie</p>
<p>[10:55] Unpacking the incentivization problem of cyber </p>
<p>[16:21] Targeted products vs massive suites of problem solvers</p>
<p>[21:29] Looking at a red team-less future</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Maxime Lamothe-Brassard on <a href='https://www.linkedin.com/in/maximelb/'>LinkedIn</a></p>
<p>Learn more about LimaCharlie on <a href='https://www.linkedin.com/company/limacharlieio/'>LinkedIn</a> and <a href='https://limacharlie.io/about'>the LimaCharlie website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/i5u6xs/HVS_audio_Maxime_Lamothe_v29rcp8.mp3" length="34967759" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Maxime “Max” Lamothe-Brassard, Founder of LimaCharlie, brings a tech-focused community perspective and a history of working at Google to the Hacker Valley security podcast this week. Inspired by the internal motivation to empower others and build what didn’t exist, Maxime created LimaCharlie to help security teams automate and manage security operations. In this episode, Max walks through his founder’s journey and points out the problems that are begging for innovative solutions from the brightest minds in cyber.Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
 
Timecoded Guide:
[01:59] Improving community & empowering practitioners
[06:04] Leaving Google for LimaCharlie
[10:55] Unpacking the incentivization problem of cyber 
[16:21] Targeted products vs massive suites of problem solvers
[21:29] Looking at a red team-less future
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
---------------
Links:
Keep up with our guest Maxime Lamothe-Brassard on LinkedIn
Learn more about LimaCharlie on LinkedIn and the LimaCharlie website
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase an HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1456</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>262</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Building Leadership Strategy Beyond Tech with Brian Haugli</title>
        <itunes:title>Building Leadership Strategy Beyond Tech with Brian Haugli</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/building-leadership-strategy-beyond-tech-with-brian-haugli/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/building-leadership-strategy-beyond-tech-with-brian-haugli/#comments</comments>        <pubDate>Tue, 03 Jan 2023 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/235755dd-be2f-3ecb-8cf2-78b71e9f83fe</guid>
                                    <description><![CDATA[<p>Brian Haugli, Founder and CEO of SideChannel, brings his CISO expertise to the security podcast this week for a discussion about strategy and leadership in cybersecurity. Working alongside CISOs and fractional VCISOs, Brian has seen his share of leadership mistakes and has learned about the purposeful approach that security needs along the way. In this episode, Brian revises the mantra of “people, process, and technology,” to include the first and most important element in your security success: purposeful strategy.

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.

</p>
<p>Timecoded Guide:</p>
<p>[02:01] People, process, and technology in your leadership strategy</p>
<p>[05:12] Tenants of a strong security strategy</p>
<p>[13:11] Setting up new fractional CISOs for success</p>
<p>[18:29] Creating SideChannel & walking the line between CISO vs consultant</p>
<p>[27:44] Thriving professionally by thriving personally</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What has been your philosophy throughout the years when it comes to leadership versus technology? </p>
<p>The security adage of “people, process, technology” isn’t one combined concept. That is, in Brian’s opinion, why so many leaders make the mistake of prioritizing technology as a central part of their strategy. Strategy is not what technology you use, and you can’t buy your way out of every security conflict with a shiny new product. Ask yourself what problem you’re supposed to solve, not which tech is going to solve your problems. </p>
<p>“Strategy is not technology, it's figuring out what you want to look like when you grow up, in a sense. Everyone jumps to the shiny object. What can I buy to go solve this problem? You never stop and question: Was that the first problem I was supposed to solve?”</p>
<p> </p>
<p>What are the tenants of making sure that you've done the work of creating a strong security strategy?</p>
<p>The North Star of your security strategy should be the identity and purpose of your business, according to Brian. If you don’t have a current assessment of your current capabilities, assets, resources, and objectives, you aren’t positioning yourself for success. Strategy comes from a knowledge and understanding of where you are now, and where you need to be. When your company “grows up,” what do you want security to look like for you? Understanding that guides you towards your target state without wasting your time on the wrong problems or objectives. </p>
<p>“I think a lot of people throw strategy around as a grander concept and don't actually think about the elements that need to go into building one. You need to align to a definition that supports your business and outcomes, and that's what is strategic. The idea is not strategic.”</p>
<p> </p>
<p>Let's say I'm a brand new fractional CISO and I have my first client. What are the top three questions I'm going to ask of this organization to set me on the right path?</p>
<p>When dealing with a new client, fractional CISOs have to understand why they’re involved with this client in the first place. Why are you here? Who brought you here? And, most importantly, what is the reason security is being addressed now? A fractional CISO can’t defend what they don’t know exists, and they can’t meet a deadline without first understanding what this company’s unique security environment needs are. </p>
<p>“You don't jump into, ‘Okay, well, what's the budget?’ No, I like to understand what I have to actually defend and build to, how fast I have to actually make that happen, that then informs and sets up the much better discussion around, realistically, what you should be considering.”</p>
<p> </p>
<p>What advice do you have for our audience that is interested in becoming a CISO?</p>
<p>Although Brian jokes that he would advise anyone against taking on a CISO role due to the workload, he understands and loves the grind of cybersecurity leadership. To not only survive but thrive as a CISO, Brian believes a practitioner has to keep their love for problem-solving and protecting organizations at the forefront. Still, as passionate as someone might be, Brian also advises knowing when to unplug and unwind to avoid burning out fast in such a strenuous role. </p>
<p>“Look, just take care of yourself. I think exercising is huge. Eat right, sleep right. You've got to take care of your mental health, take care of physical health, you've got to take care of your spiritual health. You've got to do all that, or you're never going to be good professionally.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Brian Haugli on <a href='https://www.linkedin.com/in/brianhaugli/'>LinkedIn</a> and <a href='https://twitter.com/BrianHaugli'>Twitter</a></p>
<p>Learn more about SideChannel on <a href='https://www.linkedin.com/company/sidechannelsecurity/'>LinkedIn</a> and <a href='https://sidechannel.com/contact/'>the SideChannel website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Brian Haugli, Founder and CEO of SideChannel, brings his CISO expertise to the security podcast this week for a discussion about strategy and leadership in cybersecurity. Working alongside CISOs and fractional VCISOs, Brian has seen his share of leadership mistakes and has learned about the purposeful approach that security needs along the way. In this episode, Brian revises the mantra of “people, process, and technology,” to include the first and most important element in your security success: purposeful strategy.<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
<br>
</p>
<p>Timecoded Guide:</p>
<p>[02:01] People, process, and technology in your leadership strategy</p>
<p>[05:12] Tenants of a strong security strategy</p>
<p>[13:11] Setting up new fractional CISOs for success</p>
<p>[18:29] Creating SideChannel & walking the line between CISO vs consultant</p>
<p>[27:44] Thriving professionally by thriving personally</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What has been your philosophy throughout the years when it comes to leadership versus technology? </p>
<p>The security adage of “people, process, technology” isn’t one combined concept. That is, in Brian’s opinion, why so many leaders make the mistake of prioritizing technology as a central part of their strategy. Strategy is not what technology you use, and you can’t buy your way out of every security conflict with a shiny new product. Ask yourself what problem you’re supposed to solve, not which tech is going to solve your problems. </p>
<p><em>“Strategy is not technology, it's figuring out what you want to look like when you grow up, in a sense. Everyone jumps to the shiny object. What can I buy to go solve this problem? You never stop and question: Was that the first problem I was supposed to solve?”</em></p>
<p> </p>
<p>What are the tenants of making sure that you've done the work of creating a strong security strategy?</p>
<p>The North Star of your security strategy should be the identity and purpose of your business, according to Brian. If you don’t have a current assessment of your current capabilities, assets, resources, and objectives, you aren’t positioning yourself for success. Strategy comes from a knowledge and understanding of where you are now, and where you need to be. When your company “grows up,” what do you want security to look like for you? Understanding that guides you towards your target state without wasting your time on the wrong problems or objectives. </p>
<p><em>“I think a lot of people throw strategy around as a grander concept and don't actually think about the elements that need to go into building one. You need to align to a definition that supports your business and outcomes, and that's what is strategic. The idea is not strategic.”</em></p>
<p> </p>
<p>Let's say I'm a brand new fractional CISO and I have my first client. What are the top three questions I'm going to ask of this organization to set me on the right path?</p>
<p>When dealing with a new client, fractional CISOs have to understand why they’re involved with this client in the first place. Why are you here? Who brought you here? And, most importantly, what is the reason security is being addressed now? A fractional CISO can’t defend what they don’t know exists, and they can’t meet a deadline without first understanding what this company’s unique security environment needs are. </p>
<p><em>“You don't jump into, ‘Okay, well, what's the budget?’ No, I like to understand what I have to actually defend and build to, how fast I have to actually make that happen, that then informs and sets up the much better discussion around, realistically, what you should be considering.”</em></p>
<p> </p>
<p>What advice do you have for our audience that is interested in becoming a CISO?</p>
<p>Although Brian jokes that he would advise anyone against taking on a CISO role due to the workload, he understands and loves the grind of cybersecurity leadership. To not only survive but thrive as a CISO, Brian believes a practitioner has to keep their love for problem-solving and protecting organizations at the forefront. Still, as passionate as someone might be, Brian also advises knowing when to unplug and unwind to avoid burning out fast in such a strenuous role. </p>
<p><em>“Look, just take care of yourself. I think exercising is huge. Eat right, sleep right. You've got to take care of your mental health, take care of physical health, you've got to take care of your spiritual health. You've got to do all that, or you're never going to be good professionally.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Brian Haugli on <a href='https://www.linkedin.com/in/brianhaugli/'>LinkedIn</a> and <a href='https://twitter.com/BrianHaugli'>Twitter</a></p>
<p>Learn more about SideChannel on <a href='https://www.linkedin.com/company/sidechannelsecurity/'>LinkedIn</a> and <a href='https://sidechannel.com/contact/'>the SideChannel website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/u434g2/HVS_audio_Brian_Haugli_v2aiyw7.mp3" length="46164043" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Brian Haugli, Founder and CEO of SideChannel, brings his CISO expertise to the security podcast this week for a discussion about strategy and leadership in cybersecurity. Working alongside CISOs and fractional VCISOs, Brian has seen his share of leadership mistakes and has learned about the purposeful approach that security needs along the way. In this episode, Brian revises the mantra of “people, process, and technology,” to include the first and most important element in your security success: purposeful strategy.Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
Timecoded Guide:
[02:01] People, process, and technology in your leadership strategy
[05:12] Tenants of a strong security strategy
[13:11] Setting up new fractional CISOs for success
[18:29] Creating SideChannel & walking the line between CISO vs consultant
[27:44] Thriving professionally by thriving personally
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
What has been your philosophy throughout the years when it comes to leadership versus technology? 
The security adage of “people, process, technology” isn’t one combined concept. That is, in Brian’s opinion, why so many leaders make the mistake of prioritizing technology as a central part of their strategy. Strategy is not what technology you use, and you can’t buy your way out of every security conflict with a shiny new product. Ask yourself what problem you’re supposed to solve, not which tech is going to solve your problems. 
“Strategy is not technology, it's figuring out what you want to look like when you grow up, in a sense. Everyone jumps to the shiny object. What can I buy to go solve this problem? You never stop and question: Was that the first problem I was supposed to solve?”
 
What are the tenants of making sure that you've done the work of creating a strong security strategy?
The North Star of your security strategy should be the identity and purpose of your business, according to Brian. If you don’t have a current assessment of your current capabilities, assets, resources, and objectives, you aren’t positioning yourself for success. Strategy comes from a knowledge and understanding of where you are now, and where you need to be. When your company “grows up,” what do you want security to look like for you? Understanding that guides you towards your target state without wasting your time on the wrong problems or objectives. 
“I think a lot of people throw strategy around as a grander concept and don't actually think about the elements that need to go into building one. You need to align to a definition that supports your business and outcomes, and that's what is strategic. The idea is not strategic.”
 
Let's say I'm a brand new fractional CISO and I have my first client. What are the top three questions I'm going to ask of this organization to set me on the right path?
When dealing with a new client, fractional CISOs have to understand why they’re involved with this client in the first place. Why are you here? Who brought you here? And, most importantly, what is the reason security is being addressed now? A fractional CISO can’t defend what they don’t know exists, and they can’t meet a deadline without first understanding what this company’s unique security environment needs are. 
“You don't jump into, ‘Okay, well, w]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1923</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>261</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>A Rebel’s Heart &amp; A Leader’s Mind with Allison Minutillo</title>
        <itunes:title>A Rebel’s Heart &amp; A Leader’s Mind with Allison Minutillo</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/a-rebel-s-heart-a-leader-s-mind-with-allison-minutillo/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/a-rebel-s-heart-a-leader-s-mind-with-allison-minutillo/#comments</comments>        <pubDate>Tue, 20 Dec 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/67324034-4747-3b02-b8fb-6aca487c4743</guid>
                                    <description><![CDATA[<p>Allison Minutillo, President of Rebel Interactive Group and Host of the Rebel Leadership podcast, joins the Hacker Valley team this week to talk about her journey from individual contributor to company leader. With a leader’s mind and a rebel’s heart, Allison wants Rebel Interactive Group to break down barriers and say what needs to be said. In this episode, Allison talks about intuition vs insecurity, practitioners vs leaders, and burning out vs staying invested and engaged in the world around you. 

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.

</p>
<p>Timecoded Guide:</p>
<p>[00:00] Shifting from an employee to a leadership mindset </p>
<p>[07:44] Getting real about leadership struggles on the Rebel Leadership podcast</p>
<p>[13:24] Rebelling for the great good of your company & yourself</p>
<p>[19:40] Finding career inspiration as a business owner & company president</p>
<p>[25:41] Struggling to realize your full leadership potential as an individual</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life! </p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What went into that mindset shift from individual contributor to the leader for you? </p>
<p>Leadership was an appealing concept to Allison, but stepping into the role of President at a company was beyond her wildest dreams. Being close to Bryn, the former President of Rebel, opened her eyes to the qualities of leadership she wanted in herself. However, the true mindset shift from contributor to leader came from Bryn’s understanding of Allison’s skills. It wasn’t until he brought up her being his successor that Allison saw the leader she knew she could be. </p>
<p>“I set my sights on what I thought was high. I started over-talking to [Bryn, at Rebel] because I was so nervous, and he said, ‘No, I'm talking about you being my successor, about you being president of Rebel.’ I instantly stopped everything I was saying and it became crystal clear.”</p>
<p> </p>
<p>What exactly is Rebel Leadership and how does it relate back to your philosophies?</p>
<p>The term “rebel leadership” is a concept that existed before Allison’s Rebel Leadership podcast began, but it embodies what Allison hopes Rebel Interactive Group represents for all of its clients. Being a rebel isn’t just about breaking the rules or telling it like it is, it’s about making a difference. Being a rebel leader is about challenging the status quo for the greater good of your clients, your employees, and your industry.</p>
<p>“It's not rebelling for rebels' sake, it's that we're not good with the status quo. We're not okay with it, but we're not careless. We rebel with purpose. It's informed. It's data backed, it's compelling, it's precise, it's meaningful. We are not afraid to state what needs to be said.” </p>
<p> </p>
<p>What do you say to those leaders that approach leadership almost like being a martyr? </p>
<p>The hustle and grind of being a leader can feel like endless amounts of hard work. However, in Allison’s experience, overworking yourself and refusing to disconnect maximizes the pain, but minimizes what you gain. Burnout is real, and cybersecurity practitioners definitely know burnout can be fatal for your career. Allison advises resting and giving yourself the time to reflect at the end of a long day, instead of forcing yourself to be a martyr. </p>
<p>“Doing that next ‘to-do’ list on your couch at 10:30 pm when you're spent and you're drained is not going to make you the leader you want to be tomorrow. It's going to make you frustrated and tired and not able to perform at a high level the next day.”</p>
<p> </p>
<p>How do you differentiate the good advice of intuition from your inner echo chamber of not-so-good advice?</p>
<p>It’s easy to get caught up in the eternal inner echo chamber when trying hard to learn and reflect on your experiences. Allison has had this happen to her, too; getting caught up in reading online comments and letting self-doubt control her thoughts. However, Allison explains that the grit of a true leader can drive you through the setbacks of criticism, whether that criticism comes from outside or within. What matters most is choosing to believe in yourself as a leader. </p>
<p>“That's when grit and will come in, in those moments where you're at the bottom of the barrel. Do you believe in yourself? Are you going to choose to believe in yourself, or are you going to choose to believe the comments?” </p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Allison Minutillo on <a href='https://www.linkedin.com/in/allisonminutillo/'>LinkedIn</a></p>
<p>Learn more about Rebel Interactive Group on <a href='https://www.linkedin.com/company/rebel-interactive-group/'>LinkedIn</a> and <a href='https://rebelinteractivegroup.com'>the Rebel website</a></p>
<p>Listen to <a href='https://rebelleadership.buzzsprout.com'>the Rebel Leadership podcast</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Allison Minutillo, President of Rebel Interactive Group and Host of the Rebel Leadership podcast, joins the Hacker Valley team this week to talk about her journey from individual contributor to company leader. With a leader’s mind and a rebel’s heart, Allison wants Rebel Interactive Group to break down barriers and say what needs to be said. In this episode, Allison talks about intuition vs insecurity, practitioners vs leaders, and burning out vs staying invested and engaged in the world around you. <br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
<br>
</p>
<p>Timecoded Guide:</p>
<p>[00:00] Shifting from an employee to a leadership mindset </p>
<p>[07:44] Getting real about leadership struggles on the Rebel Leadership podcast</p>
<p>[13:24] Rebelling for the great good of your company & yourself</p>
<p>[19:40] Finding career inspiration as a business owner & company president</p>
<p>[25:41] Struggling to realize your full leadership potential as an individual</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life! </p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What went into that mindset shift from individual contributor to the leader for you? </p>
<p>Leadership was an appealing concept to Allison, but stepping into the role of President at a company was beyond her wildest dreams. Being close to Bryn, the former President of Rebel, opened her eyes to the qualities of leadership she wanted in herself. However, the true mindset shift from contributor to leader came from Bryn’s understanding of Allison’s skills. It wasn’t until he brought up her being his successor that Allison saw the leader she knew she could be. </p>
<p><em>“I set my sights on what I thought was high. I started over-talking to [Bryn, at Rebel] because I was so nervous, and he said, ‘No, I'm talking about you being my successor, about you being president of Rebel.’ I instantly stopped everything I was saying and it became crystal clear.”</em></p>
<p> </p>
<p>What exactly is Rebel Leadership and how does it relate back to your philosophies?</p>
<p>The term “rebel leadership” is a concept that existed before Allison’s Rebel Leadership podcast began, but it embodies what Allison hopes Rebel Interactive Group represents for all of its clients. Being a rebel isn’t just about breaking the rules or telling it like it is, it’s about making a difference. Being a rebel leader is about challenging the status quo for the greater good of your clients, your employees, and your industry.</p>
<p><em>“It's not rebelling for rebels' sake, it's that we're not good with the status quo. We're not okay with it, but we're not careless. We rebel with purpose. It's informed. It's data backed, it's compelling, it's precise, it's meaningful. We are not afraid to state what needs to be said.” </em></p>
<p> </p>
<p>What do you say to those leaders that approach leadership almost like being a martyr? </p>
<p>The hustle and grind of being a leader can feel like endless amounts of hard work. However, in Allison’s experience, overworking yourself and refusing to disconnect maximizes the pain, but minimizes what you gain. Burnout is real, and cybersecurity practitioners definitely know burnout can be fatal for your career. Allison advises resting and giving yourself the time to reflect at the end of a long day, instead of forcing yourself to be a martyr. </p>
<p><em>“Doing that next ‘to-do’ list on your couch at 10:30 pm when you're spent and you're drained is not going to make you the leader you want to be tomorrow. It's going to make you frustrated and tired and not able to perform at a high level the next day.”</em></p>
<p> </p>
<p>How do you differentiate the good advice of intuition from your inner echo chamber of not-so-good advice?</p>
<p>It’s easy to get caught up in the eternal inner echo chamber when trying hard to learn and reflect on your experiences. Allison has had this happen to her, too; getting caught up in reading online comments and letting self-doubt control her thoughts. However, Allison explains that the grit of a true leader can drive you through the setbacks of criticism, whether that criticism comes from outside or within. What matters most is choosing to believe in yourself as a leader. </p>
<p><em>“That's when grit and will come in, in those moments where you're at the bottom of the barrel. Do you believe in yourself? Are you going to choose to believe in yourself, or are you going to choose to believe the comments?” </em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Allison Minutillo on <a href='https://www.linkedin.com/in/allisonminutillo/'>LinkedIn</a></p>
<p>Learn more about Rebel Interactive Group on <a href='https://www.linkedin.com/company/rebel-interactive-group/'>LinkedIn</a> and <a href='https://rebelinteractivegroup.com'>the Rebel website</a></p>
<p>Listen to <a href='https://rebelleadership.buzzsprout.com'>the Rebel Leadership podcast</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/revycr/HVS_audio_Allison_Minutillo_v28ozbw.mp3" length="42331294" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Allison Minutillo, President of Rebel Interactive Group and Host of the Rebel Leadership podcast, joins the Hacker Valley team this week to talk about her journey from individual contributor to company leader. With a leader’s mind and a rebel’s heart, Allison wants Rebel Interactive Group to break down barriers and say what needs to be said. In this episode, Allison talks about intuition vs insecurity, practitioners vs leaders, and burning out vs staying invested and engaged in the world around you. Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
Timecoded Guide:
[00:00] Shifting from an employee to a leadership mindset 
[07:44] Getting real about leadership struggles on the Rebel Leadership podcast
[13:24] Rebelling for the great good of your company & yourself
[19:40] Finding career inspiration as a business owner & company president
[25:41] Struggling to realize your full leadership potential as an individual
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life! 
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
What went into that mindset shift from individual contributor to the leader for you? 
Leadership was an appealing concept to Allison, but stepping into the role of President at a company was beyond her wildest dreams. Being close to Bryn, the former President of Rebel, opened her eyes to the qualities of leadership she wanted in herself. However, the true mindset shift from contributor to leader came from Bryn’s understanding of Allison’s skills. It wasn’t until he brought up her being his successor that Allison saw the leader she knew she could be. 
“I set my sights on what I thought was high. I started over-talking to [Bryn, at Rebel] because I was so nervous, and he said, ‘No, I'm talking about you being my successor, about you being president of Rebel.’ I instantly stopped everything I was saying and it became crystal clear.”
 
What exactly is Rebel Leadership and how does it relate back to your philosophies?
The term “rebel leadership” is a concept that existed before Allison’s Rebel Leadership podcast began, but it embodies what Allison hopes Rebel Interactive Group represents for all of its clients. Being a rebel isn’t just about breaking the rules or telling it like it is, it’s about making a difference. Being a rebel leader is about challenging the status quo for the greater good of your clients, your employees, and your industry.
“It's not rebelling for rebels' sake, it's that we're not good with the status quo. We're not okay with it, but we're not careless. We rebel with purpose. It's informed. It's data backed, it's compelling, it's precise, it's meaningful. We are not afraid to state what needs to be said.” 
 
What do you say to those leaders that approach leadership almost like being a martyr? 
The hustle and grind of being a leader can feel like endless amounts of hard work. However, in Allison’s experience, overworking yourself and refusing to disconnect maximizes the pain, but minimizes what you gain. Burnout is real, and cybersecurity practitioners definitely know burnout can be fatal for your career. Allison advises resting and giving yourself the time to reflect at the end of a long day, instead of forcing yourself to be a martyr. 
“Doing that next ‘to-do’ list on your couch at 10:30 pm when you're spent and you're drained is not going to make you the leader you want to be tomo]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1763</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>259</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>People-Focused Leadership in Cybersecurity with Cody Wass</title>
        <itunes:title>People-Focused Leadership in Cybersecurity with Cody Wass</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/intentional-investments-in-people-focused-leadership-with-cody-wass/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/intentional-investments-in-people-focused-leadership-with-cody-wass/#comments</comments>        <pubDate>Thu, 15 Dec 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f0988aa4-4d5f-3b86-862c-16da39f5382e</guid>
                                    <description><![CDATA[<p>Cody Wass, VP of Services at NetSPI, brings his near-decade of experience to the pod to talk about longevity, development, and leadership. It’s no secret that cybersecurity is in need of people. Cody’s journey from intern to VP at NetSPI has shown him the importance of training employees, creating opportunities for new graduates, and engaging teams effectively, both virtually and in person. In this episode, Cody provides the roadmap toward intentional employee investment in the ever-changing cyber industry.

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Cyber career longevity from NetSPI intern to VP </p>
<p>[07:51] Putting people before process & technology at NetSPI</p>
<p>[15:33] Collaboration as the foundation of the cybersecurity industry</p>
<p>[18:13] Understanding cyber’s entry-level position problem</p>
<p>[24:12] Investing intentionally in employee development  </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor NetSPI for bringing this security podcast to life!</p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p>Detect and protect the unknown with NetSPI's new and free attack surface management scan! Check it out now at <a href='https://asm.netspi.com/'>asm.netspi.com/</a> </p>
<p> </p>
<p>You’ve been at NetSPI for 9 years. When you think about a rewarding feeling in your journey at the company, what comes to mind?</p>
<p>Starting his journey at NetSPI as an intern, Cody has had the rare but impactful opportunity to grow alongside the company. Now, as VP of Services, looks back at the lives he’s impacted himself and the opportunities he’s had to see others grow. Employee development is a huge part of NetSPI’s success. Cody is proud to have seen newcomers join his team and become amazing practitioners over the years.  </p>
<p>“It's really rewarding seeing people come into this industry as a fresh face with a specific skill set, to watch them grow over and see them really spread their wings, and come out the other side stronger, better, and having a skill set that you never would have imagined day one.”</p>
<p> </p>
<p>NetSPI has a very unique culture and philosophy about balancing that duality between technology and people. Could you tell us a little bit about that? </p>
<p>People come first, before process and technology, at NetSPI. While all three elements of this sacred cyber trifecta are important, Cody and his team believe that the balance should focus on making the lives, skills, and experiences of the people at NetSPI better. Process should be taught to the people, with a focus on prosperity and consistency. Technology should be implemented intelligently, with proper training and time given to the people for the best results. </p>
<p>“NetSPI’s differentiator is our people, first and foremost, and then, our process and our technology. We have a ton of really cool things we're doing with tech, but the focus is always on: How can you use that tech to make a person more efficient at their job?”</p>
<p> </p>
<p>How important is collaboration for you and your team at NetSPI?</p>
<p>Collaboration is built into the DNA of NetSPI, from how employees are trained to how NetSPI interacts with the industry around them. Cybersecurity thrives when teams, practitioners, and organizations work together for the sake of the greater good. Even though COVID and remote workers have increased the virtual footprint of NetSPI, Cody still emphasizes the importance of communication and collaboration with his team and to practitioners around the world. </p>
<p>“This industry we work in is super interesting. It'll never be finished; you're never going to learn everything there is about security and be able to call it done. We're far past the point where one person is going to be the expert of everything in cybersecurity.”</p>
<p> </p>
<p>For anyone in a cybersecurity leadership position who wants to start to really invest in their people, what would be your recommendation on where to start?</p>
<p>Intentionality is vital for the success of any leader trying to invest in their employees. Cody explains that it’s one thing for leaders to want to invest in training and professional development opportunities for their team, but another thing entirely when it comes to implementation. If a leader isn’t intentional, they won’t have clear goals for investment and will risk letting implementation fall to the wayside for the sake of a budgetary line. </p>
<p>“Yes, we are going to be making this investment. It is going to cost us. It will cost us time, it will cost us money, but we are committed to making that investment because we know the payoff in 12 months or 18 months or 24 months is going to ultimately be worth it.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Cody Wass on <a href='https://www.linkedin.com/in/cody-wass-0b040187/'>LinkedIn</a></p>
<p>Learn more about NetSPI on <a href='https://www.linkedin.com/company/netspi/'>LinkedIn</a> and <a href='https://www.netspi.com/'>the NetSPI website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Cody Wass, VP of Services at NetSPI, brings his near-decade of experience to the pod to talk about longevity, development, and leadership. It’s no secret that cybersecurity is in need of people. Cody’s journey from intern to VP at NetSPI has shown him the importance of training employees, creating opportunities for new graduates, and engaging teams effectively, both virtually and in person. In this episode, Cody provides the roadmap toward intentional employee investment in the ever-changing cyber industry.<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Cyber career longevity from NetSPI intern to VP </p>
<p>[07:51] Putting people before process & technology at NetSPI</p>
<p>[15:33] Collaboration as the foundation of the cybersecurity industry</p>
<p>[18:13] Understanding cyber’s entry-level position problem</p>
<p>[24:12] Investing intentionally in employee development  </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor NetSPI for bringing this security podcast to life!</p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p>Detect and protect the unknown with NetSPI's new and free attack surface management scan! Check it out now at <a href='https://asm.netspi.com/'>asm.netspi.com/</a> </p>
<p> </p>
<p>You’ve been at NetSPI for 9 years. When you think about a rewarding feeling in your journey at the company, what comes to mind?</p>
<p>Starting his journey at NetSPI as an intern, Cody has had the rare but impactful opportunity to grow alongside the company. Now, as VP of Services, looks back at the lives he’s impacted himself and the opportunities he’s had to see others grow. Employee development is a huge part of NetSPI’s success. Cody is proud to have seen newcomers join his team and become amazing practitioners over the years.  </p>
<p><em>“It's really rewarding seeing people come into this industry as a fresh face with a specific skill set, to watch them grow over and see them really spread their wings, and come out the other side stronger, better, and having a skill set that you never would have imagined day one.”</em></p>
<p> </p>
<p>NetSPI has a very unique culture and philosophy about balancing that duality between technology and people. Could you tell us a little bit about that? </p>
<p>People come first, before process and technology, at NetSPI. While all three elements of this sacred cyber trifecta are important, Cody and his team believe that the balance should focus on making the lives, skills, and experiences of the people at NetSPI better. Process should be taught to the people, with a focus on prosperity and consistency. Technology should be implemented intelligently, with proper training and time given to the people for the best results. </p>
<p><em>“NetSPI’s differentiator is our people, first and foremost, and then, our process and our technology. We have a ton of really cool things we're doing with tech, but the focus is always on: How can you use that tech to make a person more efficient at their job?”</em></p>
<p> </p>
<p>How important is collaboration for you and your team at NetSPI?</p>
<p>Collaboration is built into the DNA of NetSPI, from how employees are trained to how NetSPI interacts with the industry around them. Cybersecurity thrives when teams, practitioners, and organizations work together for the sake of the greater good. Even though COVID and remote workers have increased the virtual footprint of NetSPI, Cody still emphasizes the importance of communication and collaboration with his team and to practitioners around the world. </p>
<p><em>“This industry we work in is super interesting. It'll never be finished; you're never going to learn everything there is about security and be able to call it done. We're far past the point where one person is going to be the expert of everything in cybersecurity.”</em></p>
<p> </p>
<p>For anyone in a cybersecurity leadership position who wants to start to really invest in their people, what would be your recommendation on where to start?</p>
<p>Intentionality is vital for the success of any leader trying to invest in their employees. Cody explains that it’s one thing for leaders to want to invest in training and professional development opportunities for their team, but another thing entirely when it comes to implementation. If a leader isn’t intentional, they won’t have clear goals for investment and will risk letting implementation fall to the wayside for the sake of a budgetary line. </p>
<p><em>“Yes, we are going to be making this investment. It is going to cost us. It will cost us time, it will cost us money, but we are committed to making that investment because we know the payoff in 12 months or 18 months or 24 months is going to ultimately be worth it.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Cody Wass on <a href='https://www.linkedin.com/in/cody-wass-0b040187/'>LinkedIn</a></p>
<p>Learn more about NetSPI on <a href='https://www.linkedin.com/company/netspi/'>LinkedIn</a> and <a href='https://www.netspi.com/'>the NetSPI website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jkeczt/HVS_audio_Cody_Wass_v3bu43p.mp3" length="37163521" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Cody Wass, VP of Services at NetSPI, brings his near-decade of experience to the pod to talk about longevity, development, and leadership. It’s no secret that cybersecurity is in need of people. Cody’s journey from intern to VP at NetSPI has shown him the importance of training employees, creating opportunities for new graduates, and engaging teams effectively, both virtually and in person. In this episode, Cody provides the roadmap toward intentional employee investment in the ever-changing cyber industry.Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
 
Timecoded Guide:
[00:00] Cyber career longevity from NetSPI intern to VP 
[07:51] Putting people before process & technology at NetSPI
[15:33] Collaboration as the foundation of the cybersecurity industry
[18:13] Understanding cyber’s entry-level position problem
[24:12] Investing intentionally in employee development  
 
Sponsor Links:
Thank you to our sponsor NetSPI for bringing this security podcast to life!
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
Detect and protect the unknown with NetSPI's new and free attack surface management scan! Check it out now at asm.netspi.com/ 
 
You’ve been at NetSPI for 9 years. When you think about a rewarding feeling in your journey at the company, what comes to mind?
Starting his journey at NetSPI as an intern, Cody has had the rare but impactful opportunity to grow alongside the company. Now, as VP of Services, looks back at the lives he’s impacted himself and the opportunities he’s had to see others grow. Employee development is a huge part of NetSPI’s success. Cody is proud to have seen newcomers join his team and become amazing practitioners over the years.  
“It's really rewarding seeing people come into this industry as a fresh face with a specific skill set, to watch them grow over and see them really spread their wings, and come out the other side stronger, better, and having a skill set that you never would have imagined day one.”
 
NetSPI has a very unique culture and philosophy about balancing that duality between technology and people. Could you tell us a little bit about that? 
People come first, before process and technology, at NetSPI. While all three elements of this sacred cyber trifecta are important, Cody and his team believe that the balance should focus on making the lives, skills, and experiences of the people at NetSPI better. Process should be taught to the people, with a focus on prosperity and consistency. Technology should be implemented intelligently, with proper training and time given to the people for the best results. 
“NetSPI’s differentiator is our people, first and foremost, and then, our process and our technology. We have a ton of really cool things we're doing with tech, but the focus is always on: How can you use that tech to make a person more efficient at their job?”
 
How important is collaboration for you and your team at NetSPI?
Collaboration is built into the DNA of NetSPI, from how employees are trained to how NetSPI interacts with the industry around them. Cybersecurity thrives when teams, practitioners, and organizations work together for the sake of the greater good. Even though COVID and remote workers have increased the virtual footprint of NetSPI, Cody still emphasizes the importance of communication and collaboration with his team and to practitioners around the world. 
“This industry we work in is super interesting. It'll never be finished; you're never going to learn everything there is about security and be able to call it done. We're far past the point where one person is going to be the expert of everything in cybersecurity.”
 
For a]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1548</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>260</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Improv-ing Your Way to Better Vendor Meetings With Brad Liggett</title>
        <itunes:title>Improv-ing Your Way to Better Vendor Meetings With Brad Liggett</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/improv-ing-your-way-to-better-customer-meetings-with-brad-liggett/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/improv-ing-your-way-to-better-customer-meetings-with-brad-liggett/#comments</comments>        <pubDate>Tue, 13 Dec 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/77e64675-ed65-367e-8d36-44ef547c3435</guid>
                                    <description><![CDATA[<p>Brad Liggett, CTI Intel Engineer Manager at Cybersixgill, puts on his improv hat and joins the pod ready for anything. After COVID pressed pause on daily life, Brad kept himself sane and gained some new skills by returning to his improv roots (a hobby he had in the ‘90s) and taking up Dungeons & Dragons. In this episode, Brad covers the importance of improv skills in the professional world, the opportunities to add elements of gaming into cyber, and advice for practitioners looking to be more agile.

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Introducing the unique combination of improv & cybersecurity</p>
<p>[05:57] Being a life-long learner in cybersecurity & in improv groups</p>
<p>[13:20] Practicing improvisational skills for cybersecurity customer conversations  </p>
<p>[18:17] Bringing in games & elements of play into cybersecurity environments</p>
<p>[24:38] Advice for a more agile, improvisational tomorrow</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>Is there a skill that you called upon during an interaction with a customer where you really leaned on your improv muscle? </p>
<p>Improv often involves one phrase that Brad believes other industries should incorporate, too: “Yes, and.” In cybersecurity, Brad leans heavily on the “Yes, and,” phrase because it encourages conversations to move forward authentically. Meetings aren’t successful when customers and clients feel uncomfortable and unengaged. Being able to think on his feet and prepare for changes makes Brad a stronger, more agile practitioner and communicator.</p>
<p>“The whole concept of moving the meeting forward and making sure that there are no uncomfortable silences. Be prepared, have an idea of what you want to talk about, but inevitably, the client you're talking to, everyone's going to be unique.”</p>
<p> </p>
<p>What do you think is the glue that holds your interests in cyber and improv together?</p>
<p>Being a life-long learner is something extremely important and valuable for Brad. For improv, research on the latest media, memes, and movies influences his work and motivates him to stay up-to-date and be involved in some fun research. Cybersecurity is the same way. Brad believes to be the best practitioner and leader for his team, he needs to be knowledgeable about vendors, threats, products, and all things new in the industry.</p>
<p>“You always have to be reading, you always have to be aware of what's going on in the environment out there in the world, so that as those things come up, at least you can somewhat talk to them and start to put those pieces together.”</p>
<p> </p>
<p>What has been your experience with bringing an element of play into cyber?</p>
<p>Cybersecurity can’t be all work and no play. Instead, Brad believes that cybersecurity teams should continue to prioritize the gamification of training processes, as well as just letting their teams have a little fun. Sometimes, to build a strong, trusting team, there needs to be an outside outlet for problem-solving, puzzling, and creativity. Brad even brought his team at Cybersixgill to a Meow Wolf exhibition this year for that same team-building reason. </p>
<p>“We work hard, but we also should make sure that we play, and not only just do that individually, but even as teams, especially now. It's not always going to be about the training aspect, you also have to take that time to bring that team together.”</p>
<p> </p>
<p>What is a piece of wisdom that people could take with them to work tomorrow to make them more agile and improvisational?</p>
<p>When it comes to agility and improvisational skills, you have to have a strong foundation to build off of. For Brad, taking time for himself and understanding when and how he learns best has been vital to his success. Listening to podcasts at the gym, reading something new at hotels, and getting a good night’s sleep are all little things that help Brad consistently become more agile and improvisational at work. </p>
<p>“For me, it’s always having some sacred time at the end of the day. There's no TV in my bedroom, and my phone is telling me around 8:30, ‘Hey, it's wind down time,’ and that's when I'm getting in the mode for sleep, and then making sure I've got a good night's sleep.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Brad Liggett on <a href='https://www.linkedin.com/in/bradliggett/'>LinkedIn</a> and <a href='https://twitter.com/brad_liggett'>Twitter</a></p>
<p>Learn more about Cybersixgill on <a href='https://www.linkedin.com/company/sixgill/'>LinkedIn</a> and <a href='https://www.cybersixgill.com'>the Cybersixgill website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Brad Liggett, CTI Intel Engineer Manager at Cybersixgill, puts on his improv hat and joins the pod ready for anything. After COVID pressed pause on daily life, Brad kept himself sane and gained some new skills by returning to his improv roots (a hobby he had in the ‘90s) and taking up Dungeons & Dragons. In this episode, Brad covers the importance of improv skills in the professional world, the opportunities to add elements of gaming into cyber, and advice for practitioners looking to be more agile.<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Introducing the unique combination of improv & cybersecurity</p>
<p>[05:57] Being a life-long learner in cybersecurity & in improv groups</p>
<p>[13:20] Practicing improvisational skills for cybersecurity customer conversations  </p>
<p>[18:17] Bringing in games & elements of play into cybersecurity environments</p>
<p>[24:38] Advice for a more agile, improvisational tomorrow</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!<br>
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>Is there a skill that you called upon during an interaction with a customer where you really leaned on your improv muscle? </p>
<p>Improv often involves one phrase that Brad believes other industries should incorporate, too: “Yes, and.” In cybersecurity, Brad leans heavily on the “Yes, and,” phrase because it encourages conversations to move forward authentically. Meetings aren’t successful when customers and clients feel uncomfortable and unengaged. Being able to think on his feet and prepare for changes makes Brad a stronger, more agile practitioner and communicator.</p>
<p><em>“The whole concept of moving the meeting forward and making sure that there are no uncomfortable silences. Be prepared, have an idea of what you want to talk about, but inevitably, the client you're talking to, everyone's going to be unique.”</em></p>
<p> </p>
<p>What do you think is the glue that holds your interests in cyber and improv together?</p>
<p>Being a life-long learner is something extremely important and valuable for Brad. For improv, research on the latest media, memes, and movies influences his work and motivates him to stay up-to-date and be involved in some fun research. Cybersecurity is the same way. Brad believes to be the best practitioner and leader for his team, he needs to be knowledgeable about vendors, threats, products, and all things new in the industry.</p>
<p><em>“You always have to be reading, you always have to be aware of what's going on in the environment out there in the world, so that as those things come up, at least you can somewhat talk to them and start to put those pieces together.”</em></p>
<p> </p>
<p>What has been your experience with bringing an element of play into cyber?</p>
<p>Cybersecurity can’t be all work and no play. Instead, Brad believes that cybersecurity teams should continue to prioritize the gamification of training processes, as well as just letting their teams have a little fun. Sometimes, to build a strong, trusting team, there needs to be an outside outlet for problem-solving, puzzling, and creativity. Brad even brought his team at Cybersixgill to a Meow Wolf exhibition this year for that same team-building reason. </p>
<p><em>“We work hard, but we also should make sure that we play, and not only just do that individually, but even as teams, especially now. It's not always going to be about the training aspect, you also have to take that time to bring that team together.”</em></p>
<p> </p>
<p>What is a piece of wisdom that people could take with them to work tomorrow to make them more agile and improvisational?</p>
<p>When it comes to agility and improvisational skills, you have to have a strong foundation to build off of. For Brad, taking time for himself and understanding when and how he learns best has been vital to his success. Listening to podcasts at the gym, reading something new at hotels, and getting a good night’s sleep are all little things that help Brad consistently become more agile and improvisational at work. </p>
<p><em>“For me, it’s always having some sacred time at the end of the day. There's no TV in my bedroom, and my phone is telling me around 8:30, ‘Hey, it's wind down time,’ and that's when I'm getting in the mode for sleep, and then making sure I've got a good night's sleep.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Brad Liggett on <a href='https://www.linkedin.com/in/bradliggett/'>LinkedIn</a> and <a href='https://twitter.com/brad_liggett'>Twitter</a></p>
<p>Learn more about Cybersixgill on <a href='https://www.linkedin.com/company/sixgill/'>LinkedIn</a> and <a href='https://www.cybersixgill.com'>the Cybersixgill website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/69zgrd/HVS_audio_Brad_Liggett_v26gzql.mp3" length="40140180" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Brad Liggett, CTI Intel Engineer Manager at Cybersixgill, puts on his improv hat and joins the pod ready for anything. After COVID pressed pause on daily life, Brad kept himself sane and gained some new skills by returning to his improv roots (a hobby he had in the ‘90s) and taking up Dungeons & Dragons. In this episode, Brad covers the importance of improv skills in the professional world, the opportunities to add elements of gaming into cyber, and advice for practitioners looking to be more agile.Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
 
Timecoded Guide:
[00:00] Introducing the unique combination of improv & cybersecurity
[05:57] Being a life-long learner in cybersecurity & in improv groups
[13:20] Practicing improvisational skills for cybersecurity customer conversations  
[18:17] Bringing in games & elements of play into cybersecurity environments
[24:38] Advice for a more agile, improvisational tomorrow
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
Is there a skill that you called upon during an interaction with a customer where you really leaned on your improv muscle? 
Improv often involves one phrase that Brad believes other industries should incorporate, too: “Yes, and.” In cybersecurity, Brad leans heavily on the “Yes, and,” phrase because it encourages conversations to move forward authentically. Meetings aren’t successful when customers and clients feel uncomfortable and unengaged. Being able to think on his feet and prepare for changes makes Brad a stronger, more agile practitioner and communicator.
“The whole concept of moving the meeting forward and making sure that there are no uncomfortable silences. Be prepared, have an idea of what you want to talk about, but inevitably, the client you're talking to, everyone's going to be unique.”
 
What do you think is the glue that holds your interests in cyber and improv together?
Being a life-long learner is something extremely important and valuable for Brad. For improv, research on the latest media, memes, and movies influences his work and motivates him to stay up-to-date and be involved in some fun research. Cybersecurity is the same way. Brad believes to be the best practitioner and leader for his team, he needs to be knowledgeable about vendors, threats, products, and all things new in the industry.
“You always have to be reading, you always have to be aware of what's going on in the environment out there in the world, so that as those things come up, at least you can somewhat talk to them and start to put those pieces together.”
 
What has been your experience with bringing an element of play into cyber?
Cybersecurity can’t be all work and no play. Instead, Brad believes that cybersecurity teams should continue to prioritize the gamification of training processes, as well as just letting their teams have a little fun. Sometimes, to build a strong, trusting team, there needs to be an outside outlet for problem-solving, puzzling, and creativity. Brad even brought his team at Cybersixgill to a Meow Wolf exhibition this year for that same team-building reason. 
“We work hard, but we also should make sure that we play, and not only just do that individually, but even as teams, especially now. It's not always going to be about the training aspect, you also have to take that time to bring that tea]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1672</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>258</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Prioritizing &amp; Proactive Cybersecurity with Richard Rushing</title>
        <itunes:title>Prioritizing &amp; Proactive Cybersecurity with Richard Rushing</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/learning-prioritization-for-career-longevity-with-richard-rushing/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/learning-prioritization-for-career-longevity-with-richard-rushing/#comments</comments>        <pubDate>Tue, 06 Dec 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/aaade365-a6e7-34a3-9528-8f318f864a04</guid>
                                    <description><![CDATA[<p>Richard Rushing, CISO at Motorola Mobility, brings his decades of experience to the show this week to talk about leadership, communication, and perhaps most importantly of all: prioritization. After joining Motorola through a startup acquisition, Richard has been a leader in the company and a defining example of what a CISO should be doing: simplifying the complicated. Richard talks about how his role has changed over the last 10 years and what’s next for him and for cybersecurity.

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
</p>
<p> </p>
<p>Time Code Guide:</p>
<p>[00:00] Ascending into a leadership role in cybersecurity & joining the Motorola team</p>
<p>[06:28] Defining CSO & CISO at a time when no one understood cybersecurity</p>
<p>[13:01] Communicating with the C-suite about cyber: best practices & tenants</p>
<p>[24:37] Harnessing a proactive cybersecurity mindset with prioritization</p>
<p>[32:13] Extending your cybersecurity career for decades</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What was your experience of being a Chief Security Officer in the early 2000s?</p>
<p>Richard jokes that he became a part of the cyber industry before the industry was even called cybersecurity, but behind the joke lies the truth that cyber looked extremely different back then. However, no matter how much time passes, Richard is still used to the odd confused looks that come from saying he’s a CISO. People misunderstand the role, Richard explains, but at least more people than ever before understand the importance of cybersecurity.</p>
<p>“There were a lot of other things that you had to talk about, you had to evangelize a lot coming into this [industry] because a lot of the cybersecurity industry was brand new. People were moving around and trying to figure these things out and everybody struggled.”</p>
<p> </p>
<p>How many times would you say you feel like you've had a new job or a new role being in the same role for over 10 years? </p>
<p>Being a CISO has had its ups and downs during the 10 years Richard has spent in that role at Motorola, but the changes have been welcome and interesting. Every few years, the technology landscape changes, and with those changes in tech come massive changes in company ownership, leadership, and security. However, Richard is thankful that through these changes, his core team has stayed the same, giving him a trustworthy group to learn from.</p>
<p>“It's always changing, but at the same time, there are some static components. When I came on to Motorola 15 years ago and established teams, most of my team, except for a very small portion of people that retired or left, are still with me today.”</p>
<p> </p>
<p>What are your thoughts and best practices for proactive cybersecurity?</p>
<p>Although “proactive cybersecurity” has become a buzzword we’re all paying attention to, Richard warns that most companies aren’t really being proactive with cybersecurity just yet. Instead, what the industry has shifted towards is prioritization. Understanding what’s important, prioritizing those aspects of a business, and knowing what you don’t have the resources to handle can make the security work you’re doing feel more proactive. </p>
<p>“Why do I need to prioritize? Because you're getting more alerts than you have people to be able to handle it or technologies to be able to handle it in an automated way. So, you have to prioritize what's important.” </p>
<p> </p>
<p>What would you recommend people consider to extend their cybersecurity career life as long as you have?</p>
<p>After nearly four decades in the industry and over ten years at Motorola, Richard has been in cybersecurity longer than most modern-day practitioners. When asked about his secrets for an extended cybersecurity career, Richard reflects back on his advice around prioritization over “proactive cybersecurity”, and emphasizes the importance of community. Cybersecurity is a collaborative field, and practitioners have to stay open to learning together to succeed. </p>
<p>“In the cybersecurity world, we will talk to our competitors and share what we're seeing. I think that community effort is one of the key things. You have to enjoy what you're doing, reach out and be collaborative with people. Don't be the security guy that people are scared of.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Richard Rushing on <a href='https://www.linkedin.com/in/richardrushing/'>LinkedIn</a> and <a href='https://twitter.com/SecRich'>Twitter</a></p>
<p>Learn more about Motorola Mobility on <a href='https://www.linkedin.com/company/motorola-mobility/'>LinkedIn</a> and <a href='https://www.motorola.com/us/'>the Motorola website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Richard Rushing, CISO at Motorola Mobility, brings his decades of experience to the show this week to talk about leadership, communication, and perhaps most importantly of all: prioritization. After joining Motorola through a startup acquisition, Richard has been a leader in the company and a defining example of what a CISO should be doing: simplifying the complicated. Richard talks about how his role has changed over the last 10 years and what’s next for him and for cybersecurity.<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
</p>
<p> </p>
<p>Time Code Guide:</p>
<p>[00:00] Ascending into a leadership role in cybersecurity & joining the Motorola team</p>
<p>[06:28] Defining CSO & CISO at a time when no one understood cybersecurity</p>
<p>[13:01] Communicating with the C-suite about cyber: best practices & tenants</p>
<p>[24:37] Harnessing a proactive cybersecurity mindset with prioritization</p>
<p>[32:13] Extending your cybersecurity career for decades</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What was your experience of being a Chief Security Officer in the early 2000s?</p>
<p>Richard jokes that he became a part of the cyber industry before the industry was even called cybersecurity, but behind the joke lies the truth that cyber looked extremely different back then. However, no matter how much time passes, Richard is still used to the odd confused looks that come from saying he’s a CISO. People misunderstand the role, Richard explains, but at least more people than ever before understand the importance of cybersecurity.</p>
<p><em>“There were a lot of other things that you had to talk about, you had to evangelize a lot coming into this [industry] because a lot of the cybersecurity industry was brand new. People were moving around and trying to figure these things out and everybody struggled.”</em></p>
<p> </p>
<p>How many times would you say you feel like you've had a new job or a new role being in the same role for over 10 years? </p>
<p>Being a CISO has had its ups and downs during the 10 years Richard has spent in that role at Motorola, but the changes have been welcome and interesting. Every few years, the technology landscape changes, and with those changes in tech come massive changes in company ownership, leadership, and security. However, Richard is thankful that through these changes, his core team has stayed the same, giving him a trustworthy group to learn from.</p>
<p><em>“It's always changing, but at the same time, there are some static components. When I came on to Motorola 15 years ago and established teams, most of my team, except for a very small portion of people that retired or left, are still with me today.”</em></p>
<p> </p>
<p>What are your thoughts and best practices for proactive cybersecurity?</p>
<p>Although “proactive cybersecurity” has become a buzzword we’re all paying attention to, Richard warns that most companies aren’t <em>really</em> being proactive with cybersecurity just yet. Instead, what the industry has shifted towards is prioritization. Understanding what’s important, prioritizing those aspects of a business, and knowing what you don’t have the resources to handle can make the security work you’re doing feel more proactive. </p>
<p><em>“Why do I need to prioritize? Because you're getting more alerts than you have people to be able to handle it or technologies to be able to handle it in an automated way. So, you have to prioritize what's important.” </em></p>
<p> </p>
<p>What would you recommend people consider to extend their cybersecurity career life as long as you have?</p>
<p>After nearly four decades in the industry and over ten years at Motorola, Richard has been in cybersecurity longer than most modern-day practitioners. When asked about his secrets for an extended cybersecurity career, Richard reflects back on his advice around prioritization over “proactive cybersecurity”, and emphasizes the importance of community. Cybersecurity is a collaborative field, and practitioners have to stay open to learning together to succeed. </p>
<p><em>“In the cybersecurity world, we will talk to our competitors and share what we're seeing. I think that community effort is one of the key things. You have to enjoy what you're doing, reach out and be collaborative with people. Don't be the security guy that people are scared of.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Richard Rushing on <a href='https://www.linkedin.com/in/richardrushing/'>LinkedIn</a> and <a href='https://twitter.com/SecRich'>Twitter</a></p>
<p>Learn more about Motorola Mobility on <a href='https://www.linkedin.com/company/motorola-mobility/'>LinkedIn</a> and <a href='https://www.motorola.com/us/'>the Motorola website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xf7mht/HVS_audio_Richard_Rushing_v36z158.mp3" length="60388224" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Richard Rushing, CISO at Motorola Mobility, brings his decades of experience to the show this week to talk about leadership, communication, and perhaps most importantly of all: prioritization. After joining Motorola through a startup acquisition, Richard has been a leader in the company and a defining example of what a CISO should be doing: simplifying the complicated. Richard talks about how his role has changed over the last 10 years and what’s next for him and for cybersecurity.Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
 
Time Code Guide:
[00:00] Ascending into a leadership role in cybersecurity & joining the Motorola team
[06:28] Defining CSO & CISO at a time when no one understood cybersecurity
[13:01] Communicating with the C-suite about cyber: best practices & tenants
[24:37] Harnessing a proactive cybersecurity mindset with prioritization
[32:13] Extending your cybersecurity career for decades
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
What was your experience of being a Chief Security Officer in the early 2000s?
Richard jokes that he became a part of the cyber industry before the industry was even called cybersecurity, but behind the joke lies the truth that cyber looked extremely different back then. However, no matter how much time passes, Richard is still used to the odd confused looks that come from saying he’s a CISO. People misunderstand the role, Richard explains, but at least more people than ever before understand the importance of cybersecurity.
“There were a lot of other things that you had to talk about, you had to evangelize a lot coming into this [industry] because a lot of the cybersecurity industry was brand new. People were moving around and trying to figure these things out and everybody struggled.”
 
How many times would you say you feel like you've had a new job or a new role being in the same role for over 10 years? 
Being a CISO has had its ups and downs during the 10 years Richard has spent in that role at Motorola, but the changes have been welcome and interesting. Every few years, the technology landscape changes, and with those changes in tech come massive changes in company ownership, leadership, and security. However, Richard is thankful that through these changes, his core team has stayed the same, giving him a trustworthy group to learn from.
“It's always changing, but at the same time, there are some static components. When I came on to Motorola 15 years ago and established teams, most of my team, except for a very small portion of people that retired or left, are still with me today.”
 
What are your thoughts and best practices for proactive cybersecurity?
Although “proactive cybersecurity” has become a buzzword we’re all paying attention to, Richard warns that most companies aren’t really being proactive with cybersecurity just yet. Instead, what the industry has shifted towards is prioritization. Understanding what’s important, prioritizing those aspects of a business, and knowing what you don’t have the resources to handle can make the security work you’re doing feel more proactive. 
“Why do I need to prioritize? Because you're getting more alerts than you have people to be able to handle it or technologies to be able to handle it in an automated way. So, you have to prioritize ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2515</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>257</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Keeping Cyber Course Prices Equitable with Kenneth Ellington</title>
        <itunes:title>Keeping Cyber Course Prices Equitable with Kenneth Ellington</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/equitable-education-costs-in-online-cyber-courses-with-kenneth-ellington/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/equitable-education-costs-in-online-cyber-courses-with-kenneth-ellington/#comments</comments>        <pubDate>Tue, 29 Nov 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/30bfa735-86ea-34e4-88a7-99198379ffd1</guid>
                                    <description><![CDATA[<p>Kenneth Ellington, the Senior Cybersecurity Consultant at EY and Founder of the Ellington Cyber Academy, achieves his goal of being on the Hacker Valley Studio this week. From working at Publix in college to becoming an online course instructor, Kenneth’s journey into the cyber industry has been heavily influenced by online educators like Chris and Ron. Kenneth covers barriers to entry for cyber, SOAR vs SIM, and how much further we need to go for representation in the industry.

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
</p>
<p> </p>
<p>Timecode Guide:</p>
<p>[00:00] Starting a cyber career at the Publix deli counter</p>
<p>[05:16] Fighting through introversion to become an online instructor</p>
<p>[11:02] Setting equitable & understandable prices for cyber courses</p>
<p>[15:54] Looking into the future of SOAR vs SIM to see what’s next</p>
<p>[19:27] Taking the chance on content creation as a new cyber professional</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life!
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What areas do you feel confident in as a new teacher, and what do you still struggle to get your footing on? </p>
<p>As someone newer to online teaching, having only done it for 2 years, Kenneth is confident in his communication skills, but still struggles with fully grasping new technology. On the bright side, Kenneth believes those technical skills come with time and practice, something he’s 100% willing to do. What helps him stand out as a strong teacher is something harder to learn— communication with others and de-escalating stressful situations for students. </p>
<p>“I worked at Publix for four years in the deli, dealing with customers, and that forced me to develop those soft skills about how to talk to people and how to communicate and how to de-escalate situations. That's how I set myself apart.”</p>
<p> </p>
<p>What are some of the things that you're thinking about when it comes to setting the pricing for your course content? </p>
<p>No matter how his prices change or how skilled he becomes, Kenneth still believes in fair and equitable pricing for his course content. Considering his experience and expertise, Kenneth charges at least half of what I vendor might charge for similar content and knowledge. However, Kenneth doesn’t believe in thousands of dollars being spent on his courses, because he wants entry-level students like himself to be able to afford to learn.</p>
<p>“I'm very honest with myself, what my skill level is, and the value I bring towards it. Because I've been doing this for over two years, technically, I've gotten a pretty good gauge as to what people are willing to pay for and the value that I can bring.”</p>
<p> </p>
<p>Do you have anything you’re looking to expand into with Ellington Academy? </p>
<p>While SOAR and SIM are Ellington Academy's bread and butter, Kenneth is looking forward to continuing to expand his expertise and scale his content. A future upcoming goal Kenneth has is giving back to the country of Jamaica, where his family is originally from. Through providing courses or recruitment opportunities, he wants to bring cyber skills to everyone.</p>
<p>“From a legacy perspective, I want to leave a positive mark on this world, just to make it better than when I got here. One of my big goals, I don't know if it's gonna happen, but my family is from Jamaica, so I'm hoping I can maybe put ECA there someday.”</p>
<p> </p>
<p>What advice would you give to a newbie in cybersecurity looking to start making content? </p>
<p>Kenneth got his start at the Publix deli counter, and he understands that the beginning of someone’s cyber journey can look just like his— inexperienced but hungry for knowledge. For newcomers to the industry, Kenneth wants to reassure you that you’re never too young to teach or too old to learn. Take courses, expand your knowledge, and give back to people with less knowledge than you through accessible learning content of your own.  </p>
<p>“Take the opportunity to try to do something new because your knowledge is valuable, no matter how much or how little that you have. Everybody can learn something from everyone. I always try to help out however I can.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Kenneth Ellington on <a href='https://www.linkedin.com/in/kenneth-ellington-67599015a/'>LinkedIn</a></p>
<p>Check out the <a href='https://kenneth-ellington-s-school.teachable.com'>Ellington Cyber Academy</a></p>
<p>Learn more about EY on <a href='https://www.linkedin.com/company/ernstandyoung/'>LinkedIn</a> and <a href='https://www.ey.com/en_gl'>the EY website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Kenneth Ellington, the Senior Cybersecurity Consultant at EY and Founder of the Ellington Cyber Academy, achieves his goal of being on the Hacker Valley Studio this week. From working at Publix in college to becoming an online course instructor, Kenneth’s journey into the cyber industry has been heavily influenced by online educators like Chris and Ron. Kenneth covers barriers to entry for cyber, SOAR vs SIM, and how much further we need to go for representation in the industry.<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
</p>
<p> </p>
<p>Timecode Guide:</p>
<p>[00:00] Starting a cyber career at the Publix deli counter</p>
<p>[05:16] Fighting through introversion to become an online instructor</p>
<p>[11:02] Setting equitable & understandable prices for cyber courses</p>
<p>[15:54] Looking into the future of SOAR vs SIM to see what’s next</p>
<p>[19:27] Taking the chance on content creation as a new cyber professional</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life!<br>
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What areas do you feel confident in as a new teacher, and what do you still struggle to get your footing on? </p>
<p>As someone newer to online teaching, having only done it for 2 years, Kenneth is confident in his communication skills, but still struggles with fully grasping new technology. On the bright side, Kenneth believes those technical skills come with time and practice, something he’s 100% willing to do. What helps him stand out as a strong teacher is something harder to learn— communication with others and de-escalating stressful situations for students. </p>
<p><em>“I worked at Publix for four years in the deli, dealing with customers, and that forced me to develop those soft skills about how to talk to people and how to communicate and how to de-escalate situations. That's how I set myself apart.”</em></p>
<p> </p>
<p>What are some of the things that you're thinking about when it comes to setting the pricing for your course content? </p>
<p>No matter how his prices change or how skilled he becomes, Kenneth still believes in fair and equitable pricing for his course content. Considering his experience and expertise, Kenneth charges at least half of what I vendor might charge for similar content and knowledge. However, Kenneth doesn’t believe in thousands of dollars being spent on his courses, because he wants entry-level students like himself to be able to afford to learn.</p>
<p><em>“I'm very honest with myself, what my skill level is, and the value I bring towards it. Because I've been doing this for over two years, technically, I've gotten a pretty good gauge as to what people are willing to pay for and the value that I can bring.”</em></p>
<p> </p>
<p>Do you have anything you’re looking to expand into with Ellington Academy? </p>
<p>While SOAR and SIM are Ellington Academy's bread and butter, Kenneth is looking forward to continuing to expand his expertise and scale his content. A future upcoming goal Kenneth has is giving back to the country of Jamaica, where his family is originally from. Through providing courses or recruitment opportunities, he wants to bring cyber skills to everyone.</p>
<p><em>“From a legacy perspective, I want to leave a positive mark on this world, just to make it better than when I got here. One of my big goals, I don't know if it's gonna happen, but my family is from Jamaica, so I'm hoping I can maybe put ECA there someday.”</em></p>
<p> </p>
<p>What advice would you give to a newbie in cybersecurity looking to start making content? </p>
<p>Kenneth got his start at the Publix deli counter, and he understands that the beginning of someone’s cyber journey can look just like his— inexperienced but hungry for knowledge. For newcomers to the industry, Kenneth wants to reassure you that you’re never too young to teach or too old to learn. Take courses, expand your knowledge, and give back to people with less knowledge than you through accessible learning content of your own.  </p>
<p><em>“Take the opportunity to try to do something new because your knowledge is valuable, no matter how much or how little that you have. Everybody can learn something from everyone. I always try to help out however I can.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Kenneth Ellington on <a href='https://www.linkedin.com/in/kenneth-ellington-67599015a/'>LinkedIn</a></p>
<p>Check out the <a href='https://kenneth-ellington-s-school.teachable.com'>Ellington Cyber Academy</a></p>
<p>Learn more about EY on <a href='https://www.linkedin.com/company/ernstandyoung/'>LinkedIn</a> and <a href='https://www.ey.com/en_gl'>the EY website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase an HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pfw88z/HVS_audio_Kenneth_Ellington_v268vi2.mp3" length="31846528" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Kenneth Ellington, the Senior Cybersecurity Consultant at EY and Founder of the Ellington Cyber Academy, achieves his goal of being on the Hacker Valley Studio this week. From working at Publix in college to becoming an online course instructor, Kenneth’s journey into the cyber industry has been heavily influenced by online educators like Chris and Ron. Kenneth covers barriers to entry for cyber, SOAR vs SIM, and how much further we need to go for representation in the industry.Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
 
Timecode Guide:
[00:00] Starting a cyber career at the Publix deli counter
[05:16] Fighting through introversion to become an online instructor
[11:02] Setting equitable & understandable prices for cyber courses
[15:54] Looking into the future of SOAR vs SIM to see what’s next
[19:27] Taking the chance on content creation as a new cyber professional
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this security podcast to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive offensive security solutions. Visit netspi.com/HVM to learn more.
 
What areas do you feel confident in as a new teacher, and what do you still struggle to get your footing on? 
As someone newer to online teaching, having only done it for 2 years, Kenneth is confident in his communication skills, but still struggles with fully grasping new technology. On the bright side, Kenneth believes those technical skills come with time and practice, something he’s 100% willing to do. What helps him stand out as a strong teacher is something harder to learn— communication with others and de-escalating stressful situations for students. 
“I worked at Publix for four years in the deli, dealing with customers, and that forced me to develop those soft skills about how to talk to people and how to communicate and how to de-escalate situations. That's how I set myself apart.”
 
What are some of the things that you're thinking about when it comes to setting the pricing for your course content? 
No matter how his prices change or how skilled he becomes, Kenneth still believes in fair and equitable pricing for his course content. Considering his experience and expertise, Kenneth charges at least half of what I vendor might charge for similar content and knowledge. However, Kenneth doesn’t believe in thousands of dollars being spent on his courses, because he wants entry-level students like himself to be able to afford to learn.
“I'm very honest with myself, what my skill level is, and the value I bring towards it. Because I've been doing this for over two years, technically, I've gotten a pretty good gauge as to what people are willing to pay for and the value that I can bring.”
 
Do you have anything you’re looking to expand into with Ellington Academy? 
While SOAR and SIM are Ellington Academy's bread and butter, Kenneth is looking forward to continuing to expand his expertise and scale his content. A future upcoming goal Kenneth has is giving back to the country of Jamaica, where his family is originally from. Through providing courses or recruitment opportunities, he wants to bring cyber skills to everyone.
“From a legacy perspective, I want to leave a positive mark on this world, just to make it better than when I got here. One of my big goals, I don't know if it's gonna happen, but my family is from Jamaica, so I'm hoping I can maybe put ECA there someday.”
 
What advice would you give to a newbie in cybersecurity looking to star]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1326</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>255</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Sharing Cyber Outside of the Security Bubble with Lesley Carhart</title>
        <itunes:title>Sharing Cyber Outside of the Security Bubble with Lesley Carhart</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/educating-outside-of-the-cyber-industry-bubble-with-2020-hacker-of-the-year-lesley-carhart/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/educating-outside-of-the-cyber-industry-bubble-with-2020-hacker-of-the-year-lesley-carhart/#comments</comments>        <pubDate>Tue, 22 Nov 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/86f07a13-4c7f-3bb1-92b5-d39b5a00a18d</guid>
                                    <description><![CDATA[<p>Lesley Carhart, Director of Incident Response at Dragos, takes some time off mentoring cybersecurity practitioners, responding to OT incidents, and training in martial arts to hop on the mics this week. Named Hacker of the Year in 2020, Lesley’s impact on the industry stretches far and wide. As an incredible content creator for cybersecurity, Lesley advises listeners on how to find their niche and who to be willing to educate along the way.

Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Giving back to the community through martial arts & cyber education</p>
<p>[06:13] Being excluded from the cyber industry & turning to content creation instead</p>
<p>[12:33] Comparing incident response in IT vs OT environments</p>
<p>[19:46] Dealing with post-COVID problems with the wrong OT systems online</p>
<p>[26:51] Finding your cyber niche & exploring education options within it</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What inspired you to start creating cybersecurity content?</p>
<p>Lesley’s cybersecurity content has vastly influenced and impacted many cyber practitioners in the industry, including Ron and Chris. Unfortunately, Lesley’s journey into content creation was inspired by the lack of mentorship they received from other professionals when they were starting out. Never wanting anyone to feel the way they did, Lesley created an online world of resources to warmly welcome and educate new practitioners.  </p>
<p>“It's not a really glamorous story. When I got into cybersecurity, I wanted to do digital forensics and nobody would help me, nobody would actually take me seriously and give me a shot. Everybody should have a chance to get into cybersecurity if it's something they want to do.”</p>
<p> </p>
<p>How has teaching cyber to a general audience been appealing to you?</p>
<p>When not educating new cyber practitioners or tearing it up in the martial arts studio, Lesley likes to reach out to their community and give talks to audiences outside of typical tech and security groups. From churches to universities, Lesley loves meeting people outside of the cyber industry. These individuals always offer them a new perspective and a feeling of accomplishment for showing someone something new. </p>
<p>“It's enjoyable to me to find other people out there who want to learn about an entirely new topic and expose themselves to its problems and how it impacts society and things like that. I appreciate that. Cybersecurity is important and it impacts everything around us all the time.”</p>
<p> </p>
<p>In your world, where does incident response start, and where does it stop?</p>
<p>Like many of cyber’s most complicated concepts, the answer to where incident response starts and ends is subjective to certain resources and elements of an organization. Lesley explains that incident response has to be planned and that the planning process has to involve when to declare an incident and when to close the said incident. Without proper planning in advance, an organization is at risk for a crisis that could’ve been responded to quickly turning into an out-of-control attack. </p>
<p>“There's no perfect defense against an incident, everybody's vulnerable. You do your best to mitigate and avoid having a cybersecurity incident, but there's only so much you can do. Eventually, you have to assume that you're gonna have an incident.”</p>
<p> </p>
<p>What piece of advice do you have for anyone looking to share more knowledge and make the cyber industry better? </p>
<p>Although everything in cybersecurity can seem daunting, expansive, and interesting to everyone, Lesley’s recommendation to new practitioners is to find a niche in cyber and stick to it for a while. Finding a niche doesn’t have to be permanent, but Lesley believes that niche will help you carve out extensive knowledge worth sharing and creating content around. When you discover that niche, don’t be afraid to reach out to other industry experts along the way.</p>
<p>“Pick an area and then find mentorship in that and try to focus for a couple of years on a particular area. You can always change your mind later on, just like degrees, just like training programs, but it's going to help you a lot to focus for a little while.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Lesley Carhart on <a href='https://www.linkedin.com/in/lcarhart/'>LinkedIn</a>, <a href='https://twitter.com/hacks4pancakes'>Twitter</a>, and <a href='https://tisiphone.net'>their blog</a></p>
<p>Learn more about Dragos, Inc on <a href='https://www.linkedin.com/company/dragos-inc./'>LinkedIn</a> and <a href='https://www.dragos.com'>the Dragos website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase Hacker Valley swag at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Lesley Carhart, Director of Incident Response at Dragos, takes some time off mentoring cybersecurity practitioners, responding to OT incidents, and training in martial arts to hop on the mics this week. Named Hacker of the Year in 2020, Lesley’s impact on the industry stretches far and wide. As an incredible content creator for cybersecurity, Lesley advises listeners on how to find their niche and who to be willing to educate along the way.<br>
<br>
Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.<br>
</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Giving back to the community through martial arts & cyber education</p>
<p>[06:13] Being excluded from the cyber industry & turning to content creation instead</p>
<p>[12:33] Comparing incident response in IT vs OT environments</p>
<p>[19:46] Dealing with post-COVID problems with the wrong OT systems online</p>
<p>[26:51] Finding your cyber niche & exploring education options within it</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!<br>
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>What inspired you to start creating cybersecurity content?</p>
<p>Lesley’s cybersecurity content has vastly influenced and impacted many cyber practitioners in the industry, including Ron and Chris. Unfortunately, Lesley’s journey into content creation was inspired by the lack of mentorship they received from other professionals when they were starting out. Never wanting anyone to feel the way they did, Lesley created an online world of resources to warmly welcome and educate new practitioners.  </p>
<p><em>“It's not a really glamorous story. When I got into cybersecurity, I wanted to do digital forensics and nobody would help me, nobody would actually take me seriously and give me a shot. Everybody should have a chance to get into cybersecurity if it's something they want to do.”</em></p>
<p> </p>
<p>How has teaching cyber to a general audience been appealing to you?</p>
<p>When not educating new cyber practitioners or tearing it up in the martial arts studio, Lesley likes to reach out to their community and give talks to audiences outside of typical tech and security groups. From churches to universities, Lesley loves meeting people outside of the cyber industry. These individuals always offer them a new perspective and a feeling of accomplishment for showing someone something new. </p>
<p><em>“It's enjoyable to me to find other people out there who want to learn about an entirely new topic and expose themselves to its problems and how it impacts society and things like that. I appreciate that. Cybersecurity is important and it impacts everything around us all the time.”</em></p>
<p> </p>
<p>In your world, where does incident response start, and where does it stop?</p>
<p>Like many of cyber’s most complicated concepts, the answer to where incident response starts and ends is subjective to certain resources and elements of an organization. Lesley explains that incident response has to be planned and that the planning process has to involve when to declare an incident and when to close the said incident. Without proper planning in advance, an organization is at risk for a crisis that could’ve been responded to quickly turning into an out-of-control attack. </p>
<p><em>“There's no perfect defense against an incident, everybody's vulnerable. You do your best to mitigate and avoid having a cybersecurity incident, but there's only so much you can do. Eventually, you have to assume that you're gonna have an incident.”</em></p>
<p> </p>
<p>What piece of advice do you have for anyone looking to share more knowledge and make the cyber industry better? </p>
<p>Although everything in cybersecurity can seem daunting, expansive, and interesting to everyone, Lesley’s recommendation to new practitioners is to find a niche in cyber and stick to it for a while. Finding a niche doesn’t have to be permanent, but Lesley believes that niche will help you carve out extensive knowledge worth sharing and creating content around. When you discover that niche, don’t be afraid to reach out to other industry experts along the way.</p>
<p><em>“Pick an area and then find mentorship in that and try to focus for a couple of years on a particular area. You can always change your mind later on, just like degrees, just like training programs, but it's going to help you a lot to focus for a little while.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Lesley Carhart on <a href='https://www.linkedin.com/in/lcarhart/'>LinkedIn</a>, <a href='https://twitter.com/hacks4pancakes'>Twitter</a>, and <a href='https://tisiphone.net'>their blog</a></p>
<p>Learn more about Dragos, Inc on <a href='https://www.linkedin.com/company/dragos-inc./'>LinkedIn</a> and <a href='https://www.dragos.com'>the Dragos website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase Hacker Valley swag at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/iitwmn/HVS_audio_Lesley_Carhart_v29ah7d.mp3" length="42835201" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Lesley Carhart, Director of Incident Response at Dragos, takes some time off mentoring cybersecurity practitioners, responding to OT incidents, and training in martial arts to hop on the mics this week. Named Hacker of the Year in 2020, Lesley’s impact on the industry stretches far and wide. As an incredible content creator for cybersecurity, Lesley advises listeners on how to find their niche and who to be willing to educate along the way.Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.
 
Timecoded Guide:
[00:00] Giving back to the community through martial arts & cyber education
[06:13] Being excluded from the cyber industry & turning to content creation instead
[12:33] Comparing incident response in IT vs OT environments
[19:46] Dealing with post-COVID problems with the wrong OT systems online
[26:51] Finding your cyber niche & exploring education options within it
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
What inspired you to start creating cybersecurity content?
Lesley’s cybersecurity content has vastly influenced and impacted many cyber practitioners in the industry, including Ron and Chris. Unfortunately, Lesley’s journey into content creation was inspired by the lack of mentorship they received from other professionals when they were starting out. Never wanting anyone to feel the way they did, Lesley created an online world of resources to warmly welcome and educate new practitioners.  
“It's not a really glamorous story. When I got into cybersecurity, I wanted to do digital forensics and nobody would help me, nobody would actually take me seriously and give me a shot. Everybody should have a chance to get into cybersecurity if it's something they want to do.”
 
How has teaching cyber to a general audience been appealing to you?
When not educating new cyber practitioners or tearing it up in the martial arts studio, Lesley likes to reach out to their community and give talks to audiences outside of typical tech and security groups. From churches to universities, Lesley loves meeting people outside of the cyber industry. These individuals always offer them a new perspective and a feeling of accomplishment for showing someone something new. 
“It's enjoyable to me to find other people out there who want to learn about an entirely new topic and expose themselves to its problems and how it impacts society and things like that. I appreciate that. Cybersecurity is important and it impacts everything around us all the time.”
 
In your world, where does incident response start, and where does it stop?
Like many of cyber’s most complicated concepts, the answer to where incident response starts and ends is subjective to certain resources and elements of an organization. Lesley explains that incident response has to be planned and that the planning process has to involve when to declare an incident and when to close the said incident. Without proper planning in advance, an organization is at risk for a crisis that could’ve been responded to quickly turning into an out-of-control attack. 
“There's no perfect defense against an incident, everybody's vulnerable. You do your best to mitigate and avoid having a cybersecurity incident, but there's only so much you can do. Eventually, you have to assume that you're gonna have an incident.”
 
What piece of advice do you ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1784</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>256</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Challenges &amp; Opportunities in Cyber Threat Intelligence with Brian Kime</title>
        <itunes:title>Challenges &amp; Opportunities in Cyber Threat Intelligence with Brian Kime</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/challenges-opportunities-in-cyber-threat-intelligence-with-brian-kime/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/challenges-opportunities-in-cyber-threat-intelligence-with-brian-kime/#comments</comments>        <pubDate>Tue, 15 Nov 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/78911aa7-21e6-3f2c-a019-2560a5fade73</guid>
                                    <description><![CDATA[<p>Brian Kime, VP of Intelligence Strategy and Advisory at ZeroFox, talks about all things threat intelligence this week. Brian explains why he chose threat intelligence as his focus, where he’s seen opportunities for growth in recent years, and what challenges for cyber threat intelligence lie ahead. Using his intelligence experience developed first in the US Army Special Forces, Brian delivers his argument for intelligence-driven security, instead of the marketing-driven security industry we have today.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Diving into the VP of Intelligence Strategy role</p>
<p>[05:25] Learning intelligence in the Army Special Forces</p>
<p>[10:09] Seeing the past, present, & future of threat intelligence</p>
<p>[19:31] Measuring efficacy & ROI of cyber threat data</p>
<p>[25:18] Building your own cyber threat intelligence capabilities</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>A lot of folks shift from intelligence into other areas of cyber, what inspired you to continue down the intelligence route?</p>
<p>After Brian graduated from Georgia Tech and the nation experienced the tragedy of 9/11, Brian felt called to enlist in the US Army Reserve. While the war in Afghanistan was not as short-lived as anyone expected, Brian found his calling in military intelligence, where he was inspired to put his experiences in IT and intelligence together. It turns out that fusion already existed in the form of cyber threat intelligence, and Brian wanted to focus on that completely.</p>
<p>“I want to bring all these things together and really start pushing our customers and pushing the security community in general towards more intelligence-driven security. Mostly, what I see even today still just feels like marketing-driven security.”</p>
<p> </p>
<p>Where are we today with threat intelligence technology, in terms of challenges and opportunities?</p>
<p>Brian believes we’re already in a really exciting place today in terms of threat intelligence technology. What feels especially opportune for him at the moment includes opportunities and technology that involve internal data from previous threats, freely available external data from sources like blogs, and third-party vendors. However, the challenges facing threat intelligence now involve how to make that technology available for small and medium businesses.</p>
<p>“That's what I would love to see become the standard, that big corporations incorporate threat intelligence to the level that they can start to actually extend that value into their supply chain. That way, the whole system becomes more resilient, more secure.”</p>
<p> </p>
<p>How does a security team measure the efficacy and ROI of intelligence?</p>
<p>In Brian’s opinion, most cybersecurity practitioners don't track the ROI of their intelligence vendors, or they fail to measure intelligence for effectiveness. The metrics cyber teams should focus on include number of new detections created, incidents discovered, adversary dwell time, and improved security decision making. Unfortunately, improved decision making is the hardest to measure because it requires practitioner feedback.</p>
<p>“At the end of the day, if stakeholders are making security decisions based on intelligence that I'm providing, that's a really good measure of effectiveness. All the security decisions that were influenced by threat intelligence, that's what we're going for.” </p>
<p> </p>
<p>When you don't have an intelligence capability and you want to create one, what is typically the first thing that an intelligence team member does?</p>
<p>If you’re intending to collect data from your customers (which almost every company out there is trying to do), then Brian believes that privacy and security need to be considered from the start. Critical security controls and a solid framework are key to early success for even the smallest security team. The best place to start? Software and hardware inventory. If you don’t know what you have, you won’t be able to secure your technology properly. </p>
<p>“At the beginning of the critical security controls, it's always software and hardware inventory. If I don't know what I have, then I really can't do anything well in security. I can't do incident response because I don't know where my data is.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Brian Kime on <a href='https://www.linkedin.com/in/brianpkime/'>LinkedIn</a> and <a href='https://twitter.com/BrianPKime'>Twitter</a></p>
<p>Learn more about ZeroFox on <a href='https://www.linkedin.com/company/zerofox/'>LinkedIn</a> and <a href='https://www.zerofox.com'>the ZeroFox website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Brian Kime, VP of Intelligence Strategy and Advisory at ZeroFox, talks about all things threat intelligence this week. Brian explains why he chose threat intelligence as his focus, where he’s seen opportunities for growth in recent years, and what challenges for cyber threat intelligence lie ahead. Using his intelligence experience developed first in the US Army Special Forces, Brian delivers his argument for intelligence-driven security, instead of the marketing-driven security industry we have today.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Diving into the VP of Intelligence Strategy role</p>
<p>[05:25] Learning intelligence in the Army Special Forces</p>
<p>[10:09] Seeing the past, present, & future of threat intelligence</p>
<p>[19:31] Measuring efficacy & ROI of cyber threat data</p>
<p>[25:18] Building your own cyber threat intelligence capabilities</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>A lot of folks shift from intelligence into other areas of cyber, what inspired you to continue down the intelligence route?</p>
<p>After Brian graduated from Georgia Tech and the nation experienced the tragedy of 9/11, Brian felt called to enlist in the US Army Reserve. While the war in Afghanistan was not as short-lived as anyone expected, Brian found his calling in military intelligence, where he was inspired to put his experiences in IT and intelligence together. It turns out that fusion already existed in the form of cyber threat intelligence, and Brian wanted to focus on that completely.</p>
<p><em>“I want to bring all these things together and really start pushing our customers and pushing the security community in general towards more intelligence-driven security. Mostly, what I see even today still just feels like marketing-driven security.”</em></p>
<p> </p>
<p>Where are we today with threat intelligence technology, in terms of challenges and opportunities?</p>
<p>Brian believes we’re already in a really exciting place today in terms of threat intelligence technology. What feels especially opportune for him at the moment includes opportunities and technology that involve internal data from previous threats, freely available external data from sources like blogs, and third-party vendors. However, the challenges facing threat intelligence now involve how to make that technology available for small and medium businesses.</p>
<p><em>“That's what I would love to see become the standard, that big corporations incorporate threat intelligence to the level that they can start to actually extend that value into their supply chain. That way, the whole system becomes more resilient, more secure.”</em></p>
<p> </p>
<p>How does a security team measure the efficacy and ROI of intelligence?</p>
<p>In Brian’s opinion, most cybersecurity practitioners don't track the ROI of their intelligence vendors, or they fail to measure intelligence for effectiveness. The metrics cyber teams should focus on include number of new detections created, incidents discovered, adversary dwell time, and improved security decision making. Unfortunately, improved decision making is the hardest to measure because it requires practitioner feedback.</p>
<p><em>“At the end of the day, if stakeholders are making security decisions based on intelligence that I'm providing, that's a really good measure of effectiveness. All the security decisions that were influenced by threat intelligence, that's what we're going for.” </em></p>
<p> </p>
<p>When you don't have an intelligence capability and you want to create one, what is typically the first thing that an intelligence team member does?</p>
<p>If you’re intending to collect data from your customers (which almost every company out there is trying to do), then Brian believes that privacy and security need to be considered from the start. Critical security controls and a solid framework are key to early success for even the smallest security team. The best place to start? Software and hardware inventory. If you don’t know what you have, you won’t be able to secure your technology properly. </p>
<p><em>“At the beginning of the critical security controls, it's always software and hardware inventory. If I don't know what I have, then I really can't do anything well in security. I can't do incident response because I don't know where my data is.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Brian Kime on <a href='https://www.linkedin.com/in/brianpkime/'>LinkedIn</a> and <a href='https://twitter.com/BrianPKime'>Twitter</a></p>
<p>Learn more about ZeroFox on <a href='https://www.linkedin.com/company/zerofox/'>LinkedIn</a> and <a href='https://www.zerofox.com'>the ZeroFox website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4xs29d/HVS_Audio_Brian_Kime_V26neyf.mp3" length="45057252" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Brian Kime, VP of Intelligence Strategy and Advisory at ZeroFox, talks about all things threat intelligence this week. Brian explains why he chose threat intelligence as his focus, where he’s seen opportunities for growth in recent years, and what challenges for cyber threat intelligence lie ahead. Using his intelligence experience developed first in the US Army Special Forces, Brian delivers his argument for intelligence-driven security, instead of the marketing-driven security industry we have today.
 
Timecoded Guide:
[00:00] Diving into the VP of Intelligence Strategy role
[05:25] Learning intelligence in the Army Special Forces
[10:09] Seeing the past, present, & future of threat intelligence
[19:31] Measuring efficacy & ROI of cyber threat data
[25:18] Building your own cyber threat intelligence capabilities
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
A lot of folks shift from intelligence into other areas of cyber, what inspired you to continue down the intelligence route?
After Brian graduated from Georgia Tech and the nation experienced the tragedy of 9/11, Brian felt called to enlist in the US Army Reserve. While the war in Afghanistan was not as short-lived as anyone expected, Brian found his calling in military intelligence, where he was inspired to put his experiences in IT and intelligence together. It turns out that fusion already existed in the form of cyber threat intelligence, and Brian wanted to focus on that completely.
“I want to bring all these things together and really start pushing our customers and pushing the security community in general towards more intelligence-driven security. Mostly, what I see even today still just feels like marketing-driven security.”
 
Where are we today with threat intelligence technology, in terms of challenges and opportunities?
Brian believes we’re already in a really exciting place today in terms of threat intelligence technology. What feels especially opportune for him at the moment includes opportunities and technology that involve internal data from previous threats, freely available external data from sources like blogs, and third-party vendors. However, the challenges facing threat intelligence now involve how to make that technology available for small and medium businesses.
“That's what I would love to see become the standard, that big corporations incorporate threat intelligence to the level that they can start to actually extend that value into their supply chain. That way, the whole system becomes more resilient, more secure.”
 
How does a security team measure the efficacy and ROI of intelligence?
In Brian’s opinion, most cybersecurity practitioners don't track the ROI of their intelligence vendors, or they fail to measure intelligence for effectiveness. The metrics cyber teams should focus on include number of new detections created, incidents discovered, adversary dwell time, and improved security decision making. Unfortunately, improved decision making is the hardest to measure because it requires practitioner feedback.
“At the end of the day, if stakeholders are making security decisions based on intelligence that I'm providing, that's a really good measure of effectiveness. All the security decisions that were influenced by threat intelligence, that's what we're going for.” 
 
When you don't have an intelligence capability and y]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1868</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>251</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hiring the Next Fractional CISO with Michael Piacente</title>
        <itunes:title>Hiring the Next Fractional CISO with Michael Piacente</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hiring-the-next-fractional-ciso-with-michael-piacente/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hiring-the-next-fractional-ciso-with-michael-piacente/#comments</comments>        <pubDate>Fri, 11 Nov 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b5a315f1-d65f-31d7-b180-70f1ad3ef853</guid>
                                    <description><![CDATA[<p>Michael Piacente, Managing Partner & Cofounder at Hitch Partners, answers the essential question on many cybersecurity professionals’ minds: Where do CISOs find CISO jobs? As it turns out, Michael helps many cybersecurity teams find their perfect CISO match with the assistance of his own team at Hitch Partners. In this episode, Michael clarifies what the role of a CISO really is, explains the compensation and benefits, and reveals the many responsibilities a CISO may take on during their team in the role.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Defining the role of CISO & finding the right homes for each CISO</p>
<p>[05:21] VCISO & fractional CISO as an alternative to a full-time CISO</p>
<p>[11:49] CISO annual income, benefits, & non-monetary incentives</p>
<p>[16:37] Explaining additional responsibilities & tasks taken on by the CISO</p>
<p>[25:11] Giving advice to future CISOs looking for the next cyber executive opportunity</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius and NetSPIfor bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a>

</p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>In your own definition and experience, what is a CISO?</p>
<p>Although there’s many definitions of the role, Michael clarifies that defining CISO should always include being an executive. To have a CISO who makes a positive impact and fulfills an organization’s needs, that CISO has to be properly placed, properly sponsored, and be in an environment where they have the proper reporting processes. Michael also believes the CISO should always be looking over their shoulder to be diligent of the next threat.</p>
<p>“In my version of it, a CISO is the executive— and that's the key term here— that has been properly placed, properly sponsored to handle all of the business information and data risk policy execution and operations in the company.”</p>
<p> </p>
<p>What is the difference between a fractional CISO and a VCISO?</p>
<p>In Michael’s opinion, a VCISO (virtual CISO) and fractional CISO can be used interchangeably in a situation where a company does not need a full-time CISO executive. Unless they’re looking to support a strong security program, Michael understands that many companies don’t need a full-time CISO in order to be successful. A VCISO makes an impact on an organization’s security without being an overwhelming role in a smaller organization.</p>
<p>“Bringing in your starter package to implement the baseline or foundational building blocks of what will become a security program, in the form of a consultant or consulting firm, is often a wiser choice than going in building a security program around a full-time CISO role.”</p>
<p> </p>
<p>Are there different types of CISOs, and have those types changed over time?</p>
<p>Previously, Michael defined 3 different types of CISOs in his search for CISOs with Hitch Partners. However, a fourth type has emerged in recent years: the BISO, or Field CISO. This fourth type joins the ranks alongside other impactful CISO types, including the client (or governance) facing CISO, highly technical CISO, the IT-focused CISO, and now, our fourth type, the BISO, who focuses on the business side of the risk.</p>
<p>“It's amazing that all of our CISO searches contain all these different types of CISOs. The fun part of that we get to figure out is: What's the priority [for the role]? What's the order? What does everyone in the organization think the priority should be?” </p>
<p> </p>
<p>How would you direct someone to take that first step after realizing they want to be a CISO?</p>
<p>Discovering the CISO role exists and being the right person for the role is an important distinction, and Michael encourages potential CISOs to take some time to research the job before getting involved in a job search. However, once someone knows they want to be a CISO, Michael advises finding a CISO mentor and diving into a passion. Each type of CISO needs an expertise and passion to propel them into the superpower status needed to be a CISO. </p>
<p>“I think it’s about finding a passion. I'm a big believer that you just have to know where your superpower is, or what your superpower wants to be. In other words, that thing that's passionate to you, that you probably know better than 99% of the population out there.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Michael Piacente on <a href='https://www.linkedin.com/in/moderncisosearch/'>LinkedIn</a></p>
<p>Learn more about Hitch Partners on <a href='https://www.hitchpartners.com'>their website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Michael Piacente, Managing Partner & Cofounder at Hitch Partners, answers the essential question on many cybersecurity professionals’ minds: Where do CISOs find CISO jobs? As it turns out, Michael helps many cybersecurity teams find their perfect CISO match with the assistance of his own team at Hitch Partners. In this episode, Michael clarifies what the role of a CISO really is, explains the compensation and benefits, and reveals the many responsibilities a CISO may take on during their team in the role.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Defining the role of CISO & finding the right homes for each CISO</p>
<p>[05:21] VCISO & fractional CISO as an alternative to a full-time CISO</p>
<p>[11:49] CISO annual income, benefits, & non-monetary incentives</p>
<p>[16:37] Explaining additional responsibilities & tasks taken on by the CISO</p>
<p>[25:11] Giving advice to future CISOs looking for the next cyber executive opportunity</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius and NetSPIfor bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a><br>
<br>
</p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>In your own definition and experience, what is a CISO?</p>
<p>Although there’s many definitions of the role, Michael clarifies that defining CISO should always include being an executive. To have a CISO who makes a positive impact and fulfills an organization’s needs, that CISO has to be properly placed, properly sponsored, and be in an environment where they have the proper reporting processes. Michael also believes the CISO should always be looking over their shoulder to be diligent of the next threat.</p>
<p><em>“In my version of it, a CISO is the executive— and that's the key term here— that has been properly placed, properly sponsored to handle all of the business information and data risk policy execution and operations in the company.”</em></p>
<p> </p>
<p>What is the difference between a fractional CISO and a VCISO?</p>
<p>In Michael’s opinion, a VCISO (virtual CISO) and fractional CISO can be used interchangeably in a situation where a company does not need a full-time CISO executive. Unless they’re looking to support a strong security program, Michael understands that many companies don’t need a full-time CISO in order to be successful. A VCISO makes an impact on an organization’s security without being an overwhelming role in a smaller organization.</p>
<p><em>“Bringing in your starter package to implement the baseline or foundational building blocks of what will become a security program, in the form of a consultant or consulting firm, is often a wiser choice than going in building a security program around a full-time CISO role.”</em></p>
<p> </p>
<p>Are there different types of CISOs, and have those types changed over time?</p>
<p>Previously, Michael defined 3 different types of CISOs in his search for CISOs with Hitch Partners. However, a fourth type has emerged in recent years: the BISO, or Field CISO. This fourth type joins the ranks alongside other impactful CISO types, including the client (or governance) facing CISO, highly technical CISO, the IT-focused CISO, and now, our fourth type, the BISO, who focuses on the business side of the risk.</p>
<p><em>“It's amazing that all of our CISO searches contain all these different types of CISOs. The fun part of that we get to figure out is: What's the priority [for the role]? What's the order? What does everyone in the organization think the priority should be?” </em></p>
<p> </p>
<p>How would you direct someone to take that first step after realizing they want to be a CISO?</p>
<p>Discovering the CISO role exists and being the right person for the role is an important distinction, and Michael encourages potential CISOs to take some time to research the job before getting involved in a job search. However, once someone knows they want to be a CISO, Michael advises finding a CISO mentor and diving into a passion. Each type of CISO needs an expertise and passion to propel them into the superpower status needed to be a CISO. </p>
<p><em>“I think it’s about finding a passion. I'm a big believer that you just have to know where your superpower is, or what your superpower wants to be. In other words, that thing that's passionate to you, that you probably know better than 99% of the population out there.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Michael Piacente on <a href='https://www.linkedin.com/in/moderncisosearch/'>LinkedIn</a></p>
<p>Learn more about Hitch Partners on <a href='https://www.hitchpartners.com'>their website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/v3csnk/HVS_Michael_Piacente_V2acnr5.mp3" length="41942298" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Michael Piacente, Managing Partner & Cofounder at Hitch Partners, answers the essential question on many cybersecurity professionals’ minds: Where do CISOs find CISO jobs? As it turns out, Michael helps many cybersecurity teams find their perfect CISO match with the assistance of his own team at Hitch Partners. In this episode, Michael clarifies what the role of a CISO really is, explains the compensation and benefits, and reveals the many responsibilities a CISO may take on during their team in the role.
 
Timecoded Guide:
[00:00] Defining the role of CISO & finding the right homes for each CISO
[05:21] VCISO & fractional CISO as an alternative to a full-time CISO
[11:49] CISO annual income, benefits, & non-monetary incentives
[16:37] Explaining additional responsibilities & tasks taken on by the CISO
[25:11] Giving advice to future CISOs looking for the next cyber executive opportunity
 
Sponsor Links:
Thank you to our sponsor Axonius and NetSPIfor bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
In your own definition and experience, what is a CISO?
Although there’s many definitions of the role, Michael clarifies that defining CISO should always include being an executive. To have a CISO who makes a positive impact and fulfills an organization’s needs, that CISO has to be properly placed, properly sponsored, and be in an environment where they have the proper reporting processes. Michael also believes the CISO should always be looking over their shoulder to be diligent of the next threat.
“In my version of it, a CISO is the executive— and that's the key term here— that has been properly placed, properly sponsored to handle all of the business information and data risk policy execution and operations in the company.”
 
What is the difference between a fractional CISO and a VCISO?
In Michael’s opinion, a VCISO (virtual CISO) and fractional CISO can be used interchangeably in a situation where a company does not need a full-time CISO executive. Unless they’re looking to support a strong security program, Michael understands that many companies don’t need a full-time CISO in order to be successful. A VCISO makes an impact on an organization’s security without being an overwhelming role in a smaller organization.
“Bringing in your starter package to implement the baseline or foundational building blocks of what will become a security program, in the form of a consultant or consulting firm, is often a wiser choice than going in building a security program around a full-time CISO role.”
 
Are there different types of CISOs, and have those types changed over time?
Previously, Michael defined 3 different types of CISOs in his search for CISOs with Hitch Partners. However, a fourth type has emerged in recent years: the BISO, or Field CISO. This fourth type joins the ranks alongside other impactful CISO types, including the client (or governance) facing CISO, highly technical CISO, the IT-focused CISO, and now, our fourth type, the BISO, who focuses on the business side of the risk.
“It's amazing that all of our CISO searches contain all these different types of CISOs. The fun part of that we get to figure out is: What's the priority [for the role]? What's the order? What does everyone in the organization think the priority should be?” 
 
How would you direct someone to take that first step after realizing they want to be a CISO?
Discovering the CISO role exists and being the ri]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1738</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>250</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cultivating Client Trust at Cybercon with NTT’s Dirk Hodgson &amp; Adam Green</title>
        <itunes:title>Cultivating Client Trust at Cybercon with NTT’s Dirk Hodgson &amp; Adam Green</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cultivating-client-trust-at-cybercon-with-ntt-s-dirk-hodgson-adam-green/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cultivating-client-trust-at-cybercon-with-ntt-s-dirk-hodgson-adam-green/#comments</comments>        <pubDate>Wed, 09 Nov 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f56317a6-b134-3a22-8b8a-035a5534cbc3</guid>
                                    <description><![CDATA[<p>Hacker Valley: On the Road is a curated collection of conversations that Chris and Ron have had during conferences and events around the globe. In this episode, NTT’s Dirk Hodgson, Director of Cybersecurity, and Adam Green, Senior Cybersecurity Executive, speak with the Hacker Valley team at CyberCon in Melbourne, Australia. Dirk and Adam cover the intersection of their roles at NTT, their experiences at conferences like RSA, their country’s cybersecurity industry, and their team’s cultivated trust with clients. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Reuniting at CyberCon after years of COVID limiting security conferences</p>
<p>[06:30] Differentiating Australia’s cybersecurity industry from the rest of the world</p>
<p>[10:48] Watching current cyber trends with CMMC & the Essential 8 frameworks</p>
<p>[25:41] Creating interpersonal communication in a technology-driven industry</p>
<p>[34:58] Building trust by knowing your clients & your adversaries equally</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a>

</p>
<p>How are Australian cybersecurity practitioners different from the rest of the world?</p>
<p>According to Adam, the past 3 years have led to a massive shift in maturity for Australia’s cybersecurity industry. Previously, Australia relied on its physical isolation as a country as a means of security, but breaches have become more high profile and more impactful for Australian businesses in recent years. Now, Adam is pleased to see there be a greater understanding beyond the 101 of cybersecurity and more collaboration with security teams.</p>
<p>“Three years ago, we used to say Australia was 5 years behind the rest of the world [in cybersecurity]. We used to think, because of proximity to the rest of the world, we were pretty safe, but it's definitely become more of a professional approach to security now.” — Adam</p>
<p> </p>
<p>How do your roles as Director and Executive work together at NTT? </p>
<p>For Dirk, cybersecurity is the ultimate team sport— and Adam is an impactful element to his cybersecurity team. While Adam often focuses on strategic planning through his background as a practitioner, Dirk enjoys how his business-driven perspective contrasts with Adam and with other members of the team. With a variety of experiences and perspectives in the room, NTT can cover issues from all sides, instead of falling victim to tunnel vision.</p>
<p>“Adam is the person on the team, who's great at that scenario planning piece. ‘Here are the things that are gonna go wrong.’ Whereas myself and a couple of the other people on the team, look at that go, ‘What's that going to cost the organization?’” —Dirk</p>
<p> </p>
<p>Where are the strengths and weaknesses in communication in cybersecurity?</p>
<p>Just like Dirk’s thoughts about cybersecurity being a team sport, Adam believes that you have to cultivate a team member-like trust with your clients. The client in an initial conversation might seem defensive of your advice or critical of your actions. However, Adam explains that establishing credibility, especially in the business-focused cyber industry in Australia, goes a long way to creating the opportunity for more casual conversations down the line. </p>
<p>“What we find is, in Australia in particular, it's about not just the company, but you as an individual. Do you have my back? Can I trust you? If I don't like you, will you at least mitigate my risk for me? You have to establish credibility real fast.” —Adam</p>
<p> </p>
<p>What advice would you give to someone interested in cultivating more trust between clients and their team?</p>
<p>Dirk loves a good James Bond villain, but the average hacker attacking the average business is nothing like the movies. Establishing trust with clients starts with not only understanding what they need, Dirk explains, but also knowing the most likely threats beyond the showstopping Blackhats of media fame. Being able to explain to and protect clients from the most common threats keeps their data safest and strengthens their trust in your team.</p>
<p>“I think it's about making sure that you know what the worst case scenario is, what the most dangerous course of action that the attacker or a potential attacker could follow, but also, being able to talk credibly about what's the most likely threat.” —Dirk</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Dirk Hodgson on <a href='https://www.linkedin.com/in/dirk-hodgson-90443aa/?originalSubdomain=au'>LinkedIn</a></p>
<p>Keep up with our guest Adam Green on <a href='https://www.linkedin.com/in/adam-green-7a348519/'>LinkedIn</a></p>
<p>Learn more about NTT on <a href='https://www.linkedin.com/company/global-ntt/'>LinkedIn</a> and <a href='https://services.global.ntt'>the NTT website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hacker Valley: On the Road is a curated collection of conversations that Chris and Ron have had during conferences and events around the globe. In this episode, NTT’s Dirk Hodgson, Director of Cybersecurity, and Adam Green, Senior Cybersecurity Executive, speak with the Hacker Valley team at CyberCon in Melbourne, Australia. Dirk and Adam cover the intersection of their roles at NTT, their experiences at conferences like RSA, their country’s cybersecurity industry, and their team’s cultivated trust with clients. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Reuniting at CyberCon after years of COVID limiting security conferences</p>
<p>[06:30] Differentiating Australia’s cybersecurity industry from the rest of the world</p>
<p>[10:48] Watching current cyber trends with CMMC & the Essential 8 frameworks</p>
<p>[25:41] Creating interpersonal communication in a technology-driven industry</p>
<p>[34:58] Building trust by knowing your clients & your adversaries equally</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!<br>
</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a><br>
<br>
</p>
<p>How are Australian cybersecurity practitioners different from the rest of the world?</p>
<p>According to Adam, the past 3 years have led to a massive shift in maturity for Australia’s cybersecurity industry. Previously, Australia relied on its physical isolation as a country as a means of security, but breaches have become more high profile and more impactful for Australian businesses in recent years. Now, Adam is pleased to see there be a greater understanding beyond the 101 of cybersecurity and more collaboration with security teams.</p>
<p><em>“Three years ago, we used to say Australia was 5 years behind the rest of the world [in cybersecurity]. We used to think, because of proximity to the rest of the world, we were pretty safe, but it's definitely become more of a professional approach to security now.” — Adam</em></p>
<p> </p>
<p>How do your roles as Director and Executive work together at NTT? </p>
<p>For Dirk, cybersecurity is the ultimate team sport— and Adam is an impactful element to his cybersecurity team. While Adam often focuses on strategic planning through his background as a practitioner, Dirk enjoys how his business-driven perspective contrasts with Adam and with other members of the team. With a variety of experiences and perspectives in the room, NTT can cover issues from all sides, instead of falling victim to tunnel vision.</p>
<p><em>“Adam is the person on the team, who's great at that scenario planning piece. ‘Here are the things that are gonna go wrong.’ Whereas myself and a couple of the other people on the team, look at that go, ‘What's that going to cost the organization?’” —Dirk</em></p>
<p> </p>
<p>Where are the strengths and weaknesses in communication in cybersecurity?</p>
<p>Just like Dirk’s thoughts about cybersecurity being a team sport, Adam believes that you have to cultivate a team member-like trust with your clients. The client in an initial conversation might seem defensive of your advice or critical of your actions. However, Adam explains that establishing credibility, especially in the business-focused cyber industry in Australia, goes a long way to creating the opportunity for more casual conversations down the line. </p>
<p><em>“What we find is, in Australia in particular, it's about not just the company, but you as an individual. Do you have my back? Can I trust you? If I don't like you, will you at least mitigate my risk for me? You have to establish credibility real fast.” —Adam</em></p>
<p> </p>
<p>What advice would you give to someone interested in cultivating more trust between clients and their team?</p>
<p>Dirk loves a good James Bond villain, but the average hacker attacking the average business is nothing like the movies. Establishing trust with clients starts with not only understanding what they need, Dirk explains, but also knowing the most likely threats beyond the showstopping Blackhats of media fame. Being able to explain to and protect clients from the most common threats keeps their data safest and strengthens their trust in your team.</p>
<p><em>“I think it's about making sure that you know what the worst case scenario is, what the most dangerous course of action that the attacker or a potential attacker could follow, but also, being able to talk credibly about what's the most likely threat.” —Dirk</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Dirk Hodgson on <a href='https://www.linkedin.com/in/dirk-hodgson-90443aa/?originalSubdomain=au'>LinkedIn</a></p>
<p>Keep up with our guest Adam Green on <a href='https://www.linkedin.com/in/adam-green-7a348519/'>LinkedIn</a></p>
<p>Learn more about NTT on <a href='https://www.linkedin.com/company/global-ntt/'>LinkedIn</a> and <a href='https://services.global.ntt'>the NTT website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/44mi8m/HVS_audio_Adam_and_Dirk_v27p8gs.mp3" length="58553920" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hacker Valley: On the Road is a curated collection of conversations that Chris and Ron have had during conferences and events around the globe. In this episode, NTT’s Dirk Hodgson, Director of Cybersecurity, and Adam Green, Senior Cybersecurity Executive, speak with the Hacker Valley team at CyberCon in Melbourne, Australia. Dirk and Adam cover the intersection of their roles at NTT, their experiences at conferences like RSA, their country’s cybersecurity industry, and their team’s cultivated trust with clients. 
 
Timecoded Guide:
[00:00] Reuniting at CyberCon after years of COVID limiting security conferences
[06:30] Differentiating Australia’s cybersecurity industry from the rest of the world
[10:48] Watching current cyber trends with CMMC & the Essential 8 frameworks
[25:41] Creating interpersonal communication in a technology-driven industry
[34:58] Building trust by knowing your clients & your adversaries equally
 
Sponsor Links:
Thank you to our sponsor Axonius for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
How are Australian cybersecurity practitioners different from the rest of the world?
According to Adam, the past 3 years have led to a massive shift in maturity for Australia’s cybersecurity industry. Previously, Australia relied on its physical isolation as a country as a means of security, but breaches have become more high profile and more impactful for Australian businesses in recent years. Now, Adam is pleased to see there be a greater understanding beyond the 101 of cybersecurity and more collaboration with security teams.
“Three years ago, we used to say Australia was 5 years behind the rest of the world [in cybersecurity]. We used to think, because of proximity to the rest of the world, we were pretty safe, but it's definitely become more of a professional approach to security now.” — Adam
 
How do your roles as Director and Executive work together at NTT? 
For Dirk, cybersecurity is the ultimate team sport— and Adam is an impactful element to his cybersecurity team. While Adam often focuses on strategic planning through his background as a practitioner, Dirk enjoys how his business-driven perspective contrasts with Adam and with other members of the team. With a variety of experiences and perspectives in the room, NTT can cover issues from all sides, instead of falling victim to tunnel vision.
“Adam is the person on the team, who's great at that scenario planning piece. ‘Here are the things that are gonna go wrong.’ Whereas myself and a couple of the other people on the team, look at that go, ‘What's that going to cost the organization?’” —Dirk
 
Where are the strengths and weaknesses in communication in cybersecurity?
Just like Dirk’s thoughts about cybersecurity being a team sport, Adam believes that you have to cultivate a team member-like trust with your clients. The client in an initial conversation might seem defensive of your advice or critical of your actions. However, Adam explains that establishing credibility, especially in the business-focused cyber industry in Australia, goes a long way to creating the opportunity for more casual conversations down the line. 
“What we find is, in Australia in particular, it's about not just the company, but you as an individual. Do you have my back? Can I trust you? If I don't like you, will you at least mitigate my risk for me? You have to establish credibility real fast.” —Adam
 
What advice would you give to someone interested in cultivating more trust between clients and their team?
Dirk loves a good James Bond villain, but the average hacker attacking the average business is nothing like the movies. Establishing trust with clients starts with not only understanding what they need, Dirk explains, but also knowing the most likely thre]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2439</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>253</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Supply Chain Security &amp; Zero Trust Tech with Ashish Rajan &amp; Shilpi Bhattacharjee</title>
        <itunes:title>Supply Chain Security &amp; Zero Trust Tech with Ashish Rajan &amp; Shilpi Bhattacharjee</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/supply-chain-security-zero-trust-tech-with-ashish-rajan-shilpi-bhattacharjee/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/supply-chain-security-zero-trust-tech-with-ashish-rajan-shilpi-bhattacharjee/#comments</comments>        <pubDate>Tue, 08 Nov 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/78dba069-c833-3619-bcab-043a182917ca</guid>
                                    <description><![CDATA[<p>Hacker Valley: On the Road is a curated collection of conversations that Chris and Ron have had during conferences and events around the globe. In this episode, Cloud Security Podcast’s Ashish Rajan and Shilpi Bhattacharjee speak with the Hacker Valley team at AISA CyberCon in Melbourne, Australia. Ashish and Shilpi discuss their respective talks on supply chain security and zero trust technology, SBOMs, and keynote speakers at this year’s Cybercon worth noting for the audience at home.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Connecting & conversing at a cyber conference post-COVID</p>
<p>[06:50] Breaking down Shilpi’s presentation on supply chain threats & attacks</p>
<p>[11:45] Understanding the paradoxes & limitations of zero trust with Ashish’s talk</p>
<p>[26:13] Defining & explaining SBOM, or Software Bill of Materials </p>
<p>[33:16] Noticing key conversations & trends for those who didn’t attend AISA Cybercon</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a>


</p>
<p>Shilpi, can you talk about the idea behind the talk you had at CyberCon? </p>
<p>The inspiration behind Shilpi’s conference talk was supply chain issues. Titling her talk, “Who’s Protecting Your Software in Supply Chain,” Shilpi hoped to further educate and advocate for security in the supply chain process. An estimated one in two companies will experience a supply chain attack in the coming years. Instead of fearing such a statistic, Shilpi hopes her talk inspired further security action to protect our supply chains. </p>
<p>“One staggering fact that I read is that one in every two companies is going to have some sort of a supply chain attack in the next three years. So, who's going to look after the supply chain? Is it going to be the organization? Is it going to be your third-party vendors?” —Shilpi</p>
<p> </p>
<p>Ashish, what about your talk at Cybercon?</p>
<p>In contrast, Ashish’s talk was about the triple paradox of zero trust. When talking about and implementing zero trust, Ashish realized many companies don’t implement the cultural changes needed for zero trust and/or only talk about zero trust as a technology process. Zero trust has numerous layers beyond technology, and requires time and major changes in culture and technology to implement in most companies. </p>
<p>“I feel bad for bashing on finance, marketing, and HR teams. They're all smart people, but if you're going to add four or five layers of security for them, they almost always say, ‘I just want to do my job. I don't really care about this. It's your job to do security.’” —Ashish</p>
<p> </p>
<p>Where would you recommend starting when it comes to trying to implement the ideas in your respective talks?</p>
<p>When push comes to shove about where cyber companies can start first with supply chain and zero trust, Ashish and Shilpi agree that companies have to discuss business priorities. When company leaders can take the opportunity to look at and understand their cyber hygiene, the next steps might look very different from another company’s tactics. Knowing what a business has is the foundational piece that impacts any new process in cyber. </p>
<p>“If I were to go back to the first principle of what we do with cybersecurity professionals, one of the biggest assets that we're all trying to protect is data. You can't protect what you can't see, that's the foundational piece.” —Ashish</p>
<p> </p>
<p>For anyone that wasn't able to make the conference, what is one thing that you would want to share with the audience at home? </p>
<p>There were a lot of conversations taking place at Cybercon this year. Ashish wants the audience at home to know that cloud native, zero trust, supply chain, and leadership positions like CISOs were the main themes in many talks, panels, and conversations. Shilpi wants those who couldn’t attend to watch out for more talks and conversations about cyber from those outside of the industry to understand that the issues impacting cyber influence the world. </p>
<p>“I think there's that interest about cybersecurity being more than just a cybersecurity problem. Cybersecurity is not just a technical problem, it's a societal problem, a cultural problem. I very much agree, because a lot of the things that we're dealing with impacts everyone.” —Shilpi</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Ashish Rajan on <a href='https://www.linkedin.com/in/ashishrajan/'>LinkedIn</a></p>
<p>Keep up with our guest Shilpi Bhattacharjee on <a href='https://www.linkedin.com/in/shilpi-bhattacharjee/'>LinkedIn</a></p>
<p>Listen to Ashish and Shilpi’s <a href='https://www.linkedin.com/company/cloud-security-podcast/'>Cloud Security Podcast</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hacker Valley: On the Road is a curated collection of conversations that Chris and Ron have had during conferences and events around the globe. In this episode, Cloud Security Podcast’s Ashish Rajan and Shilpi Bhattacharjee speak with the Hacker Valley team at AISA CyberCon in Melbourne, Australia. Ashish and Shilpi discuss their respective talks on supply chain security and zero trust technology, SBOMs, and keynote speakers at this year’s Cybercon worth noting for the audience at home.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Connecting & conversing at a cyber conference post-COVID</p>
<p>[06:50] Breaking down Shilpi’s presentation on supply chain threats & attacks</p>
<p>[11:45] Understanding the paradoxes & limitations of zero trust with Ashish’s talk</p>
<p>[26:13] Defining & explaining SBOM, or Software Bill of Materials </p>
<p>[33:16] Noticing key conversations & trends for those who didn’t attend AISA Cybercon</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a><br>
<br>
<br>
</p>
<p>Shilpi, can you talk about the idea behind the talk you had at CyberCon? </p>
<p>The inspiration behind Shilpi’s conference talk was supply chain issues. Titling her talk, “Who’s Protecting Your Software in Supply Chain,” Shilpi hoped to further educate and advocate for security in the supply chain process. An estimated one in two companies will experience a supply chain attack in the coming years. Instead of fearing such a statistic, Shilpi hopes her talk inspired further security action to protect our supply chains. </p>
<p><em>“One staggering fact that I read is that one in every two companies is going to have some sort of a supply chain attack in the next three years. So, who's going to look after the supply chain? Is it going to be the organization? Is it going to be your third-party vendors?” —Shilpi</em></p>
<p> </p>
<p>Ashish, what about your talk at Cybercon?</p>
<p>In contrast, Ashish’s talk was about the triple paradox of zero trust. When talking about and implementing zero trust, Ashish realized many companies don’t implement the cultural changes needed for zero trust and/or only talk about zero trust as a technology process. Zero trust has numerous layers beyond technology, and requires time and major changes in culture and technology to implement in most companies. </p>
<p><em>“I feel bad for bashing on finance, marketing, and HR teams. They're all smart people, but if you're going to add four or five layers of security for them, they almost always say, ‘I just want to do my job. I don't really care about this. It's your job to do security.’” —Ashish</em></p>
<p> </p>
<p>Where would you recommend starting when it comes to trying to implement the ideas in your respective talks?</p>
<p>When push comes to shove about where cyber companies can start first with supply chain and zero trust, Ashish and Shilpi agree that companies have to discuss business priorities. When company leaders can take the opportunity to look at and understand their cyber hygiene, the next steps might look very different from another company’s tactics. Knowing what a business has is the foundational piece that impacts any new process in cyber. </p>
<p><em>“If I were to go back to the first principle of what we do with cybersecurity professionals, one of the biggest assets that we're all trying to protect is data. You can't protect what you can't see, that's the foundational piece.” —Ashish</em></p>
<p> </p>
<p>For anyone that wasn't able to make the conference, what is one thing that you would want to share with the audience at home? </p>
<p>There were a lot of conversations taking place at Cybercon this year. Ashish wants the audience at home to know that cloud native, zero trust, supply chain, and leadership positions like CISOs were the main themes in many talks, panels, and conversations. Shilpi wants those who couldn’t attend to watch out for more talks and conversations about cyber from those outside of the industry to understand that the issues impacting cyber influence the world. </p>
<p><em>“I think there's that interest about cybersecurity being more than just a cybersecurity problem. Cybersecurity is not just a technical problem, it's a societal problem, a cultural problem. I very much agree, because a lot of the things that we're dealing with impacts everyone.” —Shilpi</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Ashish Rajan on <a href='https://www.linkedin.com/in/ashishrajan/'>LinkedIn</a></p>
<p>Keep up with our guest Shilpi Bhattacharjee on <a href='https://www.linkedin.com/in/shilpi-bhattacharjee/'>LinkedIn</a></p>
<p>Listen to Ashish and Shilpi’s <a href='https://www.linkedin.com/company/cloud-security-podcast/'>Cloud Security Podcast</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wp3p7m/HVS_OTR_audio_Ashish_and_Shilipi_v297r6a.mp3" length="53484563" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hacker Valley: On the Road is a curated collection of conversations that Chris and Ron have had during conferences and events around the globe. In this episode, Cloud Security Podcast’s Ashish Rajan and Shilpi Bhattacharjee speak with the Hacker Valley team at AISA CyberCon in Melbourne, Australia. Ashish and Shilpi discuss their respective talks on supply chain security and zero trust technology, SBOMs, and keynote speakers at this year’s Cybercon worth noting for the audience at home.
 
Timecoded Guide:
[00:00] Connecting & conversing at a cyber conference post-COVID
[06:50] Breaking down Shilpi’s presentation on supply chain threats & attacks
[11:45] Understanding the paradoxes & limitations of zero trust with Ashish’s talk
[26:13] Defining & explaining SBOM, or Software Bill of Materials 
[33:16] Noticing key conversations & trends for those who didn’t attend AISA Cybercon
 
Sponsor Links:
Thank you to our sponsor Axonius for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
Shilpi, can you talk about the idea behind the talk you had at CyberCon? 
The inspiration behind Shilpi’s conference talk was supply chain issues. Titling her talk, “Who’s Protecting Your Software in Supply Chain,” Shilpi hoped to further educate and advocate for security in the supply chain process. An estimated one in two companies will experience a supply chain attack in the coming years. Instead of fearing such a statistic, Shilpi hopes her talk inspired further security action to protect our supply chains. 
“One staggering fact that I read is that one in every two companies is going to have some sort of a supply chain attack in the next three years. So, who's going to look after the supply chain? Is it going to be the organization? Is it going to be your third-party vendors?” —Shilpi
 
Ashish, what about your talk at Cybercon?
In contrast, Ashish’s talk was about the triple paradox of zero trust. When talking about and implementing zero trust, Ashish realized many companies don’t implement the cultural changes needed for zero trust and/or only talk about zero trust as a technology process. Zero trust has numerous layers beyond technology, and requires time and major changes in culture and technology to implement in most companies. 
“I feel bad for bashing on finance, marketing, and HR teams. They're all smart people, but if you're going to add four or five layers of security for them, they almost always say, ‘I just want to do my job. I don't really care about this. It's your job to do security.’” —Ashish
 
Where would you recommend starting when it comes to trying to implement the ideas in your respective talks?
When push comes to shove about where cyber companies can start first with supply chain and zero trust, Ashish and Shilpi agree that companies have to discuss business priorities. When company leaders can take the opportunity to look at and understand their cyber hygiene, the next steps might look very different from another company’s tactics. Knowing what a business has is the foundational piece that impacts any new process in cyber. 
“If I were to go back to the first principle of what we do with cybersecurity professionals, one of the biggest assets that we're all trying to protect is data. You can't protect what you can't see, that's the foundational piece.” —Ashish
 
For anyone that wasn't able to make the conference, what is one thing that you would want to share with the audience at home? 
There were a lot of conversations taking place at Cybercon this year. Ashish wants the audience at home to know that cloud native, zero trust, supply chain, and leadership positions like CISOs were the main themes in many talks, panels, and conversations. Shilpi wants those who couldn’t attend to watch out ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2228</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>254</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Future of Pen Testing Automation with Alton Johnson</title>
        <itunes:title>The Future of Pen Testing Automation with Alton Johnson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-future-of-pen-testing-automation-with-alton-johnson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-future-of-pen-testing-automation-with-alton-johnson/#comments</comments>        <pubDate>Mon, 07 Nov 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fc597ee9-e782-3658-a795-35a8de9e47fe</guid>
                                    <description><![CDATA[<p>Alton Johnson, Founder and Principal Security Consultant at Vonahi Security, automates his way out of his pen testing job in this week’s episode. An AOl hacking gone wild got Alton into defensive cybersecurity years ago, and now, as the Founder of Vonahi, Alton advocates for automation and efficiency in the pen testing process. Alton talks about his connection to defensive over offensive, customizing a pen test report to your audience, and finding that sweet spot between practitioner and entrepreneur. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Learning the importance of automation in defensive cyber</p>
<p>[07:48] Connecting with automation & defensive cybersecurity over offensive</p>
<p>[12:01] Showing the results that matter to the right people in a pen test report</p>
<p>[15:27] Prioritizing exploitations in the world of vulnerability assessments</p>
<p>[21:59] Maintaining the cyber practitioner & the entrepreneurial side of Vonahi</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>How have you seen automation change yourself and your role? </p>
<p>As a penetration tester, Alton explains that time is often not on his side. There’s a limited amount of time to do an assessment, and the measure of a good pen tester is often determined by fast, high quality reporting. Automating the repetitive tasks of pen testing not only saves time, but Alton believes it genuinely changes the role into something much more efficient, high value, and successful. </p>
<p>“Automation obviously plays a huge part in growing in the career too, because the more you can do, the more value you can provide, and the faster you can provide that value makes you a better pentester.” </p>
<p> </p>
<p>How do you convey the story of a red team engagement in different ways so that message is received by everyone in the company? </p>
<p>At Vonahi Security, Alton’s team separates pen testing reports into an executive summary and a technical report. The executive summary is high level, demonstrating the impact and severity of what was discovered from a business point of view. Many business executives don’t need the technical play by play, which is why that is saved for the technical report. The technical report acts as a scene by scene story of what was done and how to technically fix it.</p>
<p>“We separate the two conversations. Here's what we did at a high level to anyone that doesn't really care about the technical stuff, but only cares about how it impacts the business, and then, for the person that has to fix the issues, here's everything that they would need.”</p>
<p> </p>
<p>What would you tell the newer generation of cybersecurity practitioners about the offensive side? </p>
<p>When Alton first started his cybersecurity journey, he was very into hacking and coding. That passion for code has served him well, allowing him to become successful enough to start his own business with Vonahi. For the younger generation of cyber practitioners, Alton recommends not skipping that coding education. As technically advanced and automated as cybersecurity tools are, practitioners should be prepared to code when something breaks or doesn’t work as intended.</p>
<p>“I think coding is extremely valuable, because there's going to be many times that tools that you use don't work and you have to have the experience and knowledge to basically fix those problems with coding.”</p>
<p> </p>
<p>What have you learned over the past few years that has helped you to maintain both the technical and business side of Vonahi? 21</p>
<p>Efficiency is the name of the game for Vonahi— and it’s the one thing that has allowed Alton to remain in a hands-on pen testing role while still being a business owner. Keeping it efficient is more than just technology and automation. Alton believes his success is a direct result of the efficient technology around him and the hardworking, intelligent, efficient team members working with him at Vonahi.</p>
<p>“It is really just about efficiency. We look to all these other leaders, but for me, I like to learn from other people's failures. I don't want to take the same growth processes as the person who failed and didn't do well.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Alton Johnson on <a href='https://www.linkedin.com/in/altonjx/'>LinkedIn</a> and <a href='https://www.altonj.io/'>his personal website</a></p>
<p>Learn more about Vonahi Security on <a href='https://www.linkedin.com/company/vonahisec/'>LinkedIn</a> and <a href='https://www.vonahi.io/'>the Vonahi Security website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Alton Johnson, Founder and Principal Security Consultant at Vonahi Security, automates his way out of his pen testing job in this week’s episode. An AOl hacking gone wild got Alton into defensive cybersecurity years ago, and now, as the Founder of Vonahi, Alton advocates for automation and efficiency in the pen testing process. Alton talks about his connection to defensive over offensive, customizing a pen test report to your audience, and finding that sweet spot between practitioner and entrepreneur. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Learning the importance of automation in defensive cyber</p>
<p>[07:48] Connecting with automation & defensive cybersecurity over offensive</p>
<p>[12:01] Showing the results that matter to the right people in a pen test report</p>
<p>[15:27] Prioritizing exploitations in the world of vulnerability assessments</p>
<p>[21:59] Maintaining the cyber practitioner & the entrepreneurial side of Vonahi</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit <a href='https://www.netspi.com/HVM'>netspi.com/HVM </a>to learn more.</p>
<p> </p>
<p>How have you seen automation change yourself and your role? </p>
<p>As a penetration tester, Alton explains that time is often not on his side. There’s a limited amount of time to do an assessment, and the measure of a good pen tester is often determined by fast, high quality reporting. Automating the repetitive tasks of pen testing not only saves time, but Alton believes it genuinely changes the role into something much more efficient, high value, and successful. </p>
<p><em>“Automation obviously plays a huge part in growing in the career too, because the more you can do, the more value you can provide, and the faster you can provide that value makes you a better pentester.” </em></p>
<p> </p>
<p>How do you convey the story of a red team engagement in different ways so that message is received by everyone in the company? </p>
<p>At Vonahi Security, Alton’s team separates pen testing reports into an executive summary and a technical report. The executive summary is high level, demonstrating the impact and severity of what was discovered from a business point of view. Many business executives don’t need the technical play by play, which is why that is saved for the technical report. The technical report acts as a scene by scene story of what was done and how to technically fix it.</p>
<p><em>“We separate the two conversations. Here's what we did at a high level to anyone that doesn't really care about the technical stuff, but only cares about how it impacts the business, and then, for the person that has to fix the issues, here's everything that they would need.”</em></p>
<p> </p>
<p>What would you tell the newer generation of cybersecurity practitioners about the offensive side? </p>
<p>When Alton first started his cybersecurity journey, he was very into hacking and coding. That passion for code has served him well, allowing him to become successful enough to start his own business with Vonahi. For the younger generation of cyber practitioners, Alton recommends not skipping that coding education. As technically advanced and automated as cybersecurity tools are, practitioners should be prepared to code when something breaks or doesn’t work as intended.</p>
<p><em>“I think coding is extremely valuable, because there's going to be many times that tools that you use don't work and you have to have the experience and knowledge to basically fix those problems with coding.”</em></p>
<p> </p>
<p>What have you learned over the past few years that has helped you to maintain both the technical and business side of Vonahi? 21</p>
<p>Efficiency is the name of the game for Vonahi— and it’s the one thing that has allowed Alton to remain in a hands-on pen testing role while still being a business owner. Keeping it efficient is more than just technology and automation. Alton believes his success is a direct result of the efficient technology around him and the hardworking, intelligent, efficient team members working with him at Vonahi.</p>
<p><em>“It is really just about efficiency. We look to all these other leaders, but for me, I like to learn from other people's failures. I don't want to take the same growth processes as the person who failed and didn't do well.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Alton Johnson on <a href='https://www.linkedin.com/in/altonjx/'>LinkedIn</a> and <a href='https://www.altonj.io/'>his personal website</a></p>
<p>Learn more about Vonahi Security on <a href='https://www.linkedin.com/company/vonahisec/'>LinkedIn</a> and <a href='https://www.vonahi.io/'>the Vonahi Security website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ze26dy/HVS_audio_Alton_Johnson_v2afi8n.mp3" length="34591489" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Alton Johnson, Founder and Principal Security Consultant at Vonahi Security, automates his way out of his pen testing job in this week’s episode. An AOl hacking gone wild got Alton into defensive cybersecurity years ago, and now, as the Founder of Vonahi, Alton advocates for automation and efficiency in the pen testing process. Alton talks about his connection to defensive over offensive, customizing a pen test report to your audience, and finding that sweet spot between practitioner and entrepreneur. 
 
Timecoded Guide:
[00:00] Learning the importance of automation in defensive cyber
[07:48] Connecting with automation & defensive cybersecurity over offensive
[12:01] Showing the results that matter to the right people in a pen test report
[15:27] Prioritizing exploitations in the world of vulnerability assessments
[21:59] Maintaining the cyber practitioner & the entrepreneurial side of Vonahi
 
Sponsor Links:
Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.
 
How have you seen automation change yourself and your role? 
As a penetration tester, Alton explains that time is often not on his side. There’s a limited amount of time to do an assessment, and the measure of a good pen tester is often determined by fast, high quality reporting. Automating the repetitive tasks of pen testing not only saves time, but Alton believes it genuinely changes the role into something much more efficient, high value, and successful. 
“Automation obviously plays a huge part in growing in the career too, because the more you can do, the more value you can provide, and the faster you can provide that value makes you a better pentester.” 
 
How do you convey the story of a red team engagement in different ways so that message is received by everyone in the company? 
At Vonahi Security, Alton’s team separates pen testing reports into an executive summary and a technical report. The executive summary is high level, demonstrating the impact and severity of what was discovered from a business point of view. Many business executives don’t need the technical play by play, which is why that is saved for the technical report. The technical report acts as a scene by scene story of what was done and how to technically fix it.
“We separate the two conversations. Here's what we did at a high level to anyone that doesn't really care about the technical stuff, but only cares about how it impacts the business, and then, for the person that has to fix the issues, here's everything that they would need.”
 
What would you tell the newer generation of cybersecurity practitioners about the offensive side? 
When Alton first started his cybersecurity journey, he was very into hacking and coding. That passion for code has served him well, allowing him to become successful enough to start his own business with Vonahi. For the younger generation of cyber practitioners, Alton recommends not skipping that coding education. As technically advanced and automated as cybersecurity tools are, practitioners should be prepared to code when something breaks or doesn’t work as intended.
“I think coding is extremely valuable, because there's going to be many times that tools that you use don't work and you have to have the experience and knowledge to basically fix those problems with coding.”
 
What have you learned over the past few years that has helped you to maintain both the techn]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1441</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>252</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Secret Sauce of SANS Instructors with John Hubbard</title>
        <itunes:title>The Secret Sauce of SANS Instructors with John Hubbard</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-secret-sauce-of-sans-instructors-with-john-hubbard/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-secret-sauce-of-sans-instructors-with-john-hubbard/#comments</comments>        <pubDate>Tue, 01 Nov 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/cf4a01fd-358b-3fed-b6da-8f7904c5cfc5</guid>
                                    <description><![CDATA[<p>John Hubbard, SOC consultant, SANS Sr. Instructor and host of the Blueprint Podcast, joins the Hacker Valley team this week to discuss SANS, SOCs, and seeking new hobbies. As the curriculum lead for cyber defense, John breaks down what makes a good SANS instructor and how to inspire passion in students when teaching for long hours. Additionally, John gives away his life hacks for pursuing passions outside of the cybersecurity industry, including podcasting, video editing, music creation, and nutrition. </p>
<p> </p>
<p>Time Coded Guide:</p>
<p>[00:00] Instructing for SANS & what it takes to be a good instructor</p>
<p>[07:33] Exploring the potential of a SOC-less cyber industry</p>
<p>[13:38] Teaching complicated topics with clear visuals & simple comparisons </p>
<p>[19:37] Podcasting his way to better SOC consulting skills </p>
<p>[26:12] Finding a balance between jack of all trades & single skill master</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p> </p>
<p>What do you think are the makings of a good instructor, especially for SANS? </p>
<p>Transitioning from the world of electrical and computer engineering, John’s journey to becoming a SANS instructor took over 3 years of study. Although he jokes that training to be a SANS instructor was the longest job interview ever, John is thankful for the mentorship and inspiration his training gave him. SANS courses require long hours and hard work, but John believes the best instructors bring a real love for what they do to each class. </p>
<p>“The technical aspect has to be there in a very strong way. Beyond that, you have to deliver this message not only with razor sharp clarity, but also with passion and energy. People are sitting there watching you talk for hours. If you aren't excited, they're not going to be excited.”</p>
<p> </p>
<p>Cyber defense is a pretty broad topic. What makes you feel comfortable teaching a course on cyber defense?</p>
<p>Cyber defense can be a topic that’s both broad and confusing for students, but John has been dedicated to building a curriculum that cuts through the confusion and inspires innovation. Teaching his students to focus on priorities, John wants to bring clarity to complex topics like SOCs, Kerberos, and related security issues. While the topics can be broad and debatable, John wants to equip his students with real world examples and simple comparable concepts.</p>
<p>“If there was one word I was going to summarize both of the classes I teach with, it’s ‘priorities.’ It's getting the right stuff there first, and not getting distracted by all the other details that are potentially trying to pull you in the wrong direction.”</p>
<p> </p>
<p>Have there been unintended benefits to being a podcast host, that either helps you as an instructor, or even someone that does consulting in the SOC space?</p>
<p>Taking the chance to start the Blueprint podcast was inspired partly by John’s previous interest in podcasts like Security Now, but also by his pursuit of learning content creation. Starting a podcast, for John, was an exercise in testing his comfort zone. Learning the technical aspects as well as the creative aspects of content creation and podcast hosting continues to build John’s confidence in his storytelling and teaching skills. </p>
<p>“For me, a lot of things have come out of podcasting. Probably one of the biggest things is just flexing that muscle of doing things that are slightly uncomfortable and scary. Any time you think, ‘I don't know if I can pull this off. Should I do it?’ The answer should always be yes.”</p>
<p> </p>
<p>What is one piece of advice or philosophy that enables you to do more and squeeze as much as you can out of life? </p>
<p>In the same way that he teaches his SANS students about priorities, John focuses on his personal priorities often in order to accomplish his well-rounded, jack of all trades lifestyle. Building new skills and cataloging new experiences feels vital for John. Taking full advantage of the time he’s been given and getting curious about expanding his comfort zone is an essential philosophy that has taught John not only about cyber defense, but about every hobby he enjoys as well.</p>
<p>“I try to get up as early as I can manage to get up every day, well before I start getting emails and meeting requests and all sorts of stuff like that, and try to plan out my day and ask myself, ‘How am I going to actually approach doing the things that matter the most to me?’”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest John Hubbard on <a href='https://www.linkedin.com/in/johnlhubbard/'>LinkedIn</a>, <a href='https://twitter.com/SecHubb'>Twitter</a>, and <a href='https://www.youtube.com/c/SecHubb'>YouTube</a></p>
<p>Listen to John’s podcast on <a href='https://www.blueprintcyber.com'>the Blueprint Blog</a></p>
<p>Learn more about John’s work on <a href='https://www.sans.org/profiles/john-hubbard/'>the SANS Institute website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>John Hubbard, SOC consultant, SANS Sr. Instructor and host of the Blueprint Podcast, joins the Hacker Valley team this week to discuss SANS, SOCs, and seeking new hobbies. As the curriculum lead for cyber defense, John breaks down what makes a good SANS instructor and how to inspire passion in students when teaching for long hours. Additionally, John gives away his life hacks for pursuing passions outside of the cybersecurity industry, including podcasting, video editing, music creation, and nutrition. </p>
<p> </p>
<p>Time Coded Guide:</p>
<p>[00:00] Instructing for SANS & what it takes to be a good instructor</p>
<p>[07:33] Exploring the potential of a SOC-less cyber industry</p>
<p>[13:38] Teaching complicated topics with clear visuals & simple comparisons </p>
<p>[19:37] Podcasting his way to better SOC consulting skills </p>
<p>[26:12] Finding a balance between jack of all trades & single skill master</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p> </p>
<p>What do you think are the makings of a good instructor, especially for SANS? </p>
<p>Transitioning from the world of electrical and computer engineering, John’s journey to becoming a SANS instructor took over 3 years of study. Although he jokes that training to be a SANS instructor was the longest job interview ever, John is thankful for the mentorship and inspiration his training gave him. SANS courses require long hours and hard work, but John believes the best instructors bring a real love for what they do to each class. </p>
<p><em>“The technical aspect has to be there in a very strong way. Beyond that, you have to deliver this message not only with razor sharp clarity, but also with passion and energy. People are sitting there watching you talk for hours. If you aren't excited, they're not going to be excited.”</em></p>
<p> </p>
<p>Cyber defense is a pretty broad topic. What makes you feel comfortable teaching a course on cyber defense?</p>
<p>Cyber defense can be a topic that’s both broad and confusing for students, but John has been dedicated to building a curriculum that cuts through the confusion and inspires innovation. Teaching his students to focus on priorities, John wants to bring clarity to complex topics like SOCs, Kerberos, and related security issues. While the topics can be broad and debatable, John wants to equip his students with real world examples and simple comparable concepts.</p>
<p><em>“If there was one word I was going to summarize both of the classes I teach with, it’s ‘priorities.’ It's getting the right stuff there first, and not getting distracted by all the other details that are potentially trying to pull you in the wrong direction.”</em></p>
<p> </p>
<p>Have there been unintended benefits to being a podcast host, that either helps you as an instructor, or even someone that does consulting in the SOC space?</p>
<p>Taking the chance to start the Blueprint podcast was inspired partly by John’s previous interest in podcasts like Security Now, but also by his pursuit of learning content creation. Starting a podcast, for John, was an exercise in testing his comfort zone. Learning the technical aspects as well as the creative aspects of content creation and podcast hosting continues to build John’s confidence in his storytelling and teaching skills. </p>
<p>“<em>For me, a lot of things have come out of podcasting. Probably one of the biggest things is just flexing that muscle of doing things that are slightly uncomfortable and scary. Any time you think, ‘I don't know if I can pull this off. Should I do it?’ The answer should always be yes.”</em></p>
<p> </p>
<p>What is one piece of advice or philosophy that enables you to do more and squeeze as much as you can out of life? </p>
<p>In the same way that he teaches his SANS students about priorities, John focuses on his personal priorities often in order to accomplish his well-rounded, jack of all trades lifestyle. Building new skills and cataloging new experiences feels vital for John. Taking full advantage of the time he’s been given and getting curious about expanding his comfort zone is an essential philosophy that has taught John not only about cyber defense, but about every hobby he enjoys as well.</p>
<p><em>“I try to get up as early as I can manage to get up every day, well before I start getting emails and meeting requests and all sorts of stuff like that, and try to plan out my day and ask myself, ‘How am I going to actually approach doing the things that matter the most to me?’”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest John Hubbard on <a href='https://www.linkedin.com/in/johnlhubbard/'>LinkedIn</a>, <a href='https://twitter.com/SecHubb'>Twitter</a>, and <a href='https://www.youtube.com/c/SecHubb'>YouTube</a></p>
<p>Listen to John’s podcast on <a href='https://www.blueprintcyber.com'>the Blueprint Blog</a></p>
<p>Learn more about John’s work on <a href='https://www.sans.org/profiles/john-hubbard/'>the SANS Institute website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pyhkud/HVS_Audio_John_Hubbard_V2afmou.mp3" length="44081688" type="audio/mpeg"/>
        <itunes:summary><![CDATA[John Hubbard, SOC consultant, SANS Sr. Instructor and host of the Blueprint Podcast, joins the Hacker Valley team this week to discuss SANS, SOCs, and seeking new hobbies. As the curriculum lead for cyber defense, John breaks down what makes a good SANS instructor and how to inspire passion in students when teaching for long hours. Additionally, John gives away his life hacks for pursuing passions outside of the cybersecurity industry, including podcasting, video editing, music creation, and nutrition. 
 
Time Coded Guide:
[00:00] Instructing for SANS & what it takes to be a good instructor
[07:33] Exploring the potential of a SOC-less cyber industry
[13:38] Teaching complicated topics with clear visuals & simple comparisons 
[19:37] Podcasting his way to better SOC consulting skills 
[26:12] Finding a balance between jack of all trades & single skill master
 
Sponsor Links:
Thank you to our sponsor Axonius for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
 
What do you think are the makings of a good instructor, especially for SANS? 
Transitioning from the world of electrical and computer engineering, John’s journey to becoming a SANS instructor took over 3 years of study. Although he jokes that training to be a SANS instructor was the longest job interview ever, John is thankful for the mentorship and inspiration his training gave him. SANS courses require long hours and hard work, but John believes the best instructors bring a real love for what they do to each class. 
“The technical aspect has to be there in a very strong way. Beyond that, you have to deliver this message not only with razor sharp clarity, but also with passion and energy. People are sitting there watching you talk for hours. If you aren't excited, they're not going to be excited.”
 
Cyber defense is a pretty broad topic. What makes you feel comfortable teaching a course on cyber defense?
Cyber defense can be a topic that’s both broad and confusing for students, but John has been dedicated to building a curriculum that cuts through the confusion and inspires innovation. Teaching his students to focus on priorities, John wants to bring clarity to complex topics like SOCs, Kerberos, and related security issues. While the topics can be broad and debatable, John wants to equip his students with real world examples and simple comparable concepts.
“If there was one word I was going to summarize both of the classes I teach with, it’s ‘priorities.’ It's getting the right stuff there first, and not getting distracted by all the other details that are potentially trying to pull you in the wrong direction.”
 
Have there been unintended benefits to being a podcast host, that either helps you as an instructor, or even someone that does consulting in the SOC space?
Taking the chance to start the Blueprint podcast was inspired partly by John’s previous interest in podcasts like Security Now, but also by his pursuit of learning content creation. Starting a podcast, for John, was an exercise in testing his comfort zone. Learning the technical aspects as well as the creative aspects of content creation and podcast hosting continues to build John’s confidence in his storytelling and teaching skills. 
“For me, a lot of things have come out of podcasting. Probably one of the biggest things is just flexing that muscle of doing things that are slightly uncomfortable and scary. Any time you think, ‘I don't know if I can pull this off. Should I do it?’ The answer should always be yes.”
 
What is one piece of advice or philosophy that enables you to do more and squeeze as much as you can out of life? 
In the same way that he teaches his SANS students about priorities, John focuses on his personal priorities often in order to accomplish h]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1828</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>249</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Creating Community for Female Security Practitioners with Larci Robertson</title>
        <itunes:title>Creating Community for Female Security Practitioners with Larci Robertson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/creating-community-for-female-security-practitioners-with-larci-robertson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/creating-community-for-female-security-practitioners-with-larci-robertson/#comments</comments>        <pubDate>Tue, 25 Oct 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/77b098fb-376b-3359-aed0-23db63f68d0c</guid>
                                    <description><![CDATA[<p>Larci Robertson, Sales Engineer at Cyberreason and Board President of Women of Security, brings her expertise and experience in cyber threat analysis, community building, and networking to the pod this week. Larci talks about her time in the Navy, her desire for female friends, and how the combination of those two things led to her joining Women of Security (WoSec). In this episode, Larci walks through the importance of women-led cyber spaces and how mentoring gives back to the community in a ripple effect. </p>
<p> </p>
<p>Timecoded Guide: </p>
<p>[00:00] Searching for friendship in Women of Security spaces </p>
<p>[06:56] Diving into the Dallas cyber community with WoSec </p>
<p>[14:00] Finding mission-focused purpose in threat intelligence analysis </p>
<p>[17:57] Transitioning from the military into security and technology </p>
<p>[24:10] Encouraging women to stay motivated in the cyber industry  </p>
<p> </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a>

</p>
<p>How did you get introduced to Women of Security? </p>
<p>After leaving the Navy and moving to Dallas, Larci struggled to find community amongst other women in tech. She worried the women she knew outside of the industry wouldn’t understand her unique struggles, but the women she was meeting in cyber felt few and far between. Reaching out to Women of Security felt like an encounter with destiny, which inspired Larci to start her own WoSec chapter in Plano and find her voice as a community leader. </p>
<p>“I wanted to find those women and get more women into security, but also have somebody to hang out with that was in the same industry, same page, we're all kind of going at the same pulse of what we've got going on in our lives.” </p>
<p> </p>
<p>What are the challenges for women transitioning into the technology field, whether they're coming from the military or from another industry? </p>
<p>As a woman in threat defense analysis, Larci understands the hurdles and complications that come with transitioning into the field. Originally gaining her security experience in the Navy, Larci explains that she, along with many women she meets in the industry, undermine their past experiences and doubt their full potential. This often leads to less job applications from women when positions open up, perpetuating the gap for women in tech. </p>
<p>“I want to tell women, and I do tell them all the time, don't look at that job title. Read through the actual like, what they want you to do, and maybe you understand it in a different way. Don't worry about that stuff. Let them tell you you're not qualified, don't do it to yourself.” </p>
<p> </p>
<p>What comes to the top of your mind about the power of community when thinking about WoSec? </p>
<p>Community inspired Larci to be a part of WoSec, but it also left a lasting impact on her friends and her family. Not only has Larci witnessed many female friends achieve career heights they never dreamed possible, she’s also seen Women of Security inspire her own daughter. Initially believing her job was “too technical,” Larci’s daughter now better understands her own potential to succeed in cyber and tech, which has given her so much confidence in her future. </p>
<p>“I'm seeing people get their first jobs in cybersecurity, and it's really exciting. And then, they'll turn around and help somebody else. I feel like that's happening a lot more. I see it because my group is doing it, I think we're all emulating each other in that way.” </p>
<p> </p>
<p>For any women listening right now, what would be that piece of advice that you have for them to keep them energized while they're in the field? </p>
<p>Money is a motivator for many individuals transitioning into the cyber industry. While Larci understands why she meets many women looking to make more money in cyber, she also encourages those women— and anyone else listening to this week’s show— to find a purpose and passion for their work. Money motivation doesn’t last forever, and Larci wants to build a community of women who understand and enjoy their purpose in tech.  </p>
<p>“I feel like no matter what you do, if you have purpose in what you're doing, you're going to stay and you're going to have that drive. On top of that, you gotta have fun with this. If you're not having fun at what you're doing every day, I think you're doing it wrong.” </p>
<p>--------------- </p>
<p>Links: </p>
<p>Keep up with our guest Larci Robertson on <a href='https://www.linkedin.com/in/larci-robertson/'>LinkedIn</a> and <a href='https://twitter.com/Larci007'>Twitter</a> </p>
<p>Learn more about Cyberreason on <a href='https://www.linkedin.com/company/cybereason/'>LinkedIn</a> and <a href='https://www.cybereason.com/'>the Cyberreason website</a> </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a> </p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a> </p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a> </p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a> </p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Larci Robertson, Sales Engineer at Cyberreason and Board President of Women of Security, brings her expertise and experience in cyber threat analysis, community building, and networking to the pod this week. Larci talks about her time in the Navy, her desire for female friends, and how the combination of those two things led to her joining Women of Security (WoSec). In this episode, Larci walks through the importance of women-led cyber spaces and how mentoring gives back to the community in a ripple effect. </p>
<p> </p>
<p>Timecoded Guide: </p>
<p>[00:00] Searching for friendship in Women of Security spaces </p>
<p>[06:56] Diving into the Dallas cyber community with WoSec </p>
<p>[14:00] Finding mission-focused purpose in threat intelligence analysis </p>
<p>[17:57] Transitioning from the military into security and technology </p>
<p>[24:10] Encouraging women to stay motivated in the cyber industry  </p>
<p> </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a><br>
<br>
</p>
<p>How did you get introduced to Women of Security? </p>
<p>After leaving the Navy and moving to Dallas, Larci struggled to find community amongst other women in tech. She worried the women she knew outside of the industry wouldn’t understand her unique struggles, but the women she was meeting in cyber felt few and far between. Reaching out to Women of Security felt like an encounter with destiny, which inspired Larci to start her own WoSec chapter in Plano and find her voice as a community leader. </p>
<p><em>“I wanted to find those women and get more women into security, but also have somebody to hang out with that was in the same industry, same page, we're all kind of going at the same pulse of what we've got going on in our lives.”</em> </p>
<p> </p>
<p>What are the challenges for women transitioning into the technology field, whether they're coming from the military or from another industry? </p>
<p>As a woman in threat defense analysis, Larci understands the hurdles and complications that come with transitioning into the field. Originally gaining her security experience in the Navy, Larci explains that she, along with many women she meets in the industry, undermine their past experiences and doubt their full potential. This often leads to less job applications from women when positions open up, perpetuating the gap for women in tech. </p>
<p><em>“I want to tell women, and I do tell them all the time, don't look at that job title. Read through the actual like, what they want you to do, and maybe you understand it in a different way. Don't worry about that stuff. Let them tell you you're not qualified, don't do it to yourself.”</em> </p>
<p> </p>
<p>What comes to the top of your mind about the power of community when thinking about WoSec? </p>
<p>Community inspired Larci to be a part of WoSec, but it also left a lasting impact on her friends and her family. Not only has Larci witnessed many female friends achieve career heights they never dreamed possible, she’s also seen Women of Security inspire her own daughter. Initially believing her job was “too technical,” Larci’s daughter now better understands her own potential to succeed in cyber and tech, which has given her so much confidence in her future. </p>
<p><em>“I'm seeing people get their first jobs in cybersecurity, and it's really exciting. And then, they'll turn around and help somebody else. I feel like that's happening a lot more. I see it because my group is doing it, I think we're all emulating each other in that way.”</em> </p>
<p> </p>
<p>For any women listening right now, what would be that piece of advice that you have for them to keep them energized while they're in the field? </p>
<p>Money is a motivator for many individuals transitioning into the cyber industry. While Larci understands why she meets many women looking to make more money in cyber, she also encourages those women— and anyone else listening to this week’s show— to find a purpose and passion for their work. Money motivation doesn’t last forever, and Larci wants to build a community of women who understand and enjoy their purpose in tech.  </p>
<p><em>“I feel like no matter what you do, if you have purpose in what you're doing, you're going to stay and you're going to have that drive. On top of that, you gotta have fun with this. If you're not having fun at what you're doing every day, I think you're doing it wrong.”</em> </p>
<p>--------------- </p>
<p>Links: </p>
<p>Keep up with our guest Larci Robertson on <a href='https://www.linkedin.com/in/larci-robertson/'>LinkedIn</a> and <a href='https://twitter.com/Larci007'>Twitter</a> </p>
<p>Learn more about Cyberreason on <a href='https://www.linkedin.com/company/cybereason/'>LinkedIn</a> and <a href='https://www.cybereason.com/'>the Cyberreason website</a> </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a> </p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a> </p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a> </p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a> </p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zxigui/HVS_Audio_Larci_Robertson_V1bocu5.mp3" length="37806066" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Larci Robertson, Sales Engineer at Cyberreason and Board President of Women of Security, brings her expertise and experience in cyber threat analysis, community building, and networking to the pod this week. Larci talks about her time in the Navy, her desire for female friends, and how the combination of those two things led to her joining Women of Security (WoSec). In this episode, Larci walks through the importance of women-led cyber spaces and how mentoring gives back to the community in a ripple effect. 
 
Timecoded Guide: 
[00:00] Searching for friendship in Women of Security spaces 
[06:56] Diving into the Dallas cyber community with WoSec 
[14:00] Finding mission-focused purpose in threat intelligence analysis 
[17:57] Transitioning from the military into security and technology 
[24:10] Encouraging women to stay motivated in the cyber industry  
 
Sponsor Links: 
Thank you to our sponsor Axonius for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
How did you get introduced to Women of Security? 
After leaving the Navy and moving to Dallas, Larci struggled to find community amongst other women in tech. She worried the women she knew outside of the industry wouldn’t understand her unique struggles, but the women she was meeting in cyber felt few and far between. Reaching out to Women of Security felt like an encounter with destiny, which inspired Larci to start her own WoSec chapter in Plano and find her voice as a community leader. 
“I wanted to find those women and get more women into security, but also have somebody to hang out with that was in the same industry, same page, we're all kind of going at the same pulse of what we've got going on in our lives.” 
 
What are the challenges for women transitioning into the technology field, whether they're coming from the military or from another industry? 
As a woman in threat defense analysis, Larci understands the hurdles and complications that come with transitioning into the field. Originally gaining her security experience in the Navy, Larci explains that she, along with many women she meets in the industry, undermine their past experiences and doubt their full potential. This often leads to less job applications from women when positions open up, perpetuating the gap for women in tech. 
“I want to tell women, and I do tell them all the time, don't look at that job title. Read through the actual like, what they want you to do, and maybe you understand it in a different way. Don't worry about that stuff. Let them tell you you're not qualified, don't do it to yourself.” 
 
What comes to the top of your mind about the power of community when thinking about WoSec? 
Community inspired Larci to be a part of WoSec, but it also left a lasting impact on her friends and her family. Not only has Larci witnessed many female friends achieve career heights they never dreamed possible, she’s also seen Women of Security inspire her own daughter. Initially believing her job was “too technical,” Larci’s daughter now better understands her own potential to succeed in cyber and tech, which has given her so much confidence in her future. 
“I'm seeing people get their first jobs in cybersecurity, and it's really exciting. And then, they'll turn around and help somebody else. I feel like that's happening a lot more. I see it because my group is doing it, I think we're all emulating each other in that way.” 
 
For any women listening right now, what would be that piece of advice that you have for them to keep them energized while they're in the field? 
Money is a motivator for many individuals transitioning into the cyber industry. While Larci understands why she meets many women looking to make more money in cyber, she also encourages those women— an]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1567</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>248</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Securing Feelings of Worth, Value, &amp; Belonging with Marrelle Bailey</title>
        <itunes:title>Securing Feelings of Worth, Value, &amp; Belonging with Marrelle Bailey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/securing-feelings-of-worth-value-belonging-with-marrelle-bailey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/securing-feelings-of-worth-value-belonging-with-marrelle-bailey/#comments</comments>        <pubDate>Tue, 18 Oct 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/500b7b20-5683-3bb6-a2d4-28003a9c8d51</guid>
                                    <description><![CDATA[<p>Marrelle Bailey, Community Manager, Content Curator, and DEI Advocate, brings her multifaceted career experiences down to Hacker Valley Studio this week. Tapping into her past lives in yoga, bodybuilding, community managing, and cybersecurity, Marrelle explains the silo her career has taken into helping others find ease and peace of mind in their work. Marrelle also walks Chris and Ron through an exercise designed to help anyone feel more worthy, valuable, and like they belong.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Taking on career pivots with excitement & curiosity</p>
<p>[06:23] Bodybuilding & yoga’s surprising presence in her cyber career</p>
<p>[09:28] Finding black women in predominantly white tech communities</p>
<p>[14:07] Being a jack of all trades, but a master of self worth & reflection</p>
<p>[20:54] One key practice for feeling worthy, valuable, & like you belong</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a>

</p>
<p>What from your past in yoga and bodybuilding has stuck with you today?</p>
<p>As someone who grew up feeling traumatized and uncertain, Marrelle believes that yoga genuinely saved her life. Yoga helped Marrelle feel confident and empowered, and also taught her the importance of self-reflection. Additionally, Marrelle’s continued health and wellness journey inspired her to take up bodybuilding, which has motivated Marrelle to work hard, to motivate others to engage in their health, and to recognize when she’s holding herself back.</p>
<p>“My clients know I'm fixated on pushing them as much as I push myself, because I know we have greatness. I know for myself, I can be the best self-sabotager in the world when it comes to pushing myself professionally. I know what it feels like sometimes to hold yourself back.”</p>
<p> </p>
<p>What has it been like doing all these different roles and how do they stack together?</p>
<p>Marrelle is a true example of a jack of all trades, with experience in personal training, cybersecurity, content creation, and community management. Despite the differences, each role Marrelle has taken on has ultimately focused on compassion, authenticity, and perseverance. Marrelle never saw black women succeed in the areas she wanted to succeed, but now, she can set an example and show that she belongs in each opportunity she takes.</p>
<p>“I feel like each job taught me, even though they were all so different, they all taught me about gaining compassion for people. Am I being authentic to the people around me? Am I giving people the ability to be themselves and for me to be myself, to grow, to persevere, to push?”</p>
<p> </p>
<p>How would you describe yourself, being so multifaceted and dimensioned?</p>
<p>Marrelle believes she is someone that just wants to help other people and support other people in their healing process and in knowing their importance. Many people, regardless of their profession, struggle with difficult feelings of unworthiness and exclusion, fearing that they won’t be taken seriously for who they are. Marrelle has struggled with these same feelings, and wants to create safe spaces for people to grow and nurture their confidence.</p>
<p>“I just want to bring people's lives ease and peace and remind them how valuable they are, because I think all of us at some point struggle to know our worthiness and our value, and that we belong in the spaces that we're in, because sometimes we can really feel left out.”</p>
<p> </p>
<p>What would you recommend for anyone who wanted to start feeling worthy, valuable, and like they belong a little bit more today?</p>
<p>While anyone can struggle with feeling a lack of worth, value, and belonging, Marrelle wants to reassure listeners that these exist in abundance and can be built up with mindfulness exercises. An easy way to start practicing a better and more positive mindset is through inhaling the good and exhaling the bad. As you inhale deeply, think positively about who you are and who you want to be. As you exhale, get rid of negative and unfair thoughts about what makes you “not good enough” to feel worthy, valuable, and like you belong.</p>
<p>“You are worthy, you are valuable, and you belong where you are. No one can question it, you are where you are because you got there. No one knows your backstory, no one knows your journey, no one can walk in your shoes, but you deserve to be where you are.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Marrelle Bailey on <a href='https://www.linkedin.com/in/marrelle-bailey/'>LinkedIn</a>, <a href='https://twitter.com/MarrelleBailey'>Twitter</a>, and <a href='https://www.marrellebailey.com'>website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Marrelle Bailey, Community Manager, Content Curator, and DEI Advocate, brings her multifaceted career experiences down to Hacker Valley Studio this week. Tapping into her past lives in yoga, bodybuilding, community managing, and cybersecurity, Marrelle explains the silo her career has taken into helping others find ease and peace of mind in their work. Marrelle also walks Chris and Ron through an exercise designed to help anyone feel more worthy, valuable, and like they belong.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Taking on career pivots with excitement & curiosity</p>
<p>[06:23] Bodybuilding & yoga’s surprising presence in her cyber career</p>
<p>[09:28] Finding black women in predominantly white tech communities</p>
<p>[14:07] Being a jack of all trades, but a master of self worth & reflection</p>
<p>[20:54] One key practice for feeling worthy, valuable, & like you belong</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor Axonius for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a><br>
<br>
</p>
<p>What from your past in yoga and bodybuilding has stuck with you today?</p>
<p>As someone who grew up feeling traumatized and uncertain, Marrelle believes that yoga genuinely saved her life. Yoga helped Marrelle feel confident and empowered, and also taught her the importance of self-reflection. Additionally, Marrelle’s continued health and wellness journey inspired her to take up bodybuilding, which has motivated Marrelle to work hard, to motivate others to engage in their health, and to recognize when she’s holding herself back.</p>
<p><em>“My clients know I'm fixated on pushing them as much as I push myself, because I know we have greatness. I know for myself, I can be the best self-sabotager in the world when it comes to pushing myself professionally. I know what it feels like sometimes to hold yourself back.”</em></p>
<p> </p>
<p>What has it been like doing all these different roles and how do they stack together?</p>
<p>Marrelle is a true example of a jack of all trades, with experience in personal training, cybersecurity, content creation, and community management. Despite the differences, each role Marrelle has taken on has ultimately focused on compassion, authenticity, and perseverance. Marrelle never saw black women succeed in the areas she wanted to succeed, but now, she can set an example and show that she belongs in each opportunity she takes.</p>
<p><em>“I feel like each job taught me, even though they were all so different, they all taught me about gaining compassion for people. Am I being authentic to the people around me? Am I giving people the ability to be themselves and for me to be myself, to grow, to persevere, to push?”</em></p>
<p> </p>
<p>How would you describe yourself, being so multifaceted and dimensioned?</p>
<p>Marrelle believes she is someone that just wants to help other people and support other people in their healing process and in knowing their importance. Many people, regardless of their profession, struggle with difficult feelings of unworthiness and exclusion, fearing that they won’t be taken seriously for who they are. Marrelle has struggled with these same feelings, and wants to create safe spaces for people to grow and nurture their confidence.</p>
<p><em>“I just want to bring people's lives ease and peace and remind them how valuable they are, because I think all of us at some point struggle to know our worthiness and our value, and that we belong in the spaces that we're in, because sometimes we can really feel left out.”</em></p>
<p> </p>
<p>What would you recommend for anyone who wanted to start feeling worthy, valuable, and like they belong a little bit more today?</p>
<p>While anyone can struggle with feeling a lack of worth, value, and belonging, Marrelle wants to reassure listeners that these exist in abundance and can be built up with mindfulness exercises. An easy way to start practicing a better and more positive mindset is through inhaling the good and exhaling the bad. As you inhale deeply, think positively about who you are and who you want to be. As you exhale, get rid of negative and unfair thoughts about what makes you “not good enough” to feel worthy, valuable, and like you belong.</p>
<p><em>“You are worthy, you are valuable, and you belong where you are. No one can question it, you are where you are because you got there. No one knows your backstory, no one knows your journey, no one can walk in your shoes, but you deserve to be where you are.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Marrelle Bailey on <a href='https://www.linkedin.com/in/marrelle-bailey/'>LinkedIn</a>, <a href='https://twitter.com/MarrelleBailey'>Twitter</a>, and <a href='https://www.marrellebailey.com'>website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/h3etzc/HVS_Audio_Marrelle_Bailey_V1acli8.mp3" length="36039852" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Marrelle Bailey, Community Manager, Content Curator, and DEI Advocate, brings her multifaceted career experiences down to Hacker Valley Studio this week. Tapping into her past lives in yoga, bodybuilding, community managing, and cybersecurity, Marrelle explains the silo her career has taken into helping others find ease and peace of mind in their work. Marrelle also walks Chris and Ron through an exercise designed to help anyone feel more worthy, valuable, and like they belong.
 
Timecoded Guide:
[00:00] Taking on career pivots with excitement & curiosity
[06:23] Bodybuilding & yoga’s surprising presence in her cyber career
[09:28] Finding black women in predominantly white tech communities
[14:07] Being a jack of all trades, but a master of self worth & reflection
[20:54] One key practice for feeling worthy, valuable, & like you belong
 
Sponsor Links:
Thank you to our sponsor Axonius for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
What from your past in yoga and bodybuilding has stuck with you today?
As someone who grew up feeling traumatized and uncertain, Marrelle believes that yoga genuinely saved her life. Yoga helped Marrelle feel confident and empowered, and also taught her the importance of self-reflection. Additionally, Marrelle’s continued health and wellness journey inspired her to take up bodybuilding, which has motivated Marrelle to work hard, to motivate others to engage in their health, and to recognize when she’s holding herself back.
“My clients know I'm fixated on pushing them as much as I push myself, because I know we have greatness. I know for myself, I can be the best self-sabotager in the world when it comes to pushing myself professionally. I know what it feels like sometimes to hold yourself back.”
 
What has it been like doing all these different roles and how do they stack together?
Marrelle is a true example of a jack of all trades, with experience in personal training, cybersecurity, content creation, and community management. Despite the differences, each role Marrelle has taken on has ultimately focused on compassion, authenticity, and perseverance. Marrelle never saw black women succeed in the areas she wanted to succeed, but now, she can set an example and show that she belongs in each opportunity she takes.
“I feel like each job taught me, even though they were all so different, they all taught me about gaining compassion for people. Am I being authentic to the people around me? Am I giving people the ability to be themselves and for me to be myself, to grow, to persevere, to push?”
 
How would you describe yourself, being so multifaceted and dimensioned?
Marrelle believes she is someone that just wants to help other people and support other people in their healing process and in knowing their importance. Many people, regardless of their profession, struggle with difficult feelings of unworthiness and exclusion, fearing that they won’t be taken seriously for who they are. Marrelle has struggled with these same feelings, and wants to create safe spaces for people to grow and nurture their confidence.
“I just want to bring people's lives ease and peace and remind them how valuable they are, because I think all of us at some point struggle to know our worthiness and our value, and that we belong in the spaces that we're in, because sometimes we can really feel left out.”
 
What would you recommend for anyone who wanted to start feeling worthy, valuable, and like they belong a little bit more today?
While anyone can struggle with feeling a lack of worth, value, and belonging, Marrelle wants to reassure listeners that these exist in abundance and can be built up with mindfulness exercises. An easy way to start practicing a better and more positive min]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1501</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>246</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Finding Your Imposter Syndrome Origin Story with Sheryl Anjanette</title>
        <itunes:title>Finding Your Imposter Syndrome Origin Story with Sheryl Anjanette</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/finding-your-imposter-syndrome-origin-story-with-sheryl-anjanette/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/finding-your-imposter-syndrome-origin-story-with-sheryl-anjanette/#comments</comments>        <pubDate>Tue, 11 Oct 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b24ca424-aeeb-35ab-b362-5128600647a7</guid>
                                    <description><![CDATA[<p>Sheryl Anjanette, Author, Speaker, and CEO & Founder of Anjanette Wellness Academy, comes down to Hacker Valley to discuss and promote her new book. The Imposter Lies Within covers Sheryl’s work with the intersection between business and mindset, and invites professionals to reconsider and reprogram their brains away from imposter syndrome. Using her findings personally and professionally, Sheryl walks through the origins, explanations, and potential remedies for imposter syndrome in this episode.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Discovering imposter syndrome’s origin story </p>
<p>[05:04] External triggers vs the inner critic</p>
<p>[13:59] Imposter syndrome & Neuro Linguistic Programming (NLP)</p>
<p>[21:11] Reprogramming your brain to heal from the imposter phenomenon</p>
<p>[27:34] Fearing firing as an unrealistic response to the inner critic</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a></p>
<p> </p>
<p>What is the origin of imposter syndrome? </p>
<p>Defined and named in the early 1970s, imposter syndrome impacts each person in different ways depending on a variety of personal experiences, including gender, upbringing, and income status. Despite the experience varying from person to person, Sheryl explains the set of symptoms still remains strikingly similar, no matter who is suffering from imposter syndrome. This has made the phenomenon relatively easy to identify with, as many struggle with a lack of belonging, self worth, and self confidence.</p>
<p>“In the early ‘70s…researchers called it the imposter phenomenon, but they had only studied women. For quite a long time, people thought only women experienced feeling like an imposter, but recent studies have shown that men and women experience this almost equally, just differently.”</p>
<p> </p>
<p>Do you see imposter syndrome as a negative construct of Neuro Linguistic Programming (NLP)?</p>
<p>Outside of the office, Sheryl incorporates Integrated Hypnotherapy in a large majority of her coaching work and explains that a large majority of that has involved delving into NLP, or Neuro Linguistic Programming. NLP emphasizes the importance of what people tell themselves. What someone actively lets themselves think has the power to become true to their brain. When someone thinks they are an imposter at work, they end up accidentally using aspects of NLP, which causes their brain to believe they are an imposter. </p>
<p>“Our conscious mind is only 10% of our reality, 90% is below the surface. When we can start to make the unconscious conscious, when we can do the deep dive and go back in and look at our programming, we can see where the code went bad and change that.”</p>
<p> </p>
<p>What are the steps of reprogramming your mind away from these imposter thoughts?</p>
<p>Reprogramming someone to actively deny and work against imposter syndrome thoughts requires a deep dive into emotions and an understanding of an internalized past. Sheryl explains that being present, taking deep breaths, and allowing your perspective to shift out of your head and into your body are all steps that need to be taken in this reprogramming process. This process is powerful and new, but Sheryl promises it doesn’t have to be difficult or uncomfortable. </p>
<p>“Get very, very present in the moment and then, just feel yourself drop into your heart. Feel yourself drop into your heart, it's only an 18-inch journey, but it's something we generally don't do very often. Get out of our head and into your heart.”</p>
<p> </p>
<p>For anyone that's dealing with imposter syndrome, is there anything that you would want to tell them to help them understand the power within?</p>
<p>Sheryl sees a large majority of professionals struggle specifically around the idea of not being good enough at work and being an imposter at risk of being fired. Imposter syndrome can convince anyone of this idea because it doesn’t rely on experience as evidence, according to Sheryl. Instead, someone suffering from imposter syndrome has to acknowledge that the idea of not being good enough and being fired is just an idea, not reality. </p>
<p>“As you go into your heart and into your observer role, ask yourself: Is this real? Where's this coming from? And then, tell yourself a different story. ‘I'm good. Everything will work out. I think that's just a pattern that I've had for a long time. I'm going to assume the best.’”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Sheryl Anjanette on <a href='https://www.sherylanjanette.com/?r_done=1'>her website</a>, <a href='https://www.linkedin.com/in/sheryl-anjanette/'>LinkedIn</a>, or via email: <a href='mailto:hello@sherylanjanette.com'>hello@sherylanjanette.com</a></p>
<p>Purchase Sheryl Anjanette’s book, The Imposter Lies Within, on <a href='https://www.amazon.com/gp/product/B09VMTBYGW/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i0'>Amazon</a> and <a href='https://www.barnesandnoble.com/w/the-imposter-lies-within-sheryl-anjanette/1141111059'>Barnes & Noble</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Sheryl Anjanette, Author, Speaker, and CEO & Founder of Anjanette Wellness Academy, comes down to Hacker Valley to discuss and promote her new book. <em>The Imposter Lies Within</em> covers Sheryl’s work with the intersection between business and mindset, and invites professionals to reconsider and reprogram their brains away from imposter syndrome. Using her findings personally and professionally, Sheryl walks through the origins, explanations, and potential remedies for imposter syndrome in this episode.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Discovering imposter syndrome’s origin story </p>
<p>[05:04] External triggers vs the inner critic</p>
<p>[13:59] Imposter syndrome & Neuro Linguistic Programming (NLP)</p>
<p>[21:11] Reprogramming your brain to heal from the imposter phenomenon</p>
<p>[27:34] Fearing firing as an unrealistic response to the inner critic</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a></p>
<p> </p>
<p>What is the origin of imposter syndrome? </p>
<p>Defined and named in the early 1970s, imposter syndrome impacts each person in different ways depending on a variety of personal experiences, including gender, upbringing, and income status. Despite the experience varying from person to person, Sheryl explains the set of symptoms still remains strikingly similar, no matter who is suffering from imposter syndrome. This has made the phenomenon relatively easy to identify with, as many struggle with a lack of belonging, self worth, and self confidence.</p>
<p><em>“In the early ‘70s…researchers called it the imposter phenomenon, but they had only studied women. For quite a long time, people thought only women experienced feeling like an imposter, but recent studies have shown that men and women experience this almost equally, just differently.”</em></p>
<p> </p>
<p>Do you see imposter syndrome as a negative construct of Neuro Linguistic Programming (NLP)?</p>
<p>Outside of the office, Sheryl incorporates Integrated Hypnotherapy in a large majority of her coaching work and explains that a large majority of that has involved delving into NLP, or Neuro Linguistic Programming. NLP emphasizes the importance of what people tell themselves. What someone actively lets themselves think has the power to become true to their brain. When someone thinks they are an imposter at work, they end up accidentally using aspects of NLP, which causes their brain to believe they are an imposter. </p>
<p><em>“Our conscious mind is only 10% of our reality, 90% is below the surface. When we can start to make the unconscious conscious, when we can do the deep dive and go back in and look at our programming, we can see where the code went bad and change that.”</em></p>
<p> </p>
<p>What are the steps of reprogramming your mind away from these imposter thoughts?</p>
<p>Reprogramming someone to actively deny and work against imposter syndrome thoughts requires a deep dive into emotions and an understanding of an internalized past. Sheryl explains that being present, taking deep breaths, and allowing your perspective to shift out of your head and into your body are all steps that need to be taken in this reprogramming process. This process is powerful and new, but Sheryl promises it doesn’t have to be difficult or uncomfortable. </p>
<p><em>“Get very, very present in the moment and then, just feel yourself drop into your heart. Feel yourself drop into your heart, it's only an 18-inch journey, but it's something we generally don't do very often. Get out of our head and into your heart.”</em></p>
<p> </p>
<p>For anyone that's dealing with imposter syndrome, is there anything that you would want to tell them to help them understand the power within?</p>
<p>Sheryl sees a large majority of professionals struggle specifically around the idea of not being good enough at work and being an imposter at risk of being fired. Imposter syndrome can convince anyone of this idea because it doesn’t rely on experience as evidence, according to Sheryl. Instead, someone suffering from imposter syndrome has to acknowledge that the idea of not being good enough and being fired is just an idea, not reality. </p>
<p><em>“As you go into your heart and into your observer role, ask yourself: Is this real? Where's this coming from? And then, tell yourself a different story. ‘I'm good. Everything will work out. I think that's just a pattern that I've had for a long time. I'm going to assume the best.’”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Sheryl Anjanette on <a href='https://www.sherylanjanette.com/?r_done=1'>her website</a>, <a href='https://www.linkedin.com/in/sheryl-anjanette/'>LinkedIn</a>, or via email: <a href='mailto:hello@sherylanjanette.com'>hello@sherylanjanette.com</a></p>
<p>Purchase Sheryl Anjanette’s book, <em>The Imposter Lies Within</em>, on <a href='https://www.amazon.com/gp/product/B09VMTBYGW/ref=dbs_a_def_rwt_hsch_vapi_tkin_p1_i0'>Amazon</a> and <a href='https://www.barnesandnoble.com/w/the-imposter-lies-within-sheryl-anjanette/1141111059'>Barnes & Noble</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7ewuqv/HVS_Audio_Sheryl_Anjanette_V18r3et.mp3" length="46382919" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Sheryl Anjanette, Author, Speaker, and CEO & Founder of Anjanette Wellness Academy, comes down to Hacker Valley to discuss and promote her new book. The Imposter Lies Within covers Sheryl’s work with the intersection between business and mindset, and invites professionals to reconsider and reprogram their brains away from imposter syndrome. Using her findings personally and professionally, Sheryl walks through the origins, explanations, and potential remedies for imposter syndrome in this episode.
 
Timecoded Guide:
[00:00] Discovering imposter syndrome’s origin story 
[05:04] External triggers vs the inner critic
[13:59] Imposter syndrome & Neuro Linguistic Programming (NLP)
[21:11] Reprogramming your brain to heal from the imposter phenomenon
[27:34] Fearing firing as an unrealistic response to the inner critic
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at uptycs.com
 
What is the origin of imposter syndrome? 
Defined and named in the early 1970s, imposter syndrome impacts each person in different ways depending on a variety of personal experiences, including gender, upbringing, and income status. Despite the experience varying from person to person, Sheryl explains the set of symptoms still remains strikingly similar, no matter who is suffering from imposter syndrome. This has made the phenomenon relatively easy to identify with, as many struggle with a lack of belonging, self worth, and self confidence.
“In the early ‘70s…researchers called it the imposter phenomenon, but they had only studied women. For quite a long time, people thought only women experienced feeling like an imposter, but recent studies have shown that men and women experience this almost equally, just differently.”
 
Do you see imposter syndrome as a negative construct of Neuro Linguistic Programming (NLP)?
Outside of the office, Sheryl incorporates Integrated Hypnotherapy in a large majority of her coaching work and explains that a large majority of that has involved delving into NLP, or Neuro Linguistic Programming. NLP emphasizes the importance of what people tell themselves. What someone actively lets themselves think has the power to become true to their brain. When someone thinks they are an imposter at work, they end up accidentally using aspects of NLP, which causes their brain to believe they are an imposter. 
“Our conscious mind is only 10% of our reality, 90% is below the surface. When we can start to make the unconscious conscious, when we can do the deep dive and go back in and look at our programming, we can see where the code went bad and change that.”
 
What are the steps of reprogramming your mind away from these imposter thoughts?
Reprogramming someone to actively deny and work against imposter syndrome thoughts requires a deep dive into emotions and an understanding of an internalized past. Sheryl explains that being present, taking deep breaths, and allowing your perspective to shift out of your head and into your body are all steps that need to be taken in this reprogramming process. This process is powerful and new, but Sheryl promises it doesn’t have to be difficult or uncomfortable. 
“Get very, very present in the moment and then, just feel yourself drop into your heart. Feel yourself drop into your heart, it's only an 18-inch journey, but it's something we generally don't do very often. Get out of our head and into your heart.”
 
For anyone that's dealing with imposter syndrome, is there anything that you would want to tell them to help them understand the power within?
Sheryl sees a large majority]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1926</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>243</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Beers, Tears, &amp; Breaking Through in Cybersecurity Marketing with Gianna Whitver &amp; Maria Velasquez</title>
        <itunes:title>Beers, Tears, &amp; Breaking Through in Cybersecurity Marketing with Gianna Whitver &amp; Maria Velasquez</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/beers-tears-breaking-through-in-cybersecurity-marketing-with-gianna-whitver-maria-velasquez/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/beers-tears-breaking-through-in-cybersecurity-marketing-with-gianna-whitver-maria-velasquez/#comments</comments>        <pubDate>Thu, 06 Oct 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f71a5242-0368-3750-ba56-ed052f6e0ce6</guid>
                                    <description><![CDATA[<p>In this special episode, Hacker Valley community members and hosts of the Breaking Through in Cybersecurity Marketing podcast, Gianna Whitver and Maria Velasquez, tell all about the ups and downs of cyber marketing. As podcast hosts and founders of the Cybersecurity Marketing Society, Gianna and Maria eat, sleep, and breathe cybersecurity marketing. This week, Gianna and Maria share the history behind the Society and explain why they decided to host their CyberMarketingCon2022 conference in person.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[02:41] Creating the Cybersecurity Marketing Society</p>
<p>[06:29] Transitioning CyberMarketingCon2022 from virtual to in-person</p>
<p>[10:50] Combating the difficulty of growth marketing to cybersecurity practitioners</p>
<p>[18:34] Examining ROIs for attendees of conferences like Black Hat and RSA</p>
<p>[28:15] Finding the one thing they would instantly change about cyber marketing</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a>

</p>
<p>How did the Cybersecurity Marketing Society come to exist?</p>
<p>Gianna and Maria initially met and bonded over how the cybersecurity marketing world is constantly changing and evolving, for better or worse. They would get together to chat, as well as share strategies and insights. They quickly realized, through their friendship, that there was potential for a solid community in cybersecurity marketing. They started a Slack channel, just to put something out there. The channel grew from 10 participants into a bustling community of over 1500 people. Now, the Society is growing every day and hosting online events.</p>
<p>“It's always really nice to look back at the start, and it humbles you, right? As you continue this hustle of just growth and ongoing things happening, it's nice to take a step back and say, ‘Wow, look at where it all started.’ It seemed like just a crazy idea then.” –Maria Velasquez

What inspired the leap to host an in-person conference for CyberMarketingCon?</p>
<p>Back in 2020, while everyone was experiencing the height of the pandemic, members of the Cybersecurity Marketing Society were still interested in making connections with other professionals in the industry. Gianna and Maria decided the best option available was hosting virtual conferences in 2020 and 2021. Later, they branched into in-person chapter meetups in cities around the world. An in-person CyberMarketingCon2022 seemed like the next natural step in the process to cement those community connections.</p>
<p>“We started planning on a spreadsheet, basically. What's the theme? What do we want to cover in terms of topics? We looked to our members within the Society to hear what they'd like to learn at the conference and the speakers they'd like to see.” –Maria Velasquez</p>
<p> </p>
<p>What makes it so difficult to market to cybersecurity practitioners?</p>
<p>Cybersecurity practitioners are notoriously skeptical. Their purview is full of phishing links and threat actors, and their guards are always up. Practitioners also often have a revolving door of folks wanting them to try demos, which makes it harder for someone to stand out. Maria and Gianna explain that you have to create a different kind of connection to build a relationship with practitioners, and advise marketers to avoid the cringeworthy commercial buzzwords.</p>
<p>“We're here to make sure that together, as an industry, cybersecurity marketers default to the best practices in marketing to practitioners, and that we're not bothering our target audience. We're doing great marketing, so that we can help everyone be more safe.” –Gianna Whitver</p>
<p> </p>
<p>What did the ROIs look like for attendees of Black Hat and RSA?</p>
<p>In general, according to Gianna and Maria, the return on investment seemed higher for attendees at Black Hat, rather than at RSA. For marketers, RSA is less about selling and more about brand awareness and meeting with investors. In contrast, those who attended Black Hat reported that, even though the quantity of traffic at their booths was lower, the quality of the connections was higher, and there is a lot of optimism about opportunities to connect next year becoming more frequent.</p>
<p>“We're going to keep doing this every year. We're going to keep expanding the survey, we're going to have better data. I'm really looking forward to next year's debrief on Black Hat and RSA, seeing how things changed and how companies perceive their ROI.” –Gianna Whitver
</p>
<p>---------- </p>
<p>Links: </p>
<p>Grab your ticket to the <a href='http://cybersecuritymarketingsociety.com/conference2022/'>CyberMarketingCon2022</a></p>
<p>Follow Gianna on <a href='https://www.linkedin.com/in/giannawhitver/'>LinkedIn</a></p>
<p>Catch up with Maria on <a href='https://www.linkedin.com/in/maria-vepa/'>LinkedIn</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this special episode, Hacker Valley community members and hosts of the Breaking Through in Cybersecurity Marketing podcast, Gianna Whitver and Maria Velasquez, tell all about the ups and downs of cyber marketing. As podcast hosts and founders of the Cybersecurity Marketing Society, Gianna and Maria eat, sleep, and breathe cybersecurity marketing. This week, Gianna and Maria share the history behind the Society and explain why they decided to host their CyberMarketingCon2022 conference in person.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[02:41] Creating the Cybersecurity Marketing Society</p>
<p>[06:29] Transitioning CyberMarketingCon2022 from virtual to in-person</p>
<p>[10:50] Combating the difficulty of growth marketing to cybersecurity practitioners</p>
<p>[18:34] Examining ROIs for attendees of conferences like Black Hat and RSA</p>
<p>[28:15] Finding the one thing they would instantly change about cyber marketing</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a><br>
<br>
</p>
<p>How did the Cybersecurity Marketing Society come to exist?</p>
<p>Gianna and Maria initially met and bonded over how the cybersecurity marketing world is constantly changing and evolving, for better or worse. They would get together to chat, as well as share strategies and insights. They quickly realized, through their friendship, that there was potential for a solid community in cybersecurity marketing. They started a Slack channel, just to put something out there. The channel grew from 10 participants into a bustling community of over 1500 people. Now, the Society is growing every day and hosting online events.</p>
<p><em>“It's always really nice to look back at the start, and it humbles you, right? As you continue this hustle of just growth and ongoing things happening, it's nice to take a step back and say, ‘Wow, look at where it all started.’ It seemed like just a crazy idea then.” –Maria Velasquez</em><br>
<br>
What inspired the leap to host an in-person conference for CyberMarketingCon?</p>
<p>Back in 2020, while everyone was experiencing the height of the pandemic, members of the Cybersecurity Marketing Society were still interested in making connections with other professionals in the industry. Gianna and Maria decided the best option available was hosting virtual conferences in 2020 and 2021. Later, they branched into in-person chapter meetups in cities around the world. An in-person CyberMarketingCon2022 seemed like the next natural step in the process to cement those community connections.</p>
<p><em>“We started planning on a spreadsheet, basically. What's the theme? What do we want to cover in terms of topics? We looked to our members within the Society to hear what they'd like to learn at the conference and the speakers they'd like to see.” –Maria Velasquez</em></p>
<p> </p>
<p>What makes it so difficult to market to cybersecurity practitioners?</p>
<p>Cybersecurity practitioners are notoriously skeptical. Their purview is full of phishing links and threat actors, and their guards are always up. Practitioners also often have a revolving door of folks wanting them to try demos, which makes it harder for someone to stand out. Maria and Gianna explain that you have to create a different kind of connection to build a relationship with practitioners, and advise marketers to avoid the cringeworthy commercial buzzwords.</p>
<p><em>“We're here to make sure that together, as an industry, cybersecurity marketers default to the best practices in marketing to practitioners, and that we're not bothering our target audience. We're doing great marketing, so that we can help everyone be more safe.” –Gianna Whitver</em></p>
<p> </p>
<p>What did the ROIs look like for attendees of Black Hat and RSA?</p>
<p>In general, according to Gianna and Maria, the return on investment seemed higher for attendees at Black Hat, rather than at RSA. For marketers, RSA is less about selling and more about brand awareness and meeting with investors. In contrast, those who attended Black Hat reported that, even though the quantity of traffic at their booths was lower, the quality of the connections was higher, and there is a lot of optimism about opportunities to connect next year becoming more frequent.</p>
<p><em>“We're going to keep doing this every year. We're going to keep expanding the survey, we're going to have better data. I'm really looking forward to next year's debrief on Black Hat and RSA, seeing how things changed and how companies perceive their ROI.” –Gianna Whitver</em><br>
</p>
<p>---------- </p>
<p>Links: </p>
<p>Grab your ticket to the <a href='http://cybersecuritymarketingsociety.com/conference2022/'>CyberMarketingCon2022</a></p>
<p>Follow Gianna on <a href='https://www.linkedin.com/in/giannawhitver/'>LinkedIn</a></p>
<p>Catch up with Maria on <a href='https://www.linkedin.com/in/maria-vepa/'>LinkedIn</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jrbgmm/HVS_Audio_Gianna_Whitver_and_Maria_Velasquez_V28l43p.mp3" length="45292126" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this special episode, Hacker Valley community members and hosts of the Breaking Through in Cybersecurity Marketing podcast, Gianna Whitver and Maria Velasquez, tell all about the ups and downs of cyber marketing. As podcast hosts and founders of the Cybersecurity Marketing Society, Gianna and Maria eat, sleep, and breathe cybersecurity marketing. This week, Gianna and Maria share the history behind the Society and explain why they decided to host their CyberMarketingCon2022 conference in person.
 
Timecoded Guide:
[02:41] Creating the Cybersecurity Marketing Society
[06:29] Transitioning CyberMarketingCon2022 from virtual to in-person
[10:50] Combating the difficulty of growth marketing to cybersecurity practitioners
[18:34] Examining ROIs for attendees of conferences like Black Hat and RSA
[28:15] Finding the one thing they would instantly change about cyber marketing
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at uptycs.com
How did the Cybersecurity Marketing Society come to exist?
Gianna and Maria initially met and bonded over how the cybersecurity marketing world is constantly changing and evolving, for better or worse. They would get together to chat, as well as share strategies and insights. They quickly realized, through their friendship, that there was potential for a solid community in cybersecurity marketing. They started a Slack channel, just to put something out there. The channel grew from 10 participants into a bustling community of over 1500 people. Now, the Society is growing every day and hosting online events.
“It's always really nice to look back at the start, and it humbles you, right? As you continue this hustle of just growth and ongoing things happening, it's nice to take a step back and say, ‘Wow, look at where it all started.’ It seemed like just a crazy idea then.” –Maria VelasquezWhat inspired the leap to host an in-person conference for CyberMarketingCon?
Back in 2020, while everyone was experiencing the height of the pandemic, members of the Cybersecurity Marketing Society were still interested in making connections with other professionals in the industry. Gianna and Maria decided the best option available was hosting virtual conferences in 2020 and 2021. Later, they branched into in-person chapter meetups in cities around the world. An in-person CyberMarketingCon2022 seemed like the next natural step in the process to cement those community connections.
“We started planning on a spreadsheet, basically. What's the theme? What do we want to cover in terms of topics? We looked to our members within the Society to hear what they'd like to learn at the conference and the speakers they'd like to see.” –Maria Velasquez
 
What makes it so difficult to market to cybersecurity practitioners?
Cybersecurity practitioners are notoriously skeptical. Their purview is full of phishing links and threat actors, and their guards are always up. Practitioners also often have a revolving door of folks wanting them to try demos, which makes it harder for someone to stand out. Maria and Gianna explain that you have to create a different kind of connection to build a relationship with practitioners, and advise marketers to avoid the cringeworthy commercial buzzwords.
“We're here to make sure that together, as an industry, cybersecurity marketers default to the best practices in marketing to practitioners, and that we're not bothering our target audience. We're doing great marketing, so that we can help everyone be more safe.” –Gianna Whitver
 
What did the ROIs look like for attendees of]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1879</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>247</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Putting Your Cyber Marketing Audience First with Dani Woolf</title>
        <itunes:title>Putting Your Cyber Marketing Audience First with Dani Woolf</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/putting-your-cyber-marketing-audience-first-with-dani-wolfe/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/putting-your-cyber-marketing-audience-first-with-dani-wolfe/#comments</comments>        <pubDate>Tue, 04 Oct 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/caa3915a-5370-30bf-a321-6d64ee845945</guid>
                                    <description><![CDATA[<p>Dani Woolf, Director of Demand Generation at Cybersixgill and Host of the Audience First podcast, brings her marketing expertise to Hacker Valley to talk about what’s broken in the marketer-buyer relationship. Dani’s tried and true methods of cybersecurity marketing involve clear messaging, authentic communication, and building trust in an industry where not trusting anyone is the norm. How can cyber marketers break through the negative stereotypes and show cybersecurity buyers that they’re authentic?</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Fixing the broken relationship between cyber marketers, sellers, & buyers</p>
<p>[04:58] Unrealistic marketing goals vs incorrect marketer perspectives</p>
<p>[10:23] Better conversations between marketers & practitioners with Audience First</p>
<p>[15:12] Connecting with curious cyber practitioners instead of dismissing them</p>
<p>[23:37] Advice for cyber marketers looking to start fresh with content</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a></p>
<p> </p>
<p>What messages are practitioners receiving (or not receiving) from cybersecurity marketers? </p>
<p>One of the domains Dani actively uses is hilariously titled, “WTF Did I Just Read?” This project, inspired by the contextless and confusing messaging cyber practitioners receive everyday, aims to show marketers how to adopt better tactics and more authentic communication with potential buyers. Truth be told, Dani has seen the worst of cyber marketing, and she understands why many marketing teams get a bad rap in the industry.</p>
<p>“Frankly, [marketers] are just sending messages that have absolutely no context or need to the buyer, which is just lazy. You have to identify the problem, do a little bit of legwork to see what the buyer is interested in. Who are they really? What are they trying to solve?”</p>
<p> </p>
<p>Where do you think we all went wrong, from a cyber marketing perspective?</p>
<p>Two factors have contributed to incorrect and inauthentic marketing tactics in cybersecurity, according to Dani. The first is pressure to achieve stressful goals and unrealistic KPIs on marketing teams that should be focusing on quality of communication over quantity of calls or outreach methods. The second is marketers coming into the cyber industry with the false mindset that cyber marketing is just like any other marketing, when in reality, the methods of communication and the relationship with buyers is completely different. </p>
<p>“A lot of professionals coming into cybersecurity think that what they've done in other verticals works in cybersecurity, when in fact it doesn't. I know for a fact it doesn't, because that's how I made mistakes in the security space and that's how [my podcast] Audience First was born.”</p>
<p> </p>
<p>Is there a lot of conversation and communication happening between marketers and cybersecurity practitioners?</p>
<p>Marketers and practitioners are not communicating in a trustworthy and authentic way, in Dani’s opinion. Many marketers fall into the mindset trap of letting the “smart people” in the room talk during meetings and calls, instead of engaging in the conversation. Dani explains that when cyber marketers shut themselves out, they don’t learn anything about cybersecurity or about their clients. Not knowing creates a lack of trust and confidence for both sides. </p>
<p>“If we continue to just click on buttons and look at numbers, we're not going to do our jobs any better. I urge anybody listening to foster that bidirectional relationship, to be open to marketers speaking to you, and to be open to speaking to practitioners and asking for feedback.”</p>
<p> </p>
<p>How would you compare the average cybersecurity buyer to, for example, other buyers in the technology space? </p>
<p>Despite the stereotypes of cybersecurity buyers being tough or unapproachable, Dani admits that many of her cybersecurity clients are kinder and more empathetic than in other tech industries. However, this kindness and empathy has to be earned, and security professionals aren’t always the easiest people to gain the trust of. Dani explains that credibility and authenticity reign supreme in messaging to cyber buyers, because that is the only way to break through the caution many practitioners are trained to have.</p>
<p>“Why would I scratch your back? Or, why would you scratch mine if I don't even know who you are? Like, the whole point of security is not to trust everything that you see. So, trust and credibility is a huge part of that, and establishing authentic relationships is a huge part, too.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Dani Woolf on <a href='https://www.linkedin.com/in/daniarad/'>LinkedIn</a> and <a href='https://twitter.com/thedaniwoolf'>Twitter</a></p>
<p>Listen to Dani’s podcast, <a href='https://podcasts.apple.com/us/podcast/audience-1st/id1616050506'>Audience First</a>, and learn more about <a href='https://wtfdidijustread.com'>“WTF Did I Just Read?”</a></p>
<p>Check out <a href='https://www.cybersixgill.com'>the Cybersixgill website</a></p>
<p>Learn more about Dani’s work on her other Hacker Valley podcast appearances: <a href='https://hackervalley.com/breaking-through-in-cybersecurity-marketing/is-your-marketing-annoying-to-security-folks-how-to-fix-it-with-dani-woolf/'>Breaking Through in Cybersecurity Marketing</a>, <a href='https://www.youtube.com/watch?v=yiAPCZlpEIE'>Breaking Into Cyber </a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Dani Woolf, Director of Demand Generation at Cybersixgill and Host of the Audience First podcast, brings her marketing expertise to Hacker Valley to talk about what’s broken in the marketer-buyer relationship. Dani’s tried and true methods of cybersecurity marketing involve clear messaging, authentic communication, and building trust in an industry where not trusting anyone is the norm. How can cyber marketers break through the negative stereotypes and show cybersecurity buyers that they’re authentic?</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Fixing the broken relationship between cyber marketers, sellers, & buyers</p>
<p>[04:58] Unrealistic marketing goals vs incorrect marketer perspectives</p>
<p>[10:23] Better conversations between marketers & practitioners with Audience First</p>
<p>[15:12] Connecting with curious cyber practitioners instead of dismissing them</p>
<p>[23:37] Advice for cyber marketers looking to start fresh with content</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!<br>
</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a></p>
<p> </p>
<p>What messages are practitioners receiving (or not receiving) from cybersecurity marketers? </p>
<p>One of the domains Dani actively uses is hilariously titled, “WTF Did I Just Read?” This project, inspired by the contextless and confusing messaging cyber practitioners receive everyday, aims to show marketers how to adopt better tactics and more authentic communication with potential buyers. Truth be told, Dani has seen the worst of cyber marketing, and she understands why many marketing teams get a bad rap in the industry.</p>
<p><em>“Frankly, [marketers] are just sending messages that have absolutely no context or need to the buyer, which is just lazy. You have to identify the problem, do a little bit of legwork to see what the buyer is interested in. Who are they really? What are they trying to solve?”</em></p>
<p> </p>
<p>Where do you think we all went wrong, from a cyber marketing perspective?</p>
<p>Two factors have contributed to incorrect and inauthentic marketing tactics in cybersecurity, according to Dani. The first is pressure to achieve stressful goals and unrealistic KPIs on marketing teams that should be focusing on quality of communication over quantity of calls or outreach methods. The second is marketers coming into the cyber industry with the false mindset that cyber marketing is just like any other marketing, when in reality, the methods of communication and the relationship with buyers is completely different. </p>
<p><em>“A lot of professionals coming into cybersecurity think that what they've done in other verticals works in cybersecurity, when in fact it doesn't. I know for a fact it doesn't, because that's how I made mistakes in the security space and that's how [my podcast] Audience First was born.”</em></p>
<p> </p>
<p>Is there a lot of conversation and communication happening between marketers and cybersecurity practitioners?</p>
<p>Marketers and practitioners are not communicating in a trustworthy and authentic way, in Dani’s opinion. Many marketers fall into the mindset trap of letting the “smart people” in the room talk during meetings and calls, instead of engaging in the conversation. Dani explains that when cyber marketers shut themselves out, they don’t learn anything about cybersecurity or about their clients. Not knowing creates a lack of trust and confidence for both sides. </p>
<p><em>“If we continue to just click on buttons and look at numbers, we're not going to do our jobs any better. I urge anybody listening to foster that bidirectional relationship, to be open to marketers speaking to you, and to be open to speaking to practitioners and asking for feedback.”</em></p>
<p> </p>
<p>How would you compare the average cybersecurity buyer to, for example, other buyers in the technology space? </p>
<p>Despite the stereotypes of cybersecurity buyers being tough or unapproachable, Dani admits that many of her cybersecurity clients are kinder and more empathetic than in other tech industries. However, this kindness and empathy has to be earned, and security professionals aren’t always the easiest people to gain the trust of. Dani explains that credibility and authenticity reign supreme in messaging to cyber buyers, because that is the only way to break through the caution many practitioners are trained to have.</p>
<p><em>“Why would I scratch your back? Or, why would you scratch mine if I don't even know who you are? Like, the whole point of security is not to trust everything that you see. So, trust and credibility is a huge part of that, and establishing authentic relationships is a huge part, too.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Dani Woolf on <a href='https://www.linkedin.com/in/daniarad/'>LinkedIn</a> and <a href='https://twitter.com/thedaniwoolf'>Twitter</a></p>
<p>Listen to Dani’s podcast, <a href='https://podcasts.apple.com/us/podcast/audience-1st/id1616050506'>Audience First</a>, and learn more about <a href='https://wtfdidijustread.com'>“WTF Did I Just Read?”</a></p>
<p>Check out <a href='https://www.cybersixgill.com'>the Cybersixgill website</a></p>
<p>Learn more about Dani’s work on her other Hacker Valley podcast appearances: <a href='https://hackervalley.com/breaking-through-in-cybersecurity-marketing/is-your-marketing-annoying-to-security-folks-how-to-fix-it-with-dani-woolf/'>Breaking Through in Cybersecurity Marketing</a>, <a href='https://www.youtube.com/watch?v=yiAPCZlpEIE'>Breaking Into Cyber </a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nj3pbe/HVS_Audio_Dani_Wolfe_V18v54n.mp3" length="38185518" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Dani Woolf, Director of Demand Generation at Cybersixgill and Host of the Audience First podcast, brings her marketing expertise to Hacker Valley to talk about what’s broken in the marketer-buyer relationship. Dani’s tried and true methods of cybersecurity marketing involve clear messaging, authentic communication, and building trust in an industry where not trusting anyone is the norm. How can cyber marketers break through the negative stereotypes and show cybersecurity buyers that they’re authentic?
 
Timecoded Guide:
[00:00] Fixing the broken relationship between cyber marketers, sellers, & buyers
[04:58] Unrealistic marketing goals vs incorrect marketer perspectives
[10:23] Better conversations between marketers & practitioners with Audience First
[15:12] Connecting with curious cyber practitioners instead of dismissing them
[23:37] Advice for cyber marketers looking to start fresh with content
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at uptycs.com
 
What messages are practitioners receiving (or not receiving) from cybersecurity marketers? 
One of the domains Dani actively uses is hilariously titled, “WTF Did I Just Read?” This project, inspired by the contextless and confusing messaging cyber practitioners receive everyday, aims to show marketers how to adopt better tactics and more authentic communication with potential buyers. Truth be told, Dani has seen the worst of cyber marketing, and she understands why many marketing teams get a bad rap in the industry.
“Frankly, [marketers] are just sending messages that have absolutely no context or need to the buyer, which is just lazy. You have to identify the problem, do a little bit of legwork to see what the buyer is interested in. Who are they really? What are they trying to solve?”
 
Where do you think we all went wrong, from a cyber marketing perspective?
Two factors have contributed to incorrect and inauthentic marketing tactics in cybersecurity, according to Dani. The first is pressure to achieve stressful goals and unrealistic KPIs on marketing teams that should be focusing on quality of communication over quantity of calls or outreach methods. The second is marketers coming into the cyber industry with the false mindset that cyber marketing is just like any other marketing, when in reality, the methods of communication and the relationship with buyers is completely different. 
“A lot of professionals coming into cybersecurity think that what they've done in other verticals works in cybersecurity, when in fact it doesn't. I know for a fact it doesn't, because that's how I made mistakes in the security space and that's how [my podcast] Audience First was born.”
 
Is there a lot of conversation and communication happening between marketers and cybersecurity practitioners?
Marketers and practitioners are not communicating in a trustworthy and authentic way, in Dani’s opinion. Many marketers fall into the mindset trap of letting the “smart people” in the room talk during meetings and calls, instead of engaging in the conversation. Dani explains that when cyber marketers shut themselves out, they don’t learn anything about cybersecurity or about their clients. Not knowing creates a lack of trust and confidence for both sides. 
“If we continue to just click on buttons and look at numbers, we're not going to do our jobs any better. I urge anybody listening to foster that bidirectional relationship, to be open to marketers speaking to you, and to be open to speaking to practitioners and asking for feedback.”
 
How would you compare the averag]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1590</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>245</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Special Featured Episode! Purple Teams &amp; Threat Informed Defenses with Ben Opel</title>
        <itunes:title>Special Featured Episode! Purple Teams &amp; Threat Informed Defenses with Ben Opel</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/special-featured-episode-purple-teams-threat-informed-defenses-with-ben-opel/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/special-featured-episode-purple-teams-threat-informed-defenses-with-ben-opel/#comments</comments>        <pubDate>Thu, 29 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e2313646-9d4a-39f1-8d1f-8fe5d2719911</guid>
                                    <description><![CDATA[<p>Ben Opel, Senior Director of Professional Services at Attack IQ and former Marine, joins Chris and Ron to talk about the essentials of purple teaming. Combining the essentials of the red team and the blue team, a purple team offers cybersecurity companies a unique opportunity to create a threat informed security process. Using his time in the Marines and his experience at Attack IQ, Ben walks through purple team philosophy, breach and attack simulations, and shifting from a reactive to a proactive mindset.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Past experiences with cybersecurity in the Marine Corp</p>
<p>[04:28] Exposure to purple teaming in defensive cyber ops</p>
<p>[10:26] Implementing breach and attack simulations in defense strategy</p>
<p>[14:38] Threat informed defense and the aftermath of breach simulations</p>
<p>[23:36] Communicating and approaching risk-related decisions </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor AttackIQ for bringing this episode to life! </p>
<p>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>How did you first get exposed to purple teaming and what are some of the tenants that you hold today?</p>
<p>Ben’s experience in cybersecurity and his journey into purple teaming occurred during his time with the Marine Corps, performing defensive cyber ops. Originally, Ben didn’t even know the term purple team existed when he first encountered it, but his team was already approaching their work that way. Ben explains a core tenant of purple teaming is getting people in the same room and showing them the value their work brings to one another.</p>
<p>“We started building our teams around this multifunctional purple concept of having threat hunters, threat intelligence, red cell, support and mitigation, and forensic cell all in one. All of these capabilities in one team, where they could work synergistically.” </p>
<p> </p>
<p>What are the shortcomings and advantages of the purple team philosophy?</p>
<p>Like any philosophy, Ben explains that the hardest part of incorporating a purple team mindset is including it in everything your team does. To aid in this shortcoming, Ben keeps one question in mind: “What can someone do for me, and what can I do for them?” When involved in a purple team, everyone is putting their heads together. Ben explains there’s much less confusion between offensive and defensive professionals in that purple collaborative setting.</p>
<p>“Pure red team ops can be super fun, but you leave every job not sure they're going to actually make something with what you did. I've worked with blue teams who are like, ‘Hey, this was a great report, red, but we made some fixes, but we don't know if these are good.’”</p>
<p> </p>
<p>How do we get more people into being proactive and adopting the purple team perspective?</p>
<p>A large majority of cybersecurity teams and processes involve reacting to potential threats and incidents. In contrast, purple teaming and threat informed defense strategies emphasize a more proactive mindset. Ben explains that working with a capability like Attack IQ helps teams build confidence in what they can prepare for and prevent. Building confidence in infrastructure and resilience in your team helps a proactive mindset thrive. </p>
<p>“It’s about giving folks the ability to parse out and understand what's important to them, and to boil that down into, ‘Okay, now, what does that mean when hands on keyboard?’ Making that available, making that easily digestible. It's an education problem in this realm.”</p>
<p> </p>
<p>What would be your first piece of advice for the person about to embark on discovering or explaining breaches and attacks in relation to their organization?</p>
<p>Ben explains that explaining breaches and helping others in your organization understand attack risks starts with showing. He explains that revealing how easily these things can happen and in what situation certain events could be particularly harmful opens the eyes of members of your team to what their threats look like. Instead of catering to doom and gloom, analyze your cyber threat risk with practicality and literal examples. </p>
<p>“If I had to say that I had a specialty forced upon me by the Marine Corps, it was that. It was going over to peers and telling them that this is something that's good, bringing my red team in and letting them poke around, letting my blue team plug in to their network from some strange IP that they've never seen before.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Ben Opel on <a href='https://www.linkedin.com/in/benjamin-opel-9a373066/'>LinkedIn</a></p>
<p>Learn more about Attack IQ on <a href='https://www.linkedin.com/company/attackiq/'>LinkedIn</a> and <a href='https://www.attackiq.com/what-we-do/'>the Attack IQ website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ben Opel, Senior Director of Professional Services at Attack IQ and former Marine, joins Chris and Ron to talk about the essentials of purple teaming. Combining the essentials of the red team and the blue team, a purple team offers cybersecurity companies a unique opportunity to create a threat informed security process. Using his time in the Marines and his experience at Attack IQ, Ben walks through purple team philosophy, breach and attack simulations, and shifting from a reactive to a proactive mindset.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Past experiences with cybersecurity in the Marine Corp</p>
<p>[04:28] Exposure to purple teaming in defensive cyber ops</p>
<p>[10:26] Implementing breach and attack simulations in defense strategy</p>
<p>[14:38] Threat informed defense and the aftermath of breach simulations</p>
<p>[23:36] Communicating and approaching risk-related decisions </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsor AttackIQ for bringing this episode to life! </p>
<p><br>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>How did you first get exposed to purple teaming and what are some of the tenants that you hold today?</p>
<p>Ben’s experience in cybersecurity and his journey into purple teaming occurred during his time with the Marine Corps, performing defensive cyber ops. Originally, Ben didn’t even know the term purple team existed when he first encountered it, but his team was already approaching their work that way. Ben explains a core tenant of purple teaming is getting people in the same room and showing them the value their work brings to one another.</p>
<p><em>“We started building our teams around this multifunctional purple concept of having threat hunters, threat intelligence, red cell, support and mitigation, and forensic cell all in one. All of these capabilities in one team, where they could work synergistically.” </em></p>
<p> </p>
<p>What are the shortcomings and advantages of the purple team philosophy?</p>
<p>Like any philosophy, Ben explains that the hardest part of incorporating a purple team mindset is including it in everything your team does. To aid in this shortcoming, Ben keeps one question in mind: “What can someone do for me, and what can I do for them?” When involved in a purple team, everyone is putting their heads together. Ben explains there’s much less confusion between offensive and defensive professionals in that purple collaborative setting.</p>
<p><em>“Pure red team ops can be super fun, but you leave every job not sure they're going to actually make something with what you did. I've worked with blue teams who are like, ‘Hey, this was a great report, red, but we made some fixes, but we don't know if these are good.’”</em></p>
<p> </p>
<p>How do we get more people into being proactive and adopting the purple team perspective?</p>
<p>A large majority of cybersecurity teams and processes involve reacting to potential threats and incidents. In contrast, purple teaming and threat informed defense strategies emphasize a more proactive mindset. Ben explains that working with a capability like Attack IQ helps teams build confidence in what they can prepare for and prevent. Building confidence in infrastructure and resilience in your team helps a proactive mindset thrive. </p>
<p><em>“It’s about giving folks the ability to parse out and understand what's important to them, and to boil that down into, ‘Okay, now, what does that mean when hands on keyboard?’ Making that available, making that easily digestible. It's an education problem in this realm.”</em></p>
<p> </p>
<p>What would be your first piece of advice for the person about to embark on discovering or explaining breaches and attacks in relation to their organization?</p>
<p>Ben explains that explaining breaches and helping others in your organization understand attack risks starts with showing. He explains that revealing how easily these things can happen and in what situation certain events could be particularly harmful opens the eyes of members of your team to what their threats look like. Instead of catering to doom and gloom, analyze your cyber threat risk with practicality and literal examples. </p>
<p><em>“If I had to say that I had a specialty forced upon me by the Marine Corps, it was that. It was going over to peers and telling them that this is something that's good, bringing my red team in and letting them poke around, letting my blue team plug in to their network from some strange IP that they've never seen before.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Ben Opel on <a href='https://www.linkedin.com/in/benjamin-opel-9a373066/'>LinkedIn</a></p>
<p>Learn more about Attack IQ on <a href='https://www.linkedin.com/company/attackiq/'>LinkedIn</a> and <a href='https://www.attackiq.com/what-we-do/'>the Attack IQ website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/urngbp/HVS_Audio_Ben_Opel_V19q8hs.mp3" length="38650378" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ben Opel, Senior Director of Professional Services at Attack IQ and former Marine, joins Chris and Ron to talk about the essentials of purple teaming. Combining the essentials of the red team and the blue team, a purple team offers cybersecurity companies a unique opportunity to create a threat informed security process. Using his time in the Marines and his experience at Attack IQ, Ben walks through purple team philosophy, breach and attack simulations, and shifting from a reactive to a proactive mindset.
 
Timecoded Guide:
[00:00] Past experiences with cybersecurity in the Marine Corp
[04:28] Exposure to purple teaming in defensive cyber ops
[10:26] Implementing breach and attack simulations in defense strategy
[14:38] Threat informed defense and the aftermath of breach simulations
[23:36] Communicating and approaching risk-related decisions 
 
Sponsor Links:
Thank you to our sponsor AttackIQ for bringing this episode to life! 
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at academy.attackiq.com
 
How did you first get exposed to purple teaming and what are some of the tenants that you hold today?
Ben’s experience in cybersecurity and his journey into purple teaming occurred during his time with the Marine Corps, performing defensive cyber ops. Originally, Ben didn’t even know the term purple team existed when he first encountered it, but his team was already approaching their work that way. Ben explains a core tenant of purple teaming is getting people in the same room and showing them the value their work brings to one another.
“We started building our teams around this multifunctional purple concept of having threat hunters, threat intelligence, red cell, support and mitigation, and forensic cell all in one. All of these capabilities in one team, where they could work synergistically.” 
 
What are the shortcomings and advantages of the purple team philosophy?
Like any philosophy, Ben explains that the hardest part of incorporating a purple team mindset is including it in everything your team does. To aid in this shortcoming, Ben keeps one question in mind: “What can someone do for me, and what can I do for them?” When involved in a purple team, everyone is putting their heads together. Ben explains there’s much less confusion between offensive and defensive professionals in that purple collaborative setting.
“Pure red team ops can be super fun, but you leave every job not sure they're going to actually make something with what you did. I've worked with blue teams who are like, ‘Hey, this was a great report, red, but we made some fixes, but we don't know if these are good.’”
 
How do we get more people into being proactive and adopting the purple team perspective?
A large majority of cybersecurity teams and processes involve reacting to potential threats and incidents. In contrast, purple teaming and threat informed defense strategies emphasize a more proactive mindset. Ben explains that working with a capability like Attack IQ helps teams build confidence in what they can prepare for and prevent. Building confidence in infrastructure and resilience in your team helps a proactive mindset thrive. 
“It’s about giving folks the ability to parse out and understand what's important to them, and to boil that down into, ‘Okay, now, what does that mean when hands on keyboard?’ Making that available, making that easily digestible. It's an education problem in this realm.”
 
What would be your first piece of advice for the person about to embark on discovering or explaining breaches and attacks in relation to their organization?
Ben explains that explaining breaches and helping others in your organization understand attack risks starts with showing. He explains that revealing how easily these things can happen and in what situation certain events could be particularly harmful opens the eyes of members of yo]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1603</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>244</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Recruiting and How to Find the Perfect Match with Mimi Gross</title>
        <itunes:title>Recruiting and How to Find the Perfect Match with Mimi Gross</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/recruiting-and-how-to-find-the-perfect-match-with-mimi-gross/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/recruiting-and-how-to-find-the-perfect-match-with-mimi-gross/#comments</comments>        <pubDate>Tue, 27 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e1e46c67-6af0-3b4b-b445-0e1642aa47c5</guid>
                                    <description><![CDATA[<p>Mimi Gross, Founder and Cybersecurity Matchmaker at People By Mimi, connects early stage through Series C cybersecurity startups with sales and marketing talent. As a recruiter and headhunter with over 5 years of experience, Mimi refers to the process of recruiting and hiring as “cybersecurity matchmaking.” Mimi joins Hacker Valley Studio this week to talk about what recruiting and dating have in common (including marriage!), and the ways to deal with rejection during the hiring process. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Defining the term “cybersecurity matchmaking” as a recruiter</p>
<p>[04:00] Commonalities between recruiting and dating advice </p>
<p>[07:55] Dealing with job rejection like a bad breakup</p>
<p>[15:17] Balancing hiring manager wants and needs in the recruitment process</p>
<p> </p>
<p>[20:11] Emphasizing chemistry between the ideal candidate and their future employer</p>
<p> </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life! </p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a> </p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution:<a href='http://uptycs.com/'> uptycs.com</a>. </p>
<p> </p>
<p>Where did the term “cybersecurity matchmaking” come from?</p>
<p>There’s a huge element of matchmaking in recruiting. That’s essentially what you’re doing — you’re matching a potential candidate with a potential new position. Certain recruiters and companies instead treat the act of recruiting candidates and hiring new employees like a sales transaction. This feels impersonal for everyone involved. Referring to recruiting as “matchmaking” reminds everyone involved that there are humans in the process at every stage, from application to references, interviews to onboarding.
“Early on, I was disillusioned with recruiting, because I realized that people don't treat it like finding the perfect match. It's like sales for some people. I quickly said, ‘I can't do this thing unless I can call it matchmaking.’ That's where the term came in.”

What does dating advice have to do with recruiting?</p>
<p>In both recruiting and dating, you’re trying to find the “right” fit. In dating, both people in a relationship are looking for “the one”; someone to grow with long term and to build a mutually beneficial relationship with. In recruiting, the founder or hiring manager is looking for the right candidate for the role, while the job searcher is looking for the right job for their career. In both dating and recruiting, when you find the right one, it won’t be a huge compromise or a challenging fit; the relationship will feel authentic and natural.
“I find that the best matches I make — and I love to call them matches, because they really are — I look back at them, like, ‘You know, that was a good match.’ In those great matches, the chemistry was there right away.”</p>
<p> </p>
<p>How do you help candidates deal with rejection?</p>
<p>Rejection is part of the recruiting process, just like how breaking up is part of the dating cycle. There are going to be times when the fit isn’t right and the job you want goes to a different candidate. The trick is to not take it personally. Instead, take a learning approach to the situation. The company might need to go in a different direction, or someone else in the organization may be taking over the position. Unlike dating, the hiring process is unrelated to who you are as a person. Focus on learning and applying your experience elsewhere.
</p>
<p>“It’s not just about not taking rejection personally. You have to see that there will be the right fit for you, and that also, the person who is rejecting you now could be a valuable person to know in the future. Never burn bridges.”</p>
<p> </p>
<p>What is one of the most important aspects in recruiting?</p>
<p>Chemistry is key in the recruiting process. You may have a company executive or a hiring manager who wants a specific trait from their applicants, like an Ivy League education. As a recruiter, you have to dig beneath the surface to discover the “why” behind a job qualification or educational requirement. Perhaps the employer actually wants someone organized or detail-oriented. Getting to know the “why” means that you can find the actual right fit, while the chemistry between the job seeker and the hiring executive will take care of the rest.

“In the beginning, if you find the right match, the dating metaphor here is that nobody's perfect. You have to figure out what kind of imperfect you can handle and you can love, and that's the right match.”</p>
<p>---------- </p>
<p>Links: </p>
<p>Spend some time with our guest Mimi Gross on <a href='https://www.linkedin.com/in/peoplebymimi/'>LinkedIn</a></p>
<p>Learn more about cybersecurity matchmaking on the <a href='https://www.peoplebymimi.com'>People By Mimi website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Mimi Gross, Founder and Cybersecurity Matchmaker at People By Mimi, connects early stage through Series C cybersecurity startups with sales and marketing talent. As a recruiter and headhunter with over 5 years of experience, Mimi refers to the process of recruiting and hiring as “cybersecurity matchmaking.” Mimi joins Hacker Valley Studio this week to talk about what recruiting and dating have in common (including marriage!), and the ways to deal with rejection during the hiring process. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Defining the term “cybersecurity matchmaking” as a recruiter</p>
<p>[04:00] Commonalities between recruiting and dating advice </p>
<p>[07:55] Dealing with job rejection like a bad breakup</p>
<p>[15:17] Balancing hiring manager wants and needs in the recruitment process</p>
<p> </p>
<p>[20:11] Emphasizing chemistry between the ideal candidate and their future employer</p>
<p> </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life! </p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a> </p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution:<a href='http://uptycs.com/'> uptycs.com</a>. </p>
<p> </p>
<p>Where did the term “cybersecurity matchmaking” come from?</p>
<p>There’s a huge element of matchmaking in recruiting. That’s essentially what you’re doing — you’re matching a potential candidate with a potential new position. Certain recruiters and companies instead treat the act of recruiting candidates and hiring new employees like a sales transaction. This feels impersonal for everyone involved. Referring to recruiting as “matchmaking” reminds everyone involved that there are humans in the process at every stage, from application to references, interviews to onboarding.<br>
<em>“Early on, I was disillusioned with recruiting, because I realized that people don't treat it like finding the perfect match. It's like sales for some people. I quickly said, ‘I can't do this thing unless I can call it matchmaking.’ That's where the term came in.”</em><br>
<br>
What does dating advice have to do with recruiting?</p>
<p>In both recruiting and dating, you’re trying to find the “right” fit. In dating, both people in a relationship are looking for “the one”; someone to grow with long term and to build a mutually beneficial relationship with. In recruiting, the founder or hiring manager is looking for the right candidate for the role, while the job searcher is looking for the right job for their career. In both dating and recruiting, when you find the right one, it won’t be a huge compromise or a challenging fit; the relationship will feel authentic and natural.<br>
<em>“I find that the best matches I make — and I love to call them matches, because they really are — I look back at them, like, ‘You know, that was a good match.’ In those great matches, the chemistry was there right away.”</em></p>
<p> </p>
<p>How do you help candidates deal with rejection?</p>
<p>Rejection is part of the recruiting process, just like how breaking up is part of the dating cycle. There are going to be times when the fit isn’t right and the job you want goes to a different candidate. The trick is to not take it personally. Instead, take a learning approach to the situation. The company might need to go in a different direction, or someone else in the organization may be taking over the position. Unlike dating, the hiring process is unrelated to who you are as a person. Focus on learning and applying your experience elsewhere.<br>
</p>
<p><em>“It’s not just about not taking rejection personally. You have to see that there will be the right fit for you, and that also, the person who is rejecting you now could be a valuable person to know in the future. Never burn bridges.”</em></p>
<p> </p>
<p>What is one of the most important aspects in recruiting?</p>
<p>Chemistry is key in the recruiting process. You may have a company executive or a hiring manager who wants a specific trait from their applicants, like an Ivy League education. As a recruiter, you have to dig beneath the surface to discover the “why” behind a job qualification or educational requirement. Perhaps the employer actually wants someone organized or detail-oriented. Getting to know the “why” means that you can find the actual right fit, while the chemistry between the job seeker and the hiring executive will take care of the rest.<br>
<br>
<em>“In the beginning, if you find the right match, the dating metaphor here is that nobody's perfect. You have to figure out what kind of imperfect you can handle and you can love, and that's the right match.”</em></p>
<p>---------- </p>
<p>Links: </p>
<p>Spend some time with our guest Mimi Gross on <a href='https://www.linkedin.com/in/peoplebymimi/'>LinkedIn</a></p>
<p>Learn more about cybersecurity matchmaking on the <a href='https://www.peoplebymimi.com'>People By Mimi website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bg2ny8/HVS_Audio_Mimi_Gross_V2aq5br.mp3" length="39641051" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Mimi Gross, Founder and Cybersecurity Matchmaker at People By Mimi, connects early stage through Series C cybersecurity startups with sales and marketing talent. As a recruiter and headhunter with over 5 years of experience, Mimi refers to the process of recruiting and hiring as “cybersecurity matchmaking.” Mimi joins Hacker Valley Studio this week to talk about what recruiting and dating have in common (including marriage!), and the ways to deal with rejection during the hiring process. 
 
Timecoded Guide:
[00:00] Defining the term “cybersecurity matchmaking” as a recruiter
[04:00] Commonalities between recruiting and dating advice 
[07:55] Dealing with job rejection like a bad breakup
[15:17] Balancing hiring manager wants and needs in the recruitment process
 
[20:11] Emphasizing chemistry between the ideal candidate and their future employer
 
Sponsor Links: 
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life! 
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley 
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: uptycs.com. 
 
Where did the term “cybersecurity matchmaking” come from?
There’s a huge element of matchmaking in recruiting. That’s essentially what you’re doing — you’re matching a potential candidate with a potential new position. Certain recruiters and companies instead treat the act of recruiting candidates and hiring new employees like a sales transaction. This feels impersonal for everyone involved. Referring to recruiting as “matchmaking” reminds everyone involved that there are humans in the process at every stage, from application to references, interviews to onboarding.“Early on, I was disillusioned with recruiting, because I realized that people don't treat it like finding the perfect match. It's like sales for some people. I quickly said, ‘I can't do this thing unless I can call it matchmaking.’ That's where the term came in.”What does dating advice have to do with recruiting?
In both recruiting and dating, you’re trying to find the “right” fit. In dating, both people in a relationship are looking for “the one”; someone to grow with long term and to build a mutually beneficial relationship with. In recruiting, the founder or hiring manager is looking for the right candidate for the role, while the job searcher is looking for the right job for their career. In both dating and recruiting, when you find the right one, it won’t be a huge compromise or a challenging fit; the relationship will feel authentic and natural.“I find that the best matches I make — and I love to call them matches, because they really are — I look back at them, like, ‘You know, that was a good match.’ In those great matches, the chemistry was there right away.”
 
How do you help candidates deal with rejection?
Rejection is part of the recruiting process, just like how breaking up is part of the dating cycle. There are going to be times when the fit isn’t right and the job you want goes to a different candidate. The trick is to not take it personally. Instead, take a learning approach to the situation. The company might need to go in a different direction, or someone else in the organization may be taking over the position. Unlike dating, the hiring process is unrelated to who you are as a person. Focus on learning and applying your experience elsewhere.
“It’s not just about not taking rejection personally. You have to see that there will be the right fit for you, and that also, the person who is rejecting you now could be a valuable person to know in the future. Never burn bridges.”
 
What is one of the most important aspects in recruiting?
Chemistry is key in the recruiting process. You may have a company ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1646</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>242</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Recruiting Talent for Cybersecurity’s Next Open Position with Renee Small</title>
        <itunes:title>Recruiting Talent for Cybersecurity’s Next Open Position with Renee Small</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/recruiting-talent-for-cybersecurity-s-next-open-position-with-renee-small/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/recruiting-talent-for-cybersecurity-s-next-open-position-with-renee-small/#comments</comments>        <pubDate>Tue, 20 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7edb7320-6171-3f20-abec-c96f1236fc65</guid>
                                    <description><![CDATA[<p>Renee Small, Cybersecurity Super Recruiter, content creator, and host of the Breaking into Cybersecurity podcast, joins the Hacker Valley team to clear the misconceptions around recruiting and discuss cybersecurity’s open positions. Taking labor shortages and skills gaps into consideration, Renee explains how she’s helped others start strong in the industry and hone their skills. Additionally, Renee covers her journey into content creation and podcasting, and how that’s impacted her recruiting work. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Understanding a recruiter’s role in big and small cybersecurity orgs</p>
<p>[06:37] Diving into content creation with the Breaking into Cybersecurity podcast</p>
<p>[12:13] Challenges and rewards of helping entry level cybersecurity professionals</p>
<p>[16:02] Rewarding cyber recruitment stories and tech mentorship opportunities</p>
<p>[22:39] Advising job seekers looking for entry level positions in cybersecurity</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution:<a href='http://uptycs.com/'> uptycs.com</a>.</p>
<p> </p>
<p>What is the role of a recruiter in cybersecurity? </p>
<p>Renee knows the idea of a recruiter can be a confusing one, and the role of a recruiter can be radically different depending on the size of an organization or the type of recruitment they focus on. Overall, however, Renee believes that the role of a recruiter is to be a matchmaker for a position within a company. Cybersecurity recruiters have to understand the technical needs of a position and the cultural needs of a cybersecurity company to find the perfect practitioner fit.</p>
<p>“The role really is to be like a matchmaker. You’re seeing who out there is a great fit for which roles, which companies, and which culture, or which company culture, and that's what makes it, for me, a lot of fun.”</p>
<p> </p>
<p>How has being a content creator impacted your work as a recruiter? </p>
<p>Although Renee doesn’t always identify as a content creator, her work with Chris Foulon on the Breaking into Cybersecurity podcast speaks volumes about the type of creator she really is. Renee always focuses on giving back with the work she produces, whether that work involves career coaching, recruitment advice, or cybersecurity education. Becoming a podcaster and content creator has allowed Renee to answer questions and provide information that helps the entire online cyber community. </p>
<p>“I experienced all the positions that were open as a recruiter, but I had no idea that there was this group of folks who were entry level, or transitioning into their first cybersecurity position, and they needed my help [in order to break into cyber].”</p>
<p> </p>
<p>What are some of the most fulfilling moments that a recruiter can have? </p>
<p>Being a recruiter gives Renee the opportunity to help cybersecurity practitioners discover their dream job and navigate the industry intelligently. Her fulfilling moments actually center around those she’s helped along the way, including a former mentee and a former helpdesk employee looking for upward mobility. Finding the perfect match isn’t just about satisfying the company needs, Renee explains, but is also about connecting someone to an opportunity for success and growth.</p>
<p>“I get a kick out of people getting a job, it's almost like a little high for me. Every time I'm the person who connects people and it works out and they get paid well, I have a little party in my head. It's just so rewarding. I love that matchmaking process so much.”</p>
<p> </p>
<p>What advice do you have for professionals struggling with their job search in the cybersecurity industry? </p>
<p>Cybersecurity’s labor shortage and staff burnout issues threaten even the most air-tight of security teams. Unfortunately, Renee explains that even with so many job openings, entry-level employees or professionals transitioning industries still can’t break into cyber. Her best advice for those struggling to take the first step is to connect with successful practitioners in the field already through nonprofit organizations and network events. Focus on a network that will expand your knowledge of cyber and the state of the industry.</p>
<p>“If you're a college student, if you are someone out there looking to understand what's happening in the field, join one of the myriad of cybersecurity nonprofit organizations and learn about what security really is.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Renee Small on <a href='https://www.linkedin.com/in/reneebrownsmall/'>LinkedIn</a> </p>
<p>Listen to Renee’s <a href='https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698'>podcast Breaking into Cybersecurity</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Renee Small, Cybersecurity Super Recruiter, content creator, and host of the Breaking into Cybersecurity podcast, joins the Hacker Valley team to clear the misconceptions around recruiting and discuss cybersecurity’s open positions. Taking labor shortages and skills gaps into consideration, Renee explains how she’s helped others start strong in the industry and hone their skills. Additionally, Renee covers her journey into content creation and podcasting, and how that’s impacted her recruiting work. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Understanding a recruiter’s role in big and small cybersecurity orgs</p>
<p>[06:37] Diving into content creation with the Breaking into Cybersecurity podcast</p>
<p>[12:13] Challenges and rewards of helping entry level cybersecurity professionals</p>
<p>[16:02] Rewarding cyber recruitment stories and tech mentorship opportunities</p>
<p>[22:39] Advising job seekers looking for entry level positions in cybersecurity</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at<a href='http://axonius.com/hackervalley'> axonius.com/hackervalley</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution:<a href='http://uptycs.com/'> uptycs.com</a>.</p>
<p> </p>
<p>What is the role of a recruiter in cybersecurity? </p>
<p>Renee knows the idea of a recruiter can be a confusing one, and the role of a recruiter can be radically different depending on the size of an organization or the type of recruitment they focus on. Overall, however, Renee believes that the role of a recruiter is to be a matchmaker for a position within a company. Cybersecurity recruiters have to understand the technical needs of a position and the cultural needs of a cybersecurity company to find the perfect practitioner fit.</p>
<p><em>“The role really is to be like a matchmaker. You’re seeing who out there is a great fit for which roles, which companies, and which culture, or which company culture, and that's what makes it, for me, a lot of fun.”</em></p>
<p> </p>
<p>How has being a content creator impacted your work as a recruiter? </p>
<p>Although Renee doesn’t always identify as a content creator, her work with Chris Foulon on the Breaking into Cybersecurity podcast speaks volumes about the type of creator she really is. Renee always focuses on giving back with the work she produces, whether that work involves career coaching, recruitment advice, or cybersecurity education. Becoming a podcaster and content creator has allowed Renee to answer questions and provide information that helps the entire online cyber community. </p>
<p><em>“I experienced all the positions that were open as a recruiter, but I had no idea that there was this group of folks who were entry level, or transitioning into their first cybersecurity position, and they needed my help [in order to break into cyber].”</em></p>
<p> </p>
<p>What are some of the most fulfilling moments that a recruiter can have? </p>
<p>Being a recruiter gives Renee the opportunity to help cybersecurity practitioners discover their dream job and navigate the industry intelligently. Her fulfilling moments actually center around those she’s helped along the way, including a former mentee and a former helpdesk employee looking for upward mobility. Finding the perfect match isn’t just about satisfying the company needs, Renee explains, but is also about connecting someone to an opportunity for success and growth.</p>
<p><em>“I get a kick out of people getting a job, it's almost like a little high for me. Every time I'm the person who connects people and it works out and they get paid well, I have a little party in my head. It's just so rewarding. I love that matchmaking process so much.”</em></p>
<p> </p>
<p>What advice do you have for professionals struggling with their job search in the cybersecurity industry? </p>
<p>Cybersecurity’s labor shortage and staff burnout issues threaten even the most air-tight of security teams. Unfortunately, Renee explains that even with so many job openings, entry-level employees or professionals transitioning industries still can’t break into cyber. Her best advice for those struggling to take the first step is to connect with successful practitioners in the field already through nonprofit organizations and network events. Focus on a network that will expand your knowledge of cyber and the state of the industry.</p>
<p><em>“If you're a college student, if you are someone out there looking to understand what's happening in the field, join one of the myriad of cybersecurity nonprofit organizations and learn about what security really is.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Renee Small on <a href='https://www.linkedin.com/in/reneebrownsmall/'>LinkedIn</a> </p>
<p>Listen to Renee’s <a href='https://podcasts.apple.com/us/podcast/breaking-into-cybersecurity/id1463136698'>podcast Breaking into Cybersecurity</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/q66g8h/HVS_Audio_Renee_Small_V2aoeks.mp3" length="39284004" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Renee Small, Cybersecurity Super Recruiter, content creator, and host of the Breaking into Cybersecurity podcast, joins the Hacker Valley team to clear the misconceptions around recruiting and discuss cybersecurity’s open positions. Taking labor shortages and skills gaps into consideration, Renee explains how she’s helped others start strong in the industry and hone their skills. Additionally, Renee covers her journey into content creation and podcasting, and how that’s impacted her recruiting work. 
 
Timecoded Guide:
[00:00] Understanding a recruiter’s role in big and small cybersecurity orgs
[06:37] Diving into content creation with the Breaking into Cybersecurity podcast
[12:13] Challenges and rewards of helping entry level cybersecurity professionals
[16:02] Rewarding cyber recruitment stories and tech mentorship opportunities
[22:39] Advising job seekers looking for entry level positions in cybersecurity
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: uptycs.com.
 
What is the role of a recruiter in cybersecurity? 
Renee knows the idea of a recruiter can be a confusing one, and the role of a recruiter can be radically different depending on the size of an organization or the type of recruitment they focus on. Overall, however, Renee believes that the role of a recruiter is to be a matchmaker for a position within a company. Cybersecurity recruiters have to understand the technical needs of a position and the cultural needs of a cybersecurity company to find the perfect practitioner fit.
“The role really is to be like a matchmaker. You’re seeing who out there is a great fit for which roles, which companies, and which culture, or which company culture, and that's what makes it, for me, a lot of fun.”
 
How has being a content creator impacted your work as a recruiter? 
Although Renee doesn’t always identify as a content creator, her work with Chris Foulon on the Breaking into Cybersecurity podcast speaks volumes about the type of creator she really is. Renee always focuses on giving back with the work she produces, whether that work involves career coaching, recruitment advice, or cybersecurity education. Becoming a podcaster and content creator has allowed Renee to answer questions and provide information that helps the entire online cyber community. 
“I experienced all the positions that were open as a recruiter, but I had no idea that there was this group of folks who were entry level, or transitioning into their first cybersecurity position, and they needed my help [in order to break into cyber].”
 
What are some of the most fulfilling moments that a recruiter can have? 
Being a recruiter gives Renee the opportunity to help cybersecurity practitioners discover their dream job and navigate the industry intelligently. Her fulfilling moments actually center around those she’s helped along the way, including a former mentee and a former helpdesk employee looking for upward mobility. Finding the perfect match isn’t just about satisfying the company needs, Renee explains, but is also about connecting someone to an opportunity for success and growth.
“I get a kick out of people getting a job, it's almost like a little high for me. Every time I'm the person who connects people and it works out and they get paid well, I have a little party in my head. It's just so rewarding. I love that matchmaking process so much.”
 
What advice do you have for professionals struggling with their job search in the cybersecurity industry? 
Cybersecurity’s labor shortage and staff burnout issues thr]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1632</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>238</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Keeping It Open Source with Metasploit’s HD Moore</title>
        <itunes:title>Keeping It Open Source with Metasploit’s HD Moore</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/keeping-it-open-source-with-metasploit-s-hd-moore/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/keeping-it-open-source-with-metasploit-s-hd-moore/#comments</comments>        <pubDate>Thu, 15 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/90e5fff9-084b-3264-ad08-bdfdd2a749bb</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">This season of Hacker Valley Red wraps up with another interview of an incredible offensive cybersecurity legend. Known first and foremost for his work founding Metasploit and his recent work co-founding Rumble, HD Moore joins the show this week to hear about his journey from spiteful hacker to successful founder. HD walks through the history of Metasploit, the motivation behind their coding decisions, his opinions on open source software, and the excitement of exploration and discovery.

</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[04:57] Catching up with HD’s career from his hacking exploits in the ‘90s through his founding of Metasploit to his recent activities with Rumble</p>
<p class="x-scope qowt-word-para-0">[11:41] Getting personal with the feelings and takeaways from a project as successful and impactful on the cyber industry as Metasploit</p>
<p class="x-scope qowt-word-para-0">[18:52] Explaining HD’s personal philosophies around accessible education and the risk of sharing vulnerable information publicly </p>
<p class="x-scope qowt-word-para-0">[25:39] Diving deep into the technical stories of HD’s path of discovery and exploration during his time at Metasploit</p>
<p class="x-scope qowt-word-para-0">[31:14] Giving advice for future founders and hackers looking to make a legendary impact on the cybersecurity community

</p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">What were some of the trials, tribulations, and successes of Metasploit? </p>





<p class="x-scope qowt-word-para-0">Although Metasploit has had a lasting impact on the cyber world, HD Moore is not afraid to admit that part of Metasploit existed out of spite for critics, employers, and gatekeepers in the cybersecurity industry. In terms of trials and tribulations, HD saw a great deal of criticism come from his peers and from professionals ahead of him in the industry, often displaying rudeness towards the quality of the exploits and Metasploit’s audience of young hackers. Later, HD says that a surprising and amusing side effect of his success with the project was watching employers and peers go from criticizing to lifting up his work with Metasploit and attributing success of many hacking professionals to its creation.</p>
<p class="x-scope qowt-word-para-2">“When we started the Metasploit project, we really wanted to open up to everybody. We wanted to make sure that, even if you barely knew how to program, you can still contribute something to Metasploit. So, we did our best to make it really easy for folks to get in touch with us, to submit code.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">Where does your philosophy land today on giving information freely?</p>
<p class="x-scope qowt-word-para-0">HD has heard the same opinions many professionals that teach and give information freely have heard: “You’re making it easier for people to use this information the wrong way.” Instead of considering the worst possible outcomes of making hacking accessible, HD chooses to acknowledge the importance of accessible education and publicly provided information. According to HD, if someone is creating and teaching content to the next generation of red teamers, that content is theirs to use. Whether they’re a physical pen tester teaching lock picking or a hacker disclosing a vulnerability, what they choose to share with others has to be based on personal moral code and what others do with that information is up to them. </p>
<p class="x-scope qowt-word-para-2">“It comes down to: You do the work, you own the result. If you're teaching people how to do stuff, great, they can do what they want. You can decide to do that, you can decide not to do that, but it's your decision to spend your time training people or not training them.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">Is it possible to be a CEO, or a co-founder, and stay technical?</p>
<p class="x-scope qowt-word-para-0">The downside of success in the cybersecurity industry is often stereotyped as losing the opportunity to be a hands-on hacker. However, for HD, his success has allowed him to do the exact opposite and instead prioritize his time to be technical. HD believes strongly in the ability to make this happen through proper delegation of duties, incorporating new leaders and managers in your company or project, and acknowledging when you may need the help to bring what you’re working on to the next level. HD is proud of his success with Metasploit and Rumble, and is happy that he was able to hand off certain duties to other professionals that he knew would do better if they had a chance in the founder’s shoes. </p>
<p class="x-scope qowt-word-para-2">“Don't let the growth of your company change what you enjoy about your work. That's really the big thing there, and there's lots of ways you can get there. You can hire folks to help out, you can promote your co-founder to CEO. You can bring on program managers or project managers to help with all the day to day stuff."</p>
<p class="x-scope qowt-word-para-2"> </p>




<p class="x-scope qowt-word-para-1">What advice do you have for people looking to follow a similar cyber career path?</p>
<p class="x-scope qowt-word-para-0">Content is the name of the game, especially when you’re looking to get more eyes on what you do. HD is the first to admit that putting himself out there in a blog post, on a podcast, or at a stage show is not always a walk in the park, taking him out of his comfort zone and often away from the tech that he spends his time on. However, publicly displaying himself and his work has brought attention to Rumble and Metasploit, and HD knows he would not have achieved this level of success without putting his content out into the world, hearing feedback from his peers, and even receiving his fair share of criticism from industry professionals.</p>
<p class="x-scope qowt-word-para-2">“Not all of it is the most fun thing to do all the time, but it is crucially important, not just for growing yourself and getting out there and getting feedback from your peers, but for learning because you learn so much from the feedback you get from that effort.” </p>
<p class="x-scope qowt-word-para-0">-----------</p>
<p class="x-scope qowt-word-para-0">Links:</p>
<p class="x-scope qowt-word-para-0">Stay in touch with HD Moore on <a href='https://www.linkedin.com/in/hdmoore/'>LinkedIn</a>, <a href='https://twitter.com/hdmoore'>Twitter</a>, and <a href='https://hdm.io'>his website</a>.</p>
<p class="x-scope qowt-word-para-0">Learn more about Rumble, Inc on <a href='https://www.linkedin.com/company/rumble-discovery/'>LinkedIn</a> and <a href='https://www.rumble.run'>the Rumble website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p class="x-scope qowt-word-para-0"></p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">This season of Hacker Valley Red wraps up with another interview of an incredible offensive cybersecurity legend. Known first and foremost for his work founding Metasploit and his recent work co-founding Rumble, HD Moore joins the show this week to hear about his journey from spiteful hacker to successful founder. HD walks through the history of Metasploit, the motivation behind their coding decisions, his opinions on open source software, and the excitement of exploration and discovery.<br>
<br>
</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[04:57] Catching up with HD’s career from his hacking exploits in the ‘90s through his founding of Metasploit to his recent activities with Rumble</p>
<p class="x-scope qowt-word-para-0">[11:41] Getting personal with the feelings and takeaways from a project as successful and impactful on the cyber industry as Metasploit</p>
<p class="x-scope qowt-word-para-0">[18:52] Explaining HD’s personal philosophies around accessible education and the risk of sharing vulnerable information publicly </p>
<p class="x-scope qowt-word-para-0">[25:39] Diving deep into the technical stories of HD’s path of discovery and exploration during his time at Metasploit</p>
<p class="x-scope qowt-word-para-0">[31:14] Giving advice for future founders and hackers looking to make a legendary impact on the cybersecurity community<br>
<br>
</p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive <em>Red Team Content Bundle </em>for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">What were some of the trials, tribulations, and successes of Metasploit? </p>





<p class="x-scope qowt-word-para-0">Although Metasploit has had a lasting impact on the cyber world, HD Moore is not afraid to admit that part of Metasploit existed out of spite for critics, employers, and gatekeepers in the cybersecurity industry. In terms of trials and tribulations, HD saw a great deal of criticism come from his peers and from professionals ahead of him in the industry, often displaying rudeness towards the quality of the exploits and Metasploit’s audience of young hackers. Later, HD says that a surprising and amusing side effect of his success with the project was watching employers and peers go from criticizing to lifting up his work with Metasploit and attributing success of many hacking professionals to its creation.</p>
<p class="x-scope qowt-word-para-2">“When we started the Metasploit project, we really wanted to open up to everybody. We wanted to make sure that, even if you barely knew how to program, you can still contribute something to Metasploit. So, we did our best to make it really easy for folks to get in touch with us, to submit code.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">Where does your philosophy land today on giving information freely?</p>
<p class="x-scope qowt-word-para-0">HD has heard the same opinions many professionals that teach and give information freely have heard: “You’re making it easier for people to use this information the wrong way.” Instead of considering the worst possible outcomes of making hacking accessible, HD chooses to acknowledge the importance of accessible education and publicly provided information. According to HD, if someone is creating and teaching content to the next generation of red teamers, that content is theirs to use. Whether they’re a physical pen tester teaching lock picking or a hacker disclosing a vulnerability, what they choose to share with others has to be based on personal moral code and what others do with that information is up to them. </p>
<p class="x-scope qowt-word-para-2">“It comes down to: You do the work, you own the result. If you're teaching people how to do stuff, great, they can do what they want. You can decide to do that, you can decide not to do that, but it's your decision to spend your time training people or not training them.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">Is it possible to be a CEO, or a co-founder, and stay technical?</p>
<p class="x-scope qowt-word-para-0">The downside of success in the cybersecurity industry is often stereotyped as losing the opportunity to be a hands-on hacker. However, for HD, his success has allowed him to do the exact opposite and instead prioritize his time to be technical. HD believes strongly in the ability to make this happen through proper delegation of duties, incorporating new leaders and managers in your company or project, and acknowledging when you may need the help to bring what you’re working on to the next level. HD is proud of his success with Metasploit and Rumble, and is happy that he was able to hand off certain duties to other professionals that he knew would do better if they had a chance in the founder’s shoes. </p>
<p class="x-scope qowt-word-para-2">“Don't let the growth of your company change what you enjoy about your work. That's really the big thing there, and there's lots of ways you can get there. You can hire folks to help out, you can promote your co-founder to CEO. You can bring on program managers or project managers to help with all the day to day stuff."</p>
<p class="x-scope qowt-word-para-2"> </p>




<p class="x-scope qowt-word-para-1">What advice do you have for people looking to follow a similar cyber career path?</p>
<p class="x-scope qowt-word-para-0">Content is the name of the game, especially when you’re looking to get more eyes on what you do. HD is the first to admit that putting himself out there in a blog post, on a podcast, or at a stage show is not always a walk in the park, taking him out of his comfort zone and often away from the tech that he spends his time on. However, publicly displaying himself and his work has brought attention to Rumble and Metasploit, and HD knows he would not have achieved this level of success without putting his content out into the world, hearing feedback from his peers, and even receiving his fair share of criticism from industry professionals.</p>
<p class="x-scope qowt-word-para-2">“Not all of it is the most fun thing to do all the time, but it is crucially important, not just for growing yourself and getting out there and getting feedback from your peers, but for learning because you learn so much from the feedback you get from that effort.” </p>
<p class="x-scope qowt-word-para-0">-----------</p>
<p class="x-scope qowt-word-para-0">Links:</p>
<p class="x-scope qowt-word-para-0">Stay in touch with HD Moore on <a href='https://www.linkedin.com/in/hdmoore/'>LinkedIn</a>, <a href='https://twitter.com/hdmoore'>Twitter</a>, and <a href='https://hdm.io'>his website</a>.</p>
<p class="x-scope qowt-word-para-0">Learn more about Rumble, Inc on <a href='https://www.linkedin.com/company/rumble-discovery/'>LinkedIn</a> and <a href='https://www.rumble.run'>the Rumble website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p class="x-scope qowt-word-para-0"></p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pg69ku/HVR_for_HVS_Ep_867k6j.mp3" length="36126720" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

This season of Hacker Valley Red wraps up with another interview of an incredible offensive cybersecurity legend. Known first and foremost for his work founding Metasploit and his recent work co-founding Rumble, HD Moore joins the show this week to hear about his journey from spiteful hacker to successful founder. HD walks through the history of Metasploit, the motivation behind their coding decisions, his opinions on open source software, and the excitement of exploration and discovery.
Timecoded Guide:
[04:57] Catching up with HD’s career from his hacking exploits in the ‘90s through his founding of Metasploit to his recent activities with Rumble
[11:41] Getting personal with the feelings and takeaways from a project as successful and impactful on the cyber industry as Metasploit
[18:52] Explaining HD’s personal philosophies around accessible education and the risk of sharing vulnerable information publicly 
[25:39] Diving deep into the technical stories of HD’s path of discovery and exploration during his time at Metasploit
[31:14] Giving advice for future founders and hackers looking to make a legendary impact on the cybersecurity community
Sponsor Links:
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!
 
What were some of the trials, tribulations, and successes of Metasploit? 





Although Metasploit has had a lasting impact on the cyber world, HD Moore is not afraid to admit that part of Metasploit existed out of spite for critics, employers, and gatekeepers in the cybersecurity industry. In terms of trials and tribulations, HD saw a great deal of criticism come from his peers and from professionals ahead of him in the industry, often displaying rudeness towards the quality of the exploits and Metasploit’s audience of young hackers. Later, HD says that a surprising and amusing side effect of his success with the project was watching employers and peers go from criticizing to lifting up his work with Metasploit and attributing success of many hacking professionals to its creation.
“When we started the Metasploit project, we really wanted to open up to everybody. We wanted to make sure that, even if you barely knew how to program, you can still contribute something to Metasploit. So, we did our best to make it really easy for folks to get in touch with us, to submit code.”
 
Where does your philosophy land today on giving information freely?
HD has heard the same opinions many professionals that teach and give information freely have heard: “You’re making it easier for people to use this information the wrong way.” Instead of considering the worst possible outcomes of making hacking accessible, HD chooses to acknowledge the importance of accessible education and publicly provided information. According to HD, if someone is creating and teaching content to the next generation of red teamers, that content is theirs to use. Whether they’re a physical pen tester teaching lock picking or a hacker disclosing a vulnerability, what they choose to share with others has to be based on personal moral code and what others do with that information is up to them. 
“It comes down to: You do the work, you own the result. If you're teaching people how to do stuff, great, they can do what they want. You can decide to do that, you can decide not to do that, but it's your decision to spend your time training people or not training them.”
 
Is ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2253</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>241</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacking the TikTok Algorithm with Caitlin, AKA Cybersecurity Girl</title>
        <itunes:title>Hacking the TikTok Algorithm with Caitlin, AKA Cybersecurity Girl</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacking-the-tiktok-algorithm-with-caitlyn-aka-cybersecurity-girl/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacking-the-tiktok-algorithm-with-caitlyn-aka-cybersecurity-girl/#comments</comments>        <pubDate>Tue, 13 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b96dde2c-be11-3ebe-98ed-2d4b21816028</guid>
                                    <description><![CDATA[<p>Caitlin Sarian, known on TikTok as Cybersecurity Girl, comes to Hacker Valley to talk about the endless possibilities for cybersecurity on social media. Walking through her journey of becoming cyber’s biggest TikTok star, Caitlin covers every aspect of internet fame and online presence, including facing criticism, gaining and losing viewers, and trying to make an impact on women in STEM. Alongside her work on social media, Caitlin also walks through the development of her new online cybersecurity course.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Introducing Caitlin & her work on TikTok with Cybersecurity Girl</p>
<p>[06:45] Building a cyber platform on TikTok & dealing with imposter syndrome</p>
<p>[11:21] Keeping women in STEM, instead of just getting women into STEM fields</p>
<p>[15:56] Dismissing the idea of the diversity hire in tech & cyber</p>
<p>[24:43] Working with Girls Who Code & building her own low-cost cyber school</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





 
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a></p>
<p> </p>
<p>How do you feel about going viral, or not going viral, on TikTok? </p>
<p>Although social media, especially TikTok, relies on an algorithm to push content to different viewers, Caitlin admits that viral content creation is more about luck than about methods. Since becoming involved in TikTok as a cybersecurity influencer, Caitlin has developed tricks of her own to elevate her content and interact with her audience, including going live on the app. However, she still explains that going viral is still random, with lower quality quick content sometimes hitting a larger audience than her higher value creations. </p>
<p>“Videos that you spend the least time on get the most views and the videos that you spend the most time on, get the least views. I've stopped looking at the views and just started trying to produce content that either makes people smile, or adds value to people's lives.”</p>
<p> </p>
<p>What is that value that you're getting from making cybersecurity content for TikTok? </p>
<p>While creating podcasts at Hacker Valley allows for Chris and Ron to give back to their community and meet incredible cybersecurity content creators, a similar idea guides Caitlin’s work on TikTok. Considering that content creation can sometimes feel thankless and frustrating, Caitlin motivates herself by focusing on the people she helps. Through making cybersecurity more accessible online, she hopes to inspire other women to get involved and stay involved in cyber, tech, and STEM fields.</p>
<p>“It adds value to my life, knowing that I'm not just going day-by day-doing my job and that's it. I like bringing awareness and being that light for people that need it, especially in the tech world. I think for me, this is what I'm hoping for, I'm hoping to get more women in STEM.”</p>
<p> </p>
<p>Can you tell us a little bit about your online cybersecurity school? </p>
<p>Caitlin isn’t only working on her cybersecurity platform on TikTok, she’s also expanding into online education with her course, Become a Cyber Analyst. Focusing on cybersecurity accessibility and affordable education, Caitlin’s course is a six-month boot camp that teaches students the ropes of the cyber industry. The best part? Students don’t pay until they’re employed in cyber, and Caitlin’s course guarantees a job within 3 months of graduation.</p>
<p>“I partnered up with a school called Master School, and it's basically a six-month boot camp. And then, after the boot camp, we have HR specialists that help students get a job after. You don't have to pay for it until you get a job, and it's a lump sum.”</p>
<p> </p>
<p>What is your perspective on the struggles women face breaking into cybersecurity and staying in tech careers?</p>
<p>As a woman in cybersecurity, Caitlin has witnessed alarming levels of sexism in the industry and has seen fellow women experience tech burnout. With her content on TikTok and her new cybersecurity school, Caitlin hopes to solve the problem of not just inviting women into the cyber industry, but retaining female employees in cyber as well. Through supportive content creation and her own influence, she hopes other woman see that the possibilities in their careers are endless.</p>
<p>“I think the issue that I always used to deal with is a lot of men think I got the job from just being a woman. That also goes to my imposter syndrome, because I'm like, ‘Maybe I did just get this job because I'm a woman and they want to work with me. Maybe I'm a diversity hire.’”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Caitlin/Cybersecurity Girl on <a href='https://www.tiktok.com/@cybersecuritygirl'>TikTok</a> and <a href='https://www.instagram.com/cybersecurity_girl/'>Instagram</a></p>
<p>Learn more about Caitlin’s incredible Masterschool course, <a href='https://www.masterschool.com/schools/caitlin-sarian'>Become a Cyber Analyst</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Caitlin Sarian, known on TikTok as Cybersecurity Girl, comes to Hacker Valley to talk about the endless possibilities for cybersecurity on social media. Walking through her journey of becoming cyber’s biggest TikTok star, Caitlin covers every aspect of internet fame and online presence, including facing criticism, gaining and losing viewers, and trying to make an impact on women in STEM. Alongside her work on social media, Caitlin also walks through the development of her new online cybersecurity course.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Introducing Caitlin & her work on TikTok with Cybersecurity Girl</p>
<p>[06:45] Building a cyber platform on TikTok & dealing with imposter syndrome</p>
<p>[11:21] Keeping women in STEM, instead of just getting women into STEM fields</p>
<p>[15:56] Dismissing the idea of the diversity hire in tech & cyber</p>
<p>[24:43] Working with Girls Who Code & building her own low-cost cyber school</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!<br>
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





 
<p>Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at <a href='http://uptycs.com'>uptycs.com</a></p>
<p> </p>
<p>How do you feel about going viral, or not going viral, on TikTok? </p>
<p>Although social media, especially TikTok, relies on an algorithm to push content to different viewers, Caitlin admits that viral content creation is more about luck than about methods. Since becoming involved in TikTok as a cybersecurity influencer, Caitlin has developed tricks of her own to elevate her content and interact with her audience, including going live on the app. However, she still explains that going viral is still random, with lower quality quick content sometimes hitting a larger audience than her higher value creations. </p>
<p><em>“Videos that you spend the least time on get the most views and the videos that you spend the most time on, get the least views. I've stopped looking at the views and just started trying to produce content that either makes people smile, or adds value to people's lives.”</em></p>
<p> </p>
<p>What is that value that you're getting from making cybersecurity content for TikTok? </p>
<p>While creating podcasts at Hacker Valley allows for Chris and Ron to give back to their community and meet incredible cybersecurity content creators, a similar idea guides Caitlin’s work on TikTok. Considering that content creation can sometimes feel thankless and frustrating, Caitlin motivates herself by focusing on the people she helps. Through making cybersecurity more accessible online, she hopes to inspire other women to get involved and stay involved in cyber, tech, and STEM fields.</p>
<p><em>“It adds value to my life, knowing that I'm not just going day-by day-doing my job and that's it. I like bringing awareness and being that light for people that need it, especially in the tech world. I think for me, this is what I'm hoping for, I'm hoping to get more women in STEM.”</em></p>
<p> </p>
<p>Can you tell us a little bit about your online cybersecurity school? </p>
<p>Caitlin isn’t only working on her cybersecurity platform on TikTok, she’s also expanding into online education with her course, Become a Cyber Analyst. Focusing on cybersecurity accessibility and affordable education, Caitlin’s course is a six-month boot camp that teaches students the ropes of the cyber industry. The best part? Students don’t pay until they’re employed in cyber, and Caitlin’s course guarantees a job within 3 months of graduation.</p>
<p><em>“I partnered up with a school called Master School, and it's basically a six-month boot camp. And then, after the boot camp, we have HR specialists that help students get a job after. You don't have to pay for it until you get a job, and it's a lump sum.”</em></p>
<p> </p>
<p>What is your perspective on the struggles women face breaking into cybersecurity and staying in tech careers?</p>
<p>As a woman in cybersecurity, Caitlin has witnessed alarming levels of sexism in the industry and has seen fellow women experience tech burnout. With her content on TikTok and her new cybersecurity school, Caitlin hopes to solve the problem of not just inviting women into the cyber industry, but retaining female employees in cyber as well. Through supportive content creation and her own influence, she hopes other woman see that the possibilities in their careers are endless.</p>
<p><em>“I think the issue that I always used to deal with is a lot of men think I got the job from just being a woman. That also goes to my imposter syndrome, because I'm like, ‘Maybe I did just get this job because I'm a woman and they want to work with me. Maybe I'm a diversity hire.’”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with our guest Caitlin/Cybersecurity Girl on <a href='https://www.tiktok.com/@cybersecuritygirl'>TikTok</a> and <a href='https://www.instagram.com/cybersecurity_girl/'>Instagram</a></p>
<p>Learn more about Caitlin’s incredible Masterschool course, <a href='https://www.masterschool.com/schools/caitlin-sarian'>Become a Cyber Analyst</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wgxnu5/HVS_audio_Caitlin_Cyber_Security_Girl__V27pnvm.mp3" length="42629087" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Caitlin Sarian, known on TikTok as Cybersecurity Girl, comes to Hacker Valley to talk about the endless possibilities for cybersecurity on social media. Walking through her journey of becoming cyber’s biggest TikTok star, Caitlin covers every aspect of internet fame and online presence, including facing criticism, gaining and losing viewers, and trying to make an impact on women in STEM. Alongside her work on social media, Caitlin also walks through the development of her new online cybersecurity course.
 
Timecoded Guide:
[00:00] Introducing Caitlin & her work on TikTok with Cybersecurity Girl
[06:45] Building a cyber platform on TikTok & dealing with imposter syndrome
[11:21] Keeping women in STEM, instead of just getting women into STEM fields
[15:56] Dismissing the idea of the diversity hire in tech & cyber
[24:43] Working with Girls Who Code & building her own low-cost cyber school
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley





 
Uptycs, analytics for the modern attack surface, observability for the modern defender. Check out Uptycs by visiting them at uptycs.com
 
How do you feel about going viral, or not going viral, on TikTok? 
Although social media, especially TikTok, relies on an algorithm to push content to different viewers, Caitlin admits that viral content creation is more about luck than about methods. Since becoming involved in TikTok as a cybersecurity influencer, Caitlin has developed tricks of her own to elevate her content and interact with her audience, including going live on the app. However, she still explains that going viral is still random, with lower quality quick content sometimes hitting a larger audience than her higher value creations. 
“Videos that you spend the least time on get the most views and the videos that you spend the most time on, get the least views. I've stopped looking at the views and just started trying to produce content that either makes people smile, or adds value to people's lives.”
 
What is that value that you're getting from making cybersecurity content for TikTok? 
While creating podcasts at Hacker Valley allows for Chris and Ron to give back to their community and meet incredible cybersecurity content creators, a similar idea guides Caitlin’s work on TikTok. Considering that content creation can sometimes feel thankless and frustrating, Caitlin motivates herself by focusing on the people she helps. Through making cybersecurity more accessible online, she hopes to inspire other women to get involved and stay involved in cyber, tech, and STEM fields.
“It adds value to my life, knowing that I'm not just going day-by day-doing my job and that's it. I like bringing awareness and being that light for people that need it, especially in the tech world. I think for me, this is what I'm hoping for, I'm hoping to get more women in STEM.”
 
Can you tell us a little bit about your online cybersecurity school? 
Caitlin isn’t only working on her cybersecurity platform on TikTok, she’s also expanding into online education with her course, Become a Cyber Analyst. Focusing on cybersecurity accessibility and affordable education, Caitlin’s course is a six-month boot camp that teaches students the ropes of the cyber industry. The best part? Students don’t pay until they’re employed in cyber, and Caitlin’s course guarantees a job within 3 months of graduation.
“I partnered up with a school called Master School, and it's basically a six-month boot camp. And then, after the boot camp, we have HR specialists that help students get a job after. You don't have to pay for it until you get a job, and it's a lump sum.”
 
What is your perspective on the struggles women face breakin]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1772</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>236</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>From Black Hat to Bug Bounties [Pt. 2] with Thomas DeVoss</title>
        <itunes:title>From Black Hat to Bug Bounties [Pt. 2] with Thomas DeVoss</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/from-black-hat-to-bug-bounties-pt-2-with-thomas-devoss/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/from-black-hat-to-bug-bounties-pt-2-with-thomas-devoss/#comments</comments>        <pubDate>Thu, 08 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/461adedf-5984-3d06-8034-bb0f05de9b93</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">We’re joined again by the hacker’s hacker, Tommy DeVoss, aka dawgyg. Bug bounty hunter and reformed black hat, Tommy dives back into a great conversation with us about his journey in hacking and his advice to future red team offensive hackers. We cover everything we couldn’t get to from part 1 of our interview, including his struggles with burnout, his past hacking foreign countries on a bold quest to stop terrorism, and his future in Twitch streaming to teach you how to be a better bug bounty hunter.

</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[02:57] Fixating on hacking because of the endless possibilities and iterations to learn</p>
<p class="x-scope qowt-word-para-0">[09:54] Giving advice to the next generation of hackers</p>
<p class="x-scope qowt-word-para-0">[17:17] Contacting Tommy and keeping up with him on Twitter</p>
<p class="x-scope qowt-word-para-0">[21:43] Planning a Twitch course to teach hackers about bug bounties using real bugs and real-world examples </p>
<p class="x-scope qowt-word-para-0">[24:57] Hacking in the early 2000s and understanding the freedom Tommy has to talk about any and all illegal hacking he’s done now that he’s gone to prison </p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusivecRed Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Do you ever struggle with burnout when it comes to hacking?</p>





<p class="x-scope qowt-word-para-0">Hacking has maintained Tommy’s interest longer than anything else because of the constant changes in technology and the ever-evolving issues in the online world. However, just because hacking is his passion, doesn’t mean that burnout or frustration never happens. Currently, Tommy is taking more of a break with hacking, letting his current day job and his passion for gaming have a front seat. However, he’s still firmly in the industry, passionately developing learning opportunities for future hackers and answering questions from cyber professionals of all backgrounds.</p>
<p class="x-scope qowt-word-para-2">“I do get burned out sometimes…When it comes to bug bounty hunting, I try and make it so it averages out to where I make at least $1,000 an hour for my effort. It doesn't always work. Sometimes I'm more, sometimes I'm less, but I try and get it so it averages out to about that.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What hacking advice would you give the younger version of yourself? </p>
<p class="x-scope qowt-word-para-0">Although his black hat ways resulted in prison time for Tommy, he doesn’t regret his past and instead seeks to teach others the lessons he’s learned. When we asked Tommy for advice for new hackers, he was clear that success is a longer journey than people assume it is. Tommy’s success was not a fluke, it took years of hands-on learning and patience with failures in order to develop his bug bounty skills. Nothing is actually automatic or easy with hacking, especially as the technology continues to change and evolve. Tommy wants hackers to take every opportunity to try out their skills, even if it's a complete failure.</p>
<p class="x-scope qowt-word-para-2">“Don't expect success overnight. Also, don't let failure discourage you. When it comes to hacking, you're going to fail significantly more than you're going to succeed. And the people that are successful in bug bounties are the ones that don't let those failures discourage them.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What do you think about the “media obsessed” stereotype many people have about black hat hackers?</p>
<p class="x-scope qowt-word-para-0">Wrapping up today, Tommy tells us that he’d be happy to be back in the Hacker Valley Studio again some time. Although the stereotype of a black hat hacker wanting attention from the media is disproven, Tommy believes that he definitely has craved that media attention for a large majority of his hacking career. Starting in the early 2000s, after 9/11, Tommy had one of his first brushes with fame in an interview with CNN about hacking Middle Eastern companies. Although his hacking and his politics have changed since then, Tommy enjoys having in-depth conversations about hacking and explaining the intricacies of what he does.</p>
<p class="x-scope qowt-word-para-2">“We loved the attention back then, and I still love the attention now, it's nice. The good thing about now is, because I already got in trouble for everything that I've done, I've done my prison time, I don't have anything that I did illegally on the computer anymore that I can't talk about, because I've already paid my debt to society.”</p>





<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What are the best ways for people to keep up with what you’re doing?</p>
<p class="x-scope qowt-word-para-0">Considering Tommy’s success, it’s understandable that a lot of cyber professionals and amateurs have tons of questions for him. When it comes to getting in contact with Tommy, he recommends tweeting him on Twitter publicly so that he can not only answer your question, but help others with the exact same questions. Education is key, and Tommy is so dedicated to teaching other hackers that he’s currently developing a recurring Twitch stream centered around helping others learn about bug bounty hunting.</p>
<p class="x-scope qowt-word-para-2">“I don't know how successful we're going to be in finding the bugs, but I think it'll be fun to teach people [on Twitch] and do it that way, so that they can actually spend some time learning it. The best way to actually learn this stuff is to actually try and do the hacking.”</p>
<p class="x-scope qowt-word-para-0">-----------</p>
<p class="x-scope qowt-word-para-0">Links:</p>
<p class="x-scope qowt-word-para-0">Stay in touch with Thomas DeVoss on <a href='https://www.linkedin.com/in/thomas-devoss-802a8976/'>LinkedIn</a> and <a href='https://mobile.twitter.com/thedawgyg'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Check out the <a href='https://www.bugbountyhunter.com/getting-started/'>Bug Bounty Hunter website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p class="x-scope qowt-word-para-0"></p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">We’re joined again by the hacker’s hacker, Tommy DeVoss, aka dawgyg. Bug bounty hunter and reformed black hat, Tommy dives back into a great conversation with us about his journey in hacking and his advice to future red team offensive hackers. We cover everything we couldn’t get to from part 1 of our interview, including his struggles with burnout, his past hacking foreign countries on a bold quest to stop terrorism, and his future in Twitch streaming to teach you how to be a better bug bounty hunter.<br>
<br>
</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[02:57] Fixating on hacking because of the endless possibilities and iterations to learn</p>
<p class="x-scope qowt-word-para-0">[09:54] Giving advice to the next generation of hackers</p>
<p class="x-scope qowt-word-para-0">[17:17] Contacting Tommy and keeping up with him on Twitter</p>
<p class="x-scope qowt-word-para-0">[21:43] Planning a Twitch course to teach hackers about bug bounties using real bugs and real-world examples </p>
<p class="x-scope qowt-word-para-0">[24:57] Hacking in the early 2000s and understanding the freedom Tommy has to talk about any and all illegal hacking he’s done now that he’s gone to prison </p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusivec<em>Red Team Content Bundle </em>for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Do you ever struggle with burnout when it comes to hacking?</p>





<p class="x-scope qowt-word-para-0">Hacking has maintained Tommy’s interest longer than anything else because of the constant changes in technology and the ever-evolving issues in the online world. However, just because hacking is his passion, doesn’t mean that burnout or frustration never happens. Currently, Tommy is taking more of a break with hacking, letting his current day job and his passion for gaming have a front seat. However, he’s still firmly in the industry, passionately developing learning opportunities for future hackers and answering questions from cyber professionals of all backgrounds.</p>
<p class="x-scope qowt-word-para-2">“I do get burned out sometimes…When it comes to bug bounty hunting, I try and make it so it averages out to where I make at least $1,000 an hour for my effort. It doesn't always work. Sometimes I'm more, sometimes I'm less, but I try and get it so it averages out to about that.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What hacking advice would you give the younger version of yourself? </p>
<p class="x-scope qowt-word-para-0">Although his black hat ways resulted in prison time for Tommy, he doesn’t regret his past and instead seeks to teach others the lessons he’s learned. When we asked Tommy for advice for new hackers, he was clear that success is a longer journey than people assume it is. Tommy’s success was not a fluke, it took years of hands-on learning and patience with failures in order to develop his bug bounty skills. Nothing is actually automatic or easy with hacking, especially as the technology continues to change and evolve. Tommy wants hackers to take every opportunity to try out their skills, even if it's a complete failure.</p>
<p class="x-scope qowt-word-para-2">“Don't expect success overnight. Also, don't let failure discourage you. When it comes to hacking, you're going to fail significantly more than you're going to succeed. And the people that are successful in bug bounties are the ones that don't let those failures discourage them.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What do you think about the “media obsessed” stereotype many people have about black hat hackers?</p>
<p class="x-scope qowt-word-para-0">Wrapping up today, Tommy tells us that he’d be happy to be back in the Hacker Valley Studio again some time. Although the stereotype of a black hat hacker wanting attention from the media is disproven, Tommy believes that he definitely has craved that media attention for a large majority of his hacking career. Starting in the early 2000s, after 9/11, Tommy had one of his first brushes with fame in an interview with CNN about hacking Middle Eastern companies. Although his hacking and his politics have changed since then, Tommy enjoys having in-depth conversations about hacking and explaining the intricacies of what he does.</p>
<p class="x-scope qowt-word-para-2">“We loved the attention back then, and I still love the attention now, it's nice. The good thing about now is, because I already got in trouble for everything that I've done, I've done my prison time, I don't have anything that I did illegally on the computer anymore that I can't talk about, because I've already paid my debt to society.”</p>





<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What are the best ways for people to keep up with what you’re doing?</p>
<p class="x-scope qowt-word-para-0">Considering Tommy’s success, it’s understandable that a lot of cyber professionals and amateurs have tons of questions for him. When it comes to getting in contact with Tommy, he recommends tweeting him on Twitter publicly so that he can not only answer your question, but help others with the exact same questions. Education is key, and Tommy is so dedicated to teaching other hackers that he’s currently developing a recurring Twitch stream centered around helping others learn about bug bounty hunting.</p>
<p class="x-scope qowt-word-para-2">“I don't know how successful we're going to be in finding the bugs, but I think it'll be fun to teach people [on Twitch] and do it that way, so that they can actually spend some time learning it. The best way to actually learn this stuff is to actually try and do the hacking.”</p>
<p class="x-scope qowt-word-para-0">-----------</p>
<p class="x-scope qowt-word-para-0">Links:</p>
<p class="x-scope qowt-word-para-0">Stay in touch with Thomas DeVoss on <a href='https://www.linkedin.com/in/thomas-devoss-802a8976/'>LinkedIn</a> and <a href='https://mobile.twitter.com/thedawgyg'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Check out the <a href='https://www.bugbountyhunter.com/getting-started/'>Bug Bounty Hunter website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p class="x-scope qowt-word-para-0"></p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ch7xwq/HVR_for_HVS_Ep_770eut.mp3" length="33366528" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

We’re joined again by the hacker’s hacker, Tommy DeVoss, aka dawgyg. Bug bounty hunter and reformed black hat, Tommy dives back into a great conversation with us about his journey in hacking and his advice to future red team offensive hackers. We cover everything we couldn’t get to from part 1 of our interview, including his struggles with burnout, his past hacking foreign countries on a bold quest to stop terrorism, and his future in Twitch streaming to teach you how to be a better bug bounty hunter.
Timecoded Guide:
[02:57] Fixating on hacking because of the endless possibilities and iterations to learn
[09:54] Giving advice to the next generation of hackers
[17:17] Contacting Tommy and keeping up with him on Twitter
[21:43] Planning a Twitch course to teach hackers about bug bounties using real bugs and real-world examples 
[24:57] Hacking in the early 2000s and understanding the freedom Tommy has to talk about any and all illegal hacking he’s done now that he’s gone to prison 
 
Sponsor Links:
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
PlexTrac is pleased to offer an exclusivecRed Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!
 
Do you ever struggle with burnout when it comes to hacking?





Hacking has maintained Tommy’s interest longer than anything else because of the constant changes in technology and the ever-evolving issues in the online world. However, just because hacking is his passion, doesn’t mean that burnout or frustration never happens. Currently, Tommy is taking more of a break with hacking, letting his current day job and his passion for gaming have a front seat. However, he’s still firmly in the industry, passionately developing learning opportunities for future hackers and answering questions from cyber professionals of all backgrounds.
“I do get burned out sometimes…When it comes to bug bounty hunting, I try and make it so it averages out to where I make at least $1,000 an hour for my effort. It doesn't always work. Sometimes I'm more, sometimes I'm less, but I try and get it so it averages out to about that.”
 
What hacking advice would you give the younger version of yourself? 
Although his black hat ways resulted in prison time for Tommy, he doesn’t regret his past and instead seeks to teach others the lessons he’s learned. When we asked Tommy for advice for new hackers, he was clear that success is a longer journey than people assume it is. Tommy’s success was not a fluke, it took years of hands-on learning and patience with failures in order to develop his bug bounty skills. Nothing is actually automatic or easy with hacking, especially as the technology continues to change and evolve. Tommy wants hackers to take every opportunity to try out their skills, even if it's a complete failure.
“Don't expect success overnight. Also, don't let failure discourage you. When it comes to hacking, you're going to fail significantly more than you're going to succeed. And the people that are successful in bug bounties are the ones that don't let those failures discourage them.”
 
What do you think about the “media obsessed” stereotype many people have about black hat hackers?
Wrapping up today, Tommy tells us that he’d be happy to be back in the Hacker Valley Studio again some time. Although the stereotype of a black hat hacker wanting attention from the media is disproven, Tommy believes that he definitely has craved that media attention for a large majority of his hacking career. Starting in the ea]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2081</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>240</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Reconnecting to Childhood Creativity with Mari Reisberg</title>
        <itunes:title>Reconnecting to Childhood Creativity with Mari Reisberg</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/reconnecting-to-childhood-creativity-with-mari-reisberg/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/reconnecting-to-childhood-creativity-with-mari-reisberg/#comments</comments>        <pubDate>Tue, 06 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/56b4c766-899e-3768-9262-f456eb9bf0dc</guid>
                                    <description><![CDATA[<p>Mari Reisberg, therapist, performer, creativity coach, and host of the Sustaining Creativity podcast, brings her many talents to Hacker Valley to help adults unlock their creativity and engage with their inner child. Tackling topics from artistic ruts to technical frameworks, Mari walks through the essentials of reconnecting with creativity and curiosity. Instead of limiting thoughts to the path of least resistance, Mari challenges her clients to get comfortable with the uncomfortable in creativity.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Sustaining creativity & coaching others on becoming curious</p>
<p>[06:35] Defining creativity with new ideas & fresh innovations </p>
<p>[10:07] Climbing out of a creative rut & expanding your comfort zone</p>
<p>[18:47] Unlocking different levels of creativity in everyday life</p>
<p>[23:59] Tapping into creativity and unlocking childhood memories</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





<p>
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>What is creativity, in your opinion?</p>
<p>There isn’t one way to define creativity, Mari explains, but instead a myriad of ways. Each person has their own individual relationship with the concept of creativity, but Mari considers creativity to be tied to the processes of coming up with new ideas and innovating on those ideas. Seeing life through a creative lens means that Mari isn’t afraid to try and fail, because everything she does expands her comfort zone and tests her curiosity. </p>
<p>“Creativity is one of those words where, if you asked 100 people, you’d get 100 different answers. For me, my definition of creativity really is around thinking of novel, new ideas. And then, the second piece of the creative process is that innovation process.”</p>
<p> </p>
<p>What advice would you have for someone who is trying to find their way through a creative rut? </p>
<p>The human brain will always choose the path of least resistance. People like to feel safe and comfortable with everything they do, but Mari understands that creativity can only be practiced at the edge of someone’s comfort zone. With one foot in her comfort zone and one foot out of it, Mari has been able to escape her own creative ruts and make active decisions to try the everyday activities in her life with a different perspective. </p>
<p>“If my desire is to create something new, something different, and I'm continuing to do the same things and expecting a new result, it's not going to happen. How could you try something different every day?” </p>
<p> </p>
<p>Are there different types of creativity, similar to there being different types of intelligence? </p>
<p>In Mari’s experience, there are two forms of creativity: big C creativity and little c creativity. While little c creativity is an everyday reality, big C creativity is much more performative, curious, and expressive. When someone says they aren’t creative, what they’re thinking of is this second form of creativity. The fact is that anyone can become big C creative, but it requires actively exploring and expanding the skills of creativity. </p>
<p>“The big C creativity is what everyone assumes is creativity; performing arts, creative arts, I'm doing something that I'm sharing with the world. The small c creativity is that every day creativity. It’s something new, something different.”</p>
<p> </p>
<p>When it comes to wanting to build our creative muscles, what are some techniques or frameworks that we should be considering?</p>
<p>Creativity is a practice, not a one-and-done deal. Mari explains that building creative muscles comes from repetition of creativity, such as trying something new everyday, challenging ourselves to think of something from an opposite point of view, and even daydreaming. Explore what would happen if something, even one small detail of an event, was different, and never limit yourself to the idea that you’re “just not creative.”</p>
<p>“There’re opportunities to flex that creativity, but it's about continuing to do it. You can’t do it once and expect a miracle. You keep coming back to it, keep practicing, keep having new ways of trying something.” </p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Mari Reisberg at <a href='https://sustainingcreativity.com'>SustainingCreativity.com</a></p>
<p>Check out Mari’s podcast, <a href='https://sustainingcreativity.com/podcast/'>the Sustaining Creativity podcast</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Mari Reisberg, therapist, performer, creativity coach, and host of the Sustaining Creativity podcast, brings her many talents to Hacker Valley to help adults unlock their creativity and engage with their inner child. Tackling topics from artistic ruts to technical frameworks, Mari walks through the essentials of reconnecting with creativity and curiosity. Instead of limiting thoughts to the path of least resistance, Mari challenges her clients to get comfortable with the uncomfortable in creativity.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Sustaining creativity & coaching others on becoming curious</p>
<p>[06:35] Defining creativity with new ideas & fresh innovations </p>
<p>[10:07] Climbing out of a creative rut & expanding your comfort zone</p>
<p>[18:47] Unlocking different levels of creativity in everyday life</p>
<p>[23:59] Tapping into creativity and unlocking childhood memories</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!<br>
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





<p><br>
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>What is creativity, in your opinion?</p>
<p>There isn’t one way to define creativity, Mari explains, but instead a myriad of ways. Each person has their own individual relationship with the concept of creativity, but Mari considers creativity to be tied to the processes of coming up with new ideas and innovating on those ideas. Seeing life through a creative lens means that Mari isn’t afraid to try and fail, because everything she does expands her comfort zone and tests her curiosity. </p>
<p><em>“Creativity is one of those words where, if you asked 100 people, you’d get 100 different answers. For me, my definition of creativity really is around thinking of novel, new ideas. And then, the second piece of the creative process is that innovation process.”</em></p>
<p> </p>
<p>What advice would you have for someone who is trying to find their way through a creative rut? </p>
<p>The human brain will always choose the path of least resistance. People like to feel safe and comfortable with everything they do, but Mari understands that creativity can only be practiced at the edge of someone’s comfort zone. With one foot in her comfort zone and one foot out of it, Mari has been able to escape her own creative ruts and make active decisions to try the everyday activities in her life with a different perspective. </p>
<p><em>“If my desire is to create something new, something different, and I'm continuing to do the same things and expecting a new result, it's not going to happen. How could you try something different every day?” </em></p>
<p> </p>
<p>Are there different types of creativity, similar to there being different types of intelligence? </p>
<p>In Mari’s experience, there are two forms of creativity: big C creativity and little c creativity. While little c creativity is an everyday reality, big C creativity is much more performative, curious, and expressive. When someone says they aren’t creative, what they’re thinking of is this second form of creativity. The fact is that anyone can become big C creative, but it requires actively exploring and expanding the skills of creativity. </p>
<p><em>“The big C creativity is what everyone assumes is creativity; performing arts, creative arts, I'm doing something that I'm sharing with the world. The small c creativity is that every day creativity. It’s something new, something different.”</em></p>
<p> </p>
<p>When it comes to wanting to build our creative muscles, what are some techniques or frameworks that we should be considering?</p>
<p>Creativity is a practice, not a one-and-done deal. Mari explains that building creative muscles comes from repetition of creativity, such as trying something new everyday, challenging ourselves to think of something from an opposite point of view, and even daydreaming. Explore what would happen if something, even one small detail of an event, was different, and never limit yourself to the idea that you’re “just not creative.”</p>
<p><em>“There’re opportunities to flex that creativity, but it's about continuing to do it. You can’t do it once and expect a miracle. You keep coming back to it, keep practicing, keep having new ways of trying something.” </em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Mari Reisberg at <a href='https://sustainingcreativity.com'>SustainingCreativity.com</a></p>
<p>Check out Mari’s podcast, <a href='https://sustainingcreativity.com/podcast/'>the Sustaining Creativity podcast</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rz3qfx/HVS_audio_Mari_Reisberg_v3bduyc.mp3" length="42589751" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Mari Reisberg, therapist, performer, creativity coach, and host of the Sustaining Creativity podcast, brings her many talents to Hacker Valley to help adults unlock their creativity and engage with their inner child. Tackling topics from artistic ruts to technical frameworks, Mari walks through the essentials of reconnecting with creativity and curiosity. Instead of limiting thoughts to the path of least resistance, Mari challenges her clients to get comfortable with the uncomfortable in creativity.
 
Timecoded Guide:
[00:00] Sustaining creativity & coaching others on becoming curious
[06:35] Defining creativity with new ideas & fresh innovations 
[10:07] Climbing out of a creative rut & expanding your comfort zone
[18:47] Unlocking different levels of creativity in everyday life
[23:59] Tapping into creativity and unlocking childhood memories
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley





With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: uptycs.com. 
 
What is creativity, in your opinion?
There isn’t one way to define creativity, Mari explains, but instead a myriad of ways. Each person has their own individual relationship with the concept of creativity, but Mari considers creativity to be tied to the processes of coming up with new ideas and innovating on those ideas. Seeing life through a creative lens means that Mari isn’t afraid to try and fail, because everything she does expands her comfort zone and tests her curiosity. 
“Creativity is one of those words where, if you asked 100 people, you’d get 100 different answers. For me, my definition of creativity really is around thinking of novel, new ideas. And then, the second piece of the creative process is that innovation process.”
 
What advice would you have for someone who is trying to find their way through a creative rut? 
The human brain will always choose the path of least resistance. People like to feel safe and comfortable with everything they do, but Mari understands that creativity can only be practiced at the edge of someone’s comfort zone. With one foot in her comfort zone and one foot out of it, Mari has been able to escape her own creative ruts and make active decisions to try the everyday activities in her life with a different perspective. 
“If my desire is to create something new, something different, and I'm continuing to do the same things and expecting a new result, it's not going to happen. How could you try something different every day?” 
 
Are there different types of creativity, similar to there being different types of intelligence? 
In Mari’s experience, there are two forms of creativity: big C creativity and little c creativity. While little c creativity is an everyday reality, big C creativity is much more performative, curious, and expressive. When someone says they aren’t creative, what they’re thinking of is this second form of creativity. The fact is that anyone can become big C creative, but it requires actively exploring and expanding the skills of creativity. 
“The big C creativity is what everyone assumes is creativity; performing arts, creative arts, I'm doing something that I'm sharing with the world. The small c creativity is that every day creativity. It’s something new, something different.”
 
When it comes to wanting to build our creative muscles, what are some techniques or frameworks that we should be considering?
Creativity is a practice, not a one-and-done deal. Mari explains that building creative muscles comes from repetition of creativity, such as trying something new everyday, challenging ourselves to think of some]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1774</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>233</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>From Black Hat to Bug Bounties [Pt. 1] with Tommy DeVoss</title>
        <itunes:title>From Black Hat to Bug Bounties [Pt. 1] with Tommy DeVoss</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/from-black-hat-to-bug-bounties-pt-1-with-tommy-devoss/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/from-black-hat-to-bug-bounties-pt-1-with-tommy-devoss/#comments</comments>        <pubDate>Thu, 01 Sep 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1abad9e2-d2a8-3cb8-9bef-303ddc683a80</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">We’re joined by million-dollar hacker and bug bounty hunter, Thomas DeVoss, this week as we continue our season-long discussion of offensive cybersecurity legends. A legend in the making with a success story in bug bounty hunting that has to be heard to be believed, Tommy is an incredibly successful blach hat hacker-turned-bug bounty hunter, representing how misunderstood the hacking community can be and how positively impactful bug bounties can be. Who hacks the hackers? Look no further than Tommy DeVoss.

</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[02:59] Becoming interested in hacking for the first time </p>
<p class="x-scope qowt-word-para-0">[08:26] Encountering unfriendly visits with the government and the FBI after his hacking skills progressed </p>
<p class="x-scope qowt-word-para-0">[14:20] Seeking his first computer job after prison and leveraging his hacking skills </p>
<p class="x-scope qowt-word-para-0">[25:21] Discussing with Yahoo the possibility of working with them due to his successful bug boundaries </p>
<p class="x-scope qowt-word-para-0">[30:56] Giving honest advice to hackers looking to break into the bug bounty scene 

</p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0"></p>
<p class="x-scope qowt-word-para-1">When did you get into hacking for the first time?</p>





<p class="x-scope qowt-word-para-0">At an early age, Thomas found his passion for hacking in an IRC chat room. Mentored by a man named Lewis and encouraged by fellow friends in the hacking world, popping shells and breaking into US systems using foreign IP addresses. Although Tommy became incredible at his craft from a young age, his early habits became serious black hat issues that ended up getting him in trouble with the US government. Just like the hacker in a big Hollywood blockbuster, the government caught up with Tommy and he faced 2 years in prison in his first sentence.</p>
<p class="x-scope qowt-word-para-2">“Instead of coming back to him and saying, "Hey, I'm done," I came back and I was actually asking him questions like, "Can you explain this?” And he saw that I was like, actually interested in this and I wasn't one of the people that was just expecting it to be handed to me and everything like that.” </p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">After spending time in prison, were there barriers to getting involved in hacking again? </p>
<p class="x-scope qowt-word-para-0">After being in and out of prison a couple times, Tommy found the worst part of coming home to be his ban from touching any sort of device with internet access. Despite it being a part of his probation, his passion for tech continued to bring him back to computers and gaming. After his final stint in prison after being falsely suspected of returning to his black hat ways, the FBI lifted Tommy’s indefinite ban on computer usage and immediately renewed his passion for working in tech. </p>
<p class="x-scope qowt-word-para-2">“They had banned me indefinitely from touching a computer. So, when I came home on probation the first time, they upheld that and I still wasn't allowed to touch computers as part of my probation. For the first month or so, I didn't get on a computer when I came home from prison, but then it didn't take long before I got bored.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">How did your cyber career pivot to bug bounty hunting?</p>
<p class="x-scope qowt-word-para-0">With prison behind him and his ban on computers lifted, Tommy got a job working for a family friend in Richmond, Virginia for a modest salary of $30,000. Although this amount felt like a lot at the time, he quickly realized that there was money to be made in bug bounties. His first few experiments in attempting bug bounty programs had him earning $20,000 or $30,000 for hours of work, a huge increase from the salary he was currently making. Encountering success after success, Thomas quit his job in 2017 to become a full-time bug bounty hunter.</p>
<p class="x-scope qowt-word-para-2">“The first bug bounty program that jumped out at me was Yahoo. I had started hacking Yahoo in the mid 90s, I knew their systems in the 90s and early 2000s better than a lot of their system admins and stuff. And I figured, if there's any company that I should start out with, it should be them.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What success have you seen since becoming a bug bounty hunter, especially with major corporations like Yahoo?</p>




<p class="x-scope qowt-word-para-0">Thomas has become a huge earner in the cybersecurity community, and has continued to see incredible results from his hacking and bug bounty projects. Most notably, after numerous high earning days, making up to $130K at once, with companies like Yahoo, he’s even been offered positions working with corporations he’s bug bountied for. However, Tommy is quick to point out that his success was definitely not overnight, and warns fellow hackers of getting too confident in their bug bounty abilities without the proper skill sets or amount of experience under their belts.</p>
<p class="x-scope qowt-word-para-2">“I think at this point, I've had days where I've made six-digit income in that single day, at least six or seven times. And it's almost always been from Yahoo.”</p>
<p class="x-scope qowt-word-para-0">-----------</p>
<p class="x-scope qowt-word-para-0">Links: </p>
<p class="x-scope qowt-word-para-0">Stay in touch with Thomas DeVoss on <a href='https://www.linkedin.com/in/thomas-devoss-802a8976/'>LinkedIn</a> and <a href='https://mobile.twitter.com/thedawgyg'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Check out the <a href='https://www.bugbountyhunter.com/getting-started/'>Bug Bounty Hunter website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">We’re joined by million-dollar hacker and bug bounty hunter, Thomas DeVoss, this week as we continue our season-long discussion of offensive cybersecurity legends. A legend in the making with a success story in bug bounty hunting that has to be heard to be believed, Tommy is an incredibly successful blach hat hacker-turned-bug bounty hunter, representing how misunderstood the hacking community can be and how positively impactful bug bounties can be. Who hacks the hackers? Look no further than Tommy DeVoss.<br>
<br>
</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[02:59] Becoming interested in hacking for the first time </p>
<p class="x-scope qowt-word-para-0">[08:26] Encountering unfriendly visits with the government and the FBI after his hacking skills progressed </p>
<p class="x-scope qowt-word-para-0">[14:20] Seeking his first computer job after prison and leveraging his hacking skills </p>
<p class="x-scope qowt-word-para-0">[25:21] Discussing with Yahoo the possibility of working with them due to his successful bug boundaries </p>
<p class="x-scope qowt-word-para-0">[30:56] Giving honest advice to hackers looking to break into the bug bounty scene <br>
<br>
</p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive <em>Red Team Content Bundle</em> for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0"></p>
<p class="x-scope qowt-word-para-1">When did you get into hacking for the first time?</p>





<p class="x-scope qowt-word-para-0">At an early age, Thomas found his passion for hacking in an IRC chat room. Mentored by a man named Lewis and encouraged by fellow friends in the hacking world, popping shells and breaking into US systems using foreign IP addresses. Although Tommy became incredible at his craft from a young age, his early habits became serious black hat issues that ended up getting him in trouble with the US government. Just like the hacker in a big Hollywood blockbuster, the government caught up with Tommy and he faced 2 years in prison in his first sentence.</p>
<p class="x-scope qowt-word-para-2">“Instead of coming back to him and saying, "Hey, I'm done," I came back and I was actually asking him questions like, "Can you explain this?” And he saw that I was like, actually interested in this and I wasn't one of the people that was just expecting it to be handed to me and everything like that.” </p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">After spending time in prison, were there barriers to getting involved in hacking again? </p>
<p class="x-scope qowt-word-para-0">After being in and out of prison a couple times, Tommy found the worst part of coming home to be his ban from touching any sort of device with internet access. Despite it being a part of his probation, his passion for tech continued to bring him back to computers and gaming. After his final stint in prison after being falsely suspected of returning to his black hat ways, the FBI lifted Tommy’s indefinite ban on computer usage and immediately renewed his passion for working in tech. </p>
<p class="x-scope qowt-word-para-2">“They had banned me indefinitely from touching a computer. So, when I came home on probation the first time, they upheld that and I still wasn't allowed to touch computers as part of my probation. For the first month or so, I didn't get on a computer when I came home from prison, but then it didn't take long before I got bored.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">How did your cyber career pivot to bug bounty hunting?</p>
<p class="x-scope qowt-word-para-0">With prison behind him and his ban on computers lifted, Tommy got a job working for a family friend in Richmond, Virginia for a modest salary of $30,000. Although this amount felt like a lot at the time, he quickly realized that there was money to be made in bug bounties. His first few experiments in attempting bug bounty programs had him earning $20,000 or $30,000 for hours of work, a huge increase from the salary he was currently making. Encountering success after success, Thomas quit his job in 2017 to become a full-time bug bounty hunter.</p>
<p class="x-scope qowt-word-para-2">“The first bug bounty program that jumped out at me was Yahoo. I had started hacking Yahoo in the mid 90s, I knew their systems in the 90s and early 2000s better than a lot of their system admins and stuff. And I figured, if there's any company that I should start out with, it should be them.”</p>
<p class="x-scope qowt-word-para-2"> </p>
<p class="x-scope qowt-word-para-1">What success have you seen since becoming a bug bounty hunter, especially with major corporations like Yahoo?</p>




<p class="x-scope qowt-word-para-0">Thomas has become a huge earner in the cybersecurity community, and has continued to see incredible results from his hacking and bug bounty projects. Most notably, after numerous high earning days, making up to $130K at once, with companies like Yahoo, he’s even been offered positions working with corporations he’s bug bountied for. However, Tommy is quick to point out that his success was definitely not overnight, and warns fellow hackers of getting too confident in their bug bounty abilities without the proper skill sets or amount of experience under their belts.</p>
<p class="x-scope qowt-word-para-2">“I think at this point, I've had days where I've made six-digit income in that single day, at least six or seven times. And it's almost always been from Yahoo.”</p>
<p class="x-scope qowt-word-para-0">-----------</p>
<p class="x-scope qowt-word-para-0">Links: </p>
<p class="x-scope qowt-word-para-0">Stay in touch with Thomas DeVoss on <a href='https://www.linkedin.com/in/thomas-devoss-802a8976/'>LinkedIn</a> and <a href='https://mobile.twitter.com/thedawgyg'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Check out the <a href='https://www.bugbountyhunter.com/getting-started/'>Bug Bounty Hunter website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/is3c3w/HVR_for_HVS_Ep_66471u.mp3" length="34598016" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

We’re joined by million-dollar hacker and bug bounty hunter, Thomas DeVoss, this week as we continue our season-long discussion of offensive cybersecurity legends. A legend in the making with a success story in bug bounty hunting that has to be heard to be believed, Tommy is an incredibly successful blach hat hacker-turned-bug bounty hunter, representing how misunderstood the hacking community can be and how positively impactful bug bounties can be. Who hacks the hackers? Look no further than Tommy DeVoss.
Timecoded Guide:
[02:59] Becoming interested in hacking for the first time 
[08:26] Encountering unfriendly visits with the government and the FBI after his hacking skills progressed 
[14:20] Seeking his first computer job after prison and leveraging his hacking skills 
[25:21] Discussing with Yahoo the possibility of working with them due to his successful bug boundaries 
[30:56] Giving honest advice to hackers looking to break into the bug bounty scene 
Sponsor Links:
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!

When did you get into hacking for the first time?





At an early age, Thomas found his passion for hacking in an IRC chat room. Mentored by a man named Lewis and encouraged by fellow friends in the hacking world, popping shells and breaking into US systems using foreign IP addresses. Although Tommy became incredible at his craft from a young age, his early habits became serious black hat issues that ended up getting him in trouble with the US government. Just like the hacker in a big Hollywood blockbuster, the government caught up with Tommy and he faced 2 years in prison in his first sentence.
“Instead of coming back to him and saying, "Hey, I'm done," I came back and I was actually asking him questions like, "Can you explain this?” And he saw that I was like, actually interested in this and I wasn't one of the people that was just expecting it to be handed to me and everything like that.” 
 
After spending time in prison, were there barriers to getting involved in hacking again? 
After being in and out of prison a couple times, Tommy found the worst part of coming home to be his ban from touching any sort of device with internet access. Despite it being a part of his probation, his passion for tech continued to bring him back to computers and gaming. After his final stint in prison after being falsely suspected of returning to his black hat ways, the FBI lifted Tommy’s indefinite ban on computer usage and immediately renewed his passion for working in tech. 
“They had banned me indefinitely from touching a computer. So, when I came home on probation the first time, they upheld that and I still wasn't allowed to touch computers as part of my probation. For the first month or so, I didn't get on a computer when I came home from prison, but then it didn't take long before I got bored.”
 
How did your cyber career pivot to bug bounty hunting?
With prison behind him and his ban on computers lifted, Tommy got a job working for a family friend in Richmond, Virginia for a modest salary of $30,000. Although this amount felt like a lot at the time, he quickly realized that there was money to be made in bug bounties. His first few experiments in attempting bug bounty programs had him earning $20,000 or $30,000 for hours of work, a huge increase from the salary he was currently making. Encountering success after success]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2158</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>239</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Fabulous Search for a Tech Job with Kyle Elliot</title>
        <itunes:title>The Fabulous Search for a Tech Job with Kyle Elliot</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-fabulous-search-for-a-tech-job-with-kyle-elliot/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-fabulous-search-for-a-tech-job-with-kyle-elliot/#comments</comments>        <pubDate>Tue, 30 Aug 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6a84eece-731b-31f6-a72f-4f29f7557c38</guid>
                                    <description><![CDATA[<p>Kyle Elliott, the Founder and Career Coach behind CaffeinatedKyle.com, joins the pod on his quest to transform boring job searches into something fabulous. Kyle specializes in helping job seekers, especially those in technology and cybersecurity, find jobs they love and express the value they bring to potential employers. Need to know the secret to acing your next tech job interview? Look no further than Caffeinated Kyle.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Finding your own definition of fabulous</p>
<p>[06:06] Standing out in a tech job interview</p>
<p>[12:19] Dealing with and learning from job rejection</p>
<p>[16:41] Targeting your dream tech job & telling your career story</p>
<p>[21:33] Breaking into technology the easy way and the hard way</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





<p>
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>From your perspective, what makes someone fabulous?</p>
<p>Being “fabulous” can sound grandiose to most tech practitioners, but Kyle believes that everyone has the potential to be fabulous, especially when they’re forging their career path. There’s a lot of competition amongst large tech companies to find the employees that close skill gaps and stand out from the massive group of hungry job seekers. To be fabulous, one has to know how to stand out and what sets them apart. </p>
<p>“When I think of fabulousness, I think: What sets you apart from other people? I work with job seekers, so I think: What sets you apart from other job seekers or other applicants?” </p>
<p> </p>
<p>When you look at standing out in a job interview, what are some of the key components that go into that?</p>
<p>Many job seekers that Kyle works with have the skills, meet the position requirements, show up for the interview, and still struggle with getting a job in tech. While this can happen for a variety of reasons, Kyle explains that a simple mistake job hunters are making is regurgitating their resume without backing up their experience. A strong story about the experiences you had and the value you delivered makes you memorable and explains what you can provide.</p>
<p>“When you're doing this, you want to think in the mind of a hiring manager. How have you added value to the organization? What sets you apart? I didn't just code, I didn't just have cross functional collaboration, here's the value to the organization and what sets me apart.”</p>
<p> </p>
<p>How do you coach someone through being able to tell their story in an interview?</p>
<p>Career storytelling skills separate a potential employee from a pack of qualified applicants. However, a lot of technical people aren’t known for their storytelling skills or knack for creativity. Instead, Kyle recommends his clients in tech and cyber practice their storytelling through a more familiar world of spreadsheets. Each spreadsheet helps job seekers break down the value they bring with their skills, so they can tell a story that connects their past experiences to their future position.</p>
<p>“A lot of the people I work with in tech, they're amazing at their job, but they're just not used to practicing storytelling…It feels awkward. It feels different. It feels weird, because that's not something they’re used to.”</p>
<p> </p>
<p>From your experience, what have been the easiest and hardest fields in technology to break into?</p>
<p>In Kyle’s opinion, there isn’t one field of the tech industry that’s easier or harder to break into. Instead, breaking into the tech industry relies more on professional experiences, background, and skillset. If the leap to tech feels like too many transitions at once, Kyle recommends slowing down to one transition at a time and building each experience off of one another. Instead of hiding that this may be a new path for you, embrace your past when job searching and explain why a potential employer should hire someone transitioning into the tech world.</p>
<p>“Everyone's like, ‘Kyle, how do I get a job in tech?’ I would start with your background, and I think that's gonna determine what's easiest or hardest for the person. What I always recommend is, try to make the least amount of transitions possible.” </p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Kyle Elliott on <a href='https://www.linkedin.com/in/kylecromerelliott/'>LinkedIn</a> and <a href='https://caffeinatedkyle.com'>the Caffeinated Kyle website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Kyle Elliott, the Founder and Career Coach behind CaffeinatedKyle.com, joins the pod on his quest to transform boring job searches into something fabulous. Kyle specializes in helping job seekers, especially those in technology and cybersecurity, find jobs they love and express the value they bring to potential employers. Need to know the secret to acing your next tech job interview? Look no further than Caffeinated Kyle.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Finding your own definition of fabulous</p>
<p>[06:06] Standing out in a tech job interview</p>
<p>[12:19] Dealing with and learning from job rejection</p>
<p>[16:41] Targeting your dream tech job & telling your career story</p>
<p>[21:33] Breaking into technology the easy way and the hard way</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!<br>
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





<p><br>
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>From your perspective, what makes someone fabulous?</p>
<p>Being “fabulous” can sound grandiose to most tech practitioners, but Kyle believes that everyone has the potential to be fabulous, especially when they’re forging their career path. There’s a lot of competition amongst large tech companies to find the employees that close skill gaps and stand out from the massive group of hungry job seekers. To be fabulous, one has to know how to stand out and what sets them apart. </p>
<p><em>“When I think of fabulousness, I think: What sets you apart from other people? I work with job seekers, so I think: What sets you apart from other job seekers or other applicants?” </em></p>
<p> </p>
<p>When you look at standing out in a job interview, what are some of the key components that go into that?</p>
<p>Many job seekers that Kyle works with have the skills, meet the position requirements, show up for the interview, and still struggle with getting a job in tech. While this can happen for a variety of reasons, Kyle explains that a simple mistake job hunters are making is regurgitating their resume without backing up their experience. A strong story about the experiences you had and the value you delivered makes you memorable and explains what you can provide.</p>
<p><em>“When you're doing this, you want to think in the mind of a hiring manager. How have you added value to the organization? What sets you apart? I didn't just code, I didn't just have cross functional collaboration, here's the value to the organization and what sets me apart.”</em></p>
<p> </p>
<p>How do you coach someone through being able to tell their story in an interview?</p>
<p>Career storytelling skills separate a potential employee from a pack of qualified applicants. However, a lot of technical people aren’t known for their storytelling skills or knack for creativity. Instead, Kyle recommends his clients in tech and cyber practice their storytelling through a more familiar world of spreadsheets. Each spreadsheet helps job seekers break down the value they bring with their skills, so they can tell a story that connects their past experiences to their future position.</p>
<p><em>“A lot of the people I work with in tech, they're amazing at their job, but they're just not used to practicing storytelling…It feels awkward. It feels different. It feels weird, because that's not something they’re used to.”</em></p>
<p> </p>
<p>From your experience, what have been the easiest and hardest fields in technology to break into?</p>
<p>In Kyle’s opinion, there isn’t one field of the tech industry that’s easier or harder to break into. Instead, breaking into the tech industry relies more on professional experiences, background, and skillset. If the leap to tech feels like too many transitions at once, Kyle recommends slowing down to one transition at a time and building each experience off of one another. Instead of hiding that this may be a new path for you, embrace your past when job searching and explain why a potential employer should hire someone transitioning into the tech world.</p>
<p><em>“Everyone's like, ‘Kyle, how do I get a job in tech?’ I would start with your background, and I think that's gonna determine what's easiest or hardest for the person. What I always recommend is, try to make the least amount of transitions possible.” </em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Kyle Elliott on <a href='https://www.linkedin.com/in/kylecromerelliott/'>LinkedIn</a> and <a href='https://caffeinatedkyle.com'>the Caffeinated Kyle website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jicih6/HVS_audio_Kyle_Elliot_v26ku46.mp3" length="36295473" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Kyle Elliott, the Founder and Career Coach behind CaffeinatedKyle.com, joins the pod on his quest to transform boring job searches into something fabulous. Kyle specializes in helping job seekers, especially those in technology and cybersecurity, find jobs they love and express the value they bring to potential employers. Need to know the secret to acing your next tech job interview? Look no further than Caffeinated Kyle.
 
Timecoded Guide:
[00:00] Finding your own definition of fabulous
[06:06] Standing out in a tech job interview
[12:19] Dealing with and learning from job rejection
[16:41] Targeting your dream tech job & telling your career story
[21:33] Breaking into technology the easy way and the hard way
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley





With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: uptycs.com. 
 
From your perspective, what makes someone fabulous?
Being “fabulous” can sound grandiose to most tech practitioners, but Kyle believes that everyone has the potential to be fabulous, especially when they’re forging their career path. There’s a lot of competition amongst large tech companies to find the employees that close skill gaps and stand out from the massive group of hungry job seekers. To be fabulous, one has to know how to stand out and what sets them apart. 
“When I think of fabulousness, I think: What sets you apart from other people? I work with job seekers, so I think: What sets you apart from other job seekers or other applicants?” 
 
When you look at standing out in a job interview, what are some of the key components that go into that?
Many job seekers that Kyle works with have the skills, meet the position requirements, show up for the interview, and still struggle with getting a job in tech. While this can happen for a variety of reasons, Kyle explains that a simple mistake job hunters are making is regurgitating their resume without backing up their experience. A strong story about the experiences you had and the value you delivered makes you memorable and explains what you can provide.
“When you're doing this, you want to think in the mind of a hiring manager. How have you added value to the organization? What sets you apart? I didn't just code, I didn't just have cross functional collaboration, here's the value to the organization and what sets me apart.”
 
How do you coach someone through being able to tell their story in an interview?
Career storytelling skills separate a potential employee from a pack of qualified applicants. However, a lot of technical people aren’t known for their storytelling skills or knack for creativity. Instead, Kyle recommends his clients in tech and cyber practice their storytelling through a more familiar world of spreadsheets. Each spreadsheet helps job seekers break down the value they bring with their skills, so they can tell a story that connects their past experiences to their future position.
“A lot of the people I work with in tech, they're amazing at their job, but they're just not used to practicing storytelling…It feels awkward. It feels different. It feels weird, because that's not something they’re used to.”
 
From your experience, what have been the easiest and hardest fields in technology to break into?
In Kyle’s opinion, there isn’t one field of the tech industry that’s easier or harder to break into. Instead, breaking into the tech industry relies more on professional experiences, background, and skillset. If the leap to tech feels like too many transitions at once, Kyle recommends slowing down to one transition at a time and building eac]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1511</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>232</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Unlocking Cyber Education with John Hammond</title>
        <itunes:title>Unlocking Cyber Education with John Hammond</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/unlocking-cyber-education-with-john-hammond/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/unlocking-cyber-education-with-john-hammond/#comments</comments>        <pubDate>Thu, 25 Aug 2022 12:44:56 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/59726943-bc5e-3a6c-91a5-e1a5586a4601</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective.</p>
<p class="x-scope qowt-word-para-0">Timecode Guide:</p>
<p class="x-scope qowt-word-para-0">[01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content</p>
<p class="x-scope qowt-word-para-0">[06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success”</p>
<p class="x-scope qowt-word-para-0">[13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches</p>
<p class="x-scope qowt-word-para-0">[16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team</p>
<p class="x-scope qowt-word-para-0">[21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands”</p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>
<p>
PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>


 


<p class="x-scope qowt-word-para-1">What is your origin story for wanting to educate other hackers?</p>
<p class="x-scope qowt-word-para-0">Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience.</p>
<p class="x-scope qowt-word-para-2">“Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">What feelings do you get looking back on the YouTube content you’ve created so far?</p>
<p class="x-scope qowt-word-para-0">John prioritizes clarity, transparency, and honesty in what he does, and he’s not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he’s showing in his videos, he prefers to keep things honest, to show where he’s made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work.</p>
<p class="x-scope qowt-word-para-2">“I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It’s not all sexy, there’s a lot of failure in hacking.”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Have you ever considered focusing on the blue team or the defensive side of cybersecurity?</p>
<p class="x-scope qowt-word-para-0">The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John’s own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team.</p>
<p class="x-scope qowt-word-para-2">“We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">What advice do you have for red team content creators that want to share content and spread awareness safely?</p>
<p class="x-scope qowt-word-para-0">With the impact that he’s had and the content he’s put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before.</p>


 


<p class="x-scope qowt-word-para-0">Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone.</p>
<p class="x-scope qowt-word-para-2">“Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.”</p>
<p class="x-scope qowt-word-para-0">----------</p>
<p class="x-scope qowt-word-para-1">Links:</p>
<p class="x-scope qowt-word-para-0">Check out our guest, John Hammond, on <a href='https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw'>YouTube</a> and <a href='https://www.linkedin.com/in/johnhammond010/'>LinkedIn</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a>.</p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a>.</p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a>.</p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective.</p>
<p class="x-scope qowt-word-para-0">Timecode Guide:</p>
<p class="x-scope qowt-word-para-0">[01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content</p>
<p class="x-scope qowt-word-para-0">[06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success”</p>
<p class="x-scope qowt-word-para-0">[13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches</p>
<p class="x-scope qowt-word-para-0">[16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team</p>
<p class="x-scope qowt-word-para-0">[21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands”</p>
<p class="x-scope qowt-word-para-0">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a><br>
<p><br>
PlexTrac is pleased to offer an exclusive <em>Red Team Content Bundle</em> for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>


 


<p class="x-scope qowt-word-para-1">What is your origin story for wanting to educate other hackers?</p>
<p class="x-scope qowt-word-para-0">Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience.</p>
<p class="x-scope qowt-word-para-2">“Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">What feelings do you get looking back on the YouTube content you’ve created so far?</p>
<p class="x-scope qowt-word-para-0">John prioritizes clarity, transparency, and honesty in what he does, and he’s not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he’s showing in his videos, he prefers to keep things honest, to show where he’s made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work.</p>
<p class="x-scope qowt-word-para-2">“I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It’s not all sexy, there’s a lot of failure in hacking.”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Have you ever considered focusing on the blue team or the defensive side of cybersecurity?</p>
<p class="x-scope qowt-word-para-0">The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John’s own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team.</p>
<p class="x-scope qowt-word-para-2">“We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">What advice do you have for red team content creators that want to share content and spread awareness safely?</p>
<p class="x-scope qowt-word-para-0">With the impact that he’s had and the content he’s put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before.</p>


 


<p class="x-scope qowt-word-para-0">Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone.</p>
<p class="x-scope qowt-word-para-2">“Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.”</p>
<p class="x-scope qowt-word-para-0">----------</p>
<p class="x-scope qowt-word-para-1">Links:</p>
<p class="x-scope qowt-word-para-0">Check out our guest, John Hammond, on <a href='https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw'>YouTube</a> and <a href='https://www.linkedin.com/in/johnhammond010/'>LinkedIn</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com/'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a>.</p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on <a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a>.</p>
<p class="x-scope qowt-word-para-0">Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a>.</p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3h2uhs/HVR_for_HVS_Ep_5bae4n.mp3" length="27520896" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective.
Timecode Guide:
[01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content
[06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success”
[13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches
[16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team
[21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands”
Sponsor Links:
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalleyPlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!


 


What is your origin story for wanting to educate other hackers?
Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience.
“Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.”
 
What feelings do you get looking back on the YouTube content you’ve created so far?
John prioritizes clarity, transparency, and honesty in what he does, and he’s not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he’s showing in his videos, he prefers to keep things honest, to show where he’s made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work.
“I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It’s not all sexy, there’s a lot of failure in hacking.”
 
Have you ever considered focusing on the blue team or the defensive side of cybersecurity?
The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John’s own videos, he ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1715</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>237</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>A Solopreneur’s First Imperfect Step with Claire Gallagher</title>
        <itunes:title>A Solopreneur’s First Imperfect Step with Claire Gallagher</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/a-solopreneur-s-first-imperfect-step-with-claire-gallagher/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/a-solopreneur-s-first-imperfect-step-with-claire-gallagher/#comments</comments>        <pubDate>Tue, 23 Aug 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/87bd7803-61dd-3e40-8867-dbc8498d6935</guid>
                                    <description><![CDATA[<p>Claire Gallagher, Designer and Solopreneur Strategist, comes to Hacker Valley to break down branding, visibility, and choosing solopreneurship over business ownership. Combining the terms solo and entrepreneur, solopreneurs are a different breed of business owner, and Claire has made it her mission to help them not make the same business mistakes she once made. Claire walks through the essentials of how her business caters to individuals looking to go it alone and how to make an impact while staying small. 

</p>
<p>Timecoded Guide:</p>
<p>[00:00] Introducing the concept of solopreneurship</p>
<p>[04:32] Shifting to business strategy to better serve a client base</p>
<p>[09:19] Deciding alone as a solo entrepreneur</p>
<p>[16:40] Pricing your work and validating your professional value</p>
<p>[24:46] Making peace with looking silly as a business owner</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





 
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>Why did you choose to go down a path of catering to solopreneurs, versus working with enterprises or small and medium businesses?</p>
<p>Claire has dabbled in building teams and working in larger businesses in the past, but her calling has always brought her back to a company of one. For solopreneurs, Claire explains, it’s not that they cannot afford hiring employees or scaling their business. Instead, a solopreneur’s focus is on the balance between work and life, along with the power and experience to make their own decisions about their business. </p>
<p>“I'm a loud introvert. I could talk all day, but essentially, I'm kind of introverted in secret. Generally, I like to work alone, to get into a creative flow, to not have anybody to answer to. This company of one, this solopreneurship, it suits my energy and my temperament.”</p>
<p> </p>
<p>What are some of the pros and cons of going it alone as a solopreneur and keeping your business small? </p>
<p>There are pros and cons in business, no matter the size. Claire’s strongest pro for becoming a solo entrepreneur has been her ability to pivot without impacting anyone but herself. Pivoting towards strategy was a hard decision, but it was so much easier to make on her own. Unfortunately, making decisions on one’s own can also be a con of solopreneurship. Claire has seen clients have a lack of accountability in sticking with their decisions when they don’t have anyone working with them.</p>
<p>“That's a pro, I was able to pivot without having to hire people, sack people, and really invest heavily in changing everything. That's a real plus, I could just pivot like that and it was a decision that I made, and I was responsible for it.” </p>
<p> </p>
<p>At what point would you recommend a solopreneur, or content creator, to reach out to someone like you so they could shine in this digital world?</p>
<p>Although solo entrepreneurs thrive in business on their own, it’s important to never go it alone. Claire advises that early stage solopreneurs consider the community around them and build their business with a healthy curiosity in books, online resources, and virtual communities of fellow entrepreneurs. As they progress through their business, Claire also recommends connecting with a coach or strategist, like herself, to go further faster and avoid careless mistakes.</p>
<p>“Solopreneurs think, ‘I'm smart, I can figure this out.’ Yes, you can, but to go further faster, I think you need to work with a mentor or a coach or strategist. You're always going to get further faster by finding somebody who understands what you're trying to achieve.”</p>
<p> </p>
<p>What are some of the tenants that you teach people about coming across as authentically as possible?</p>
<p>Branding is a vital element of content creation and business ownership. However, the current world craves branding that comes across as authentic. Claire explains that authenticity comes from a willingness to make mistakes and put yourself out there, even if it feels or looks silly the first time. If a solopreneur is honestly trying to deliver value, that will show through any first-time awkwardness or silliness and still feel authentic to potential clients.</p>
<p>“Starting before you feel ready is really the only way that you can start because you can't know everything until you've tried some stuff. Showing up and making mistakes and maybe seeming a little bit foolish at the start, take it. That's what's gonna happen.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Claire Gallagher on <a href='https://www.linkedin.com/in/claire-gallagher-45939422/'>LinkedIn</a> and at <a href='https://clairecreative.com'>ClaireCreative.com</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Claire Gallagher, Designer and Solopreneur Strategist, comes to Hacker Valley to break down branding, visibility, and choosing solopreneurship over business ownership. Combining the terms solo and entrepreneur, solopreneurs are a different breed of business owner, and Claire has made it her mission to help them not make the same business mistakes she once made. Claire walks through the essentials of how her business caters to individuals looking to go it alone and how to make an impact while staying small. <br>
<br>
</p>
<p>Timecoded Guide:</p>
<p>[00:00] Introducing the concept of solopreneurship</p>
<p>[04:32] Shifting to business strategy to better serve a client base</p>
<p>[09:19] Deciding alone as a solo entrepreneur</p>
<p>[16:40] Pricing your work and validating your professional value</p>
<p>[24:46] Making peace with looking silly as a business owner</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!<br>
</p>





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at <a href='http://axonius.com/hackervalley'>axonius.com/hackervalley</a>





 
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>Why did you choose to go down a path of catering to solopreneurs, versus working with enterprises or small and medium businesses?</p>
<p>Claire has dabbled in building teams and working in larger businesses in the past, but her calling has always brought her back to a company of one. For solopreneurs, Claire explains, it’s not that they cannot afford hiring employees or scaling their business. Instead, a solopreneur’s focus is on the balance between work and life, along with the power and experience to make their own decisions about their business. </p>
<p><em>“I'm a loud introvert. I could talk all day, but essentially, I'm kind of introverted in secret. Generally, I like to work alone, to get into a creative flow, to not have anybody to answer to. This company of one, this solopreneurship, it suits my energy and my temperament.”</em></p>
<p> </p>
<p>What are some of the pros and cons of going it alone as a solopreneur and keeping your business small? </p>
<p>There are pros and cons in business, no matter the size. Claire’s strongest pro for becoming a solo entrepreneur has been her ability to pivot without impacting anyone but herself. Pivoting towards strategy was a hard decision, but it was so much easier to make on her own. Unfortunately, making decisions on one’s own can also be a con of solopreneurship. Claire has seen clients have a lack of accountability in sticking with their decisions when they don’t have anyone working with them.</p>
<p><em>“That's a pro, I was able to pivot without having to hire people, sack people, and really invest heavily in changing everything. That's a real plus, I could just pivot like that and it was a decision that I made, and I was responsible for it.” </em></p>
<p> </p>
<p>At what point would you recommend a solopreneur, or content creator, to reach out to someone like you so they could shine in this digital world?</p>
<p>Although solo entrepreneurs thrive in business on their own, it’s important to never go it alone. Claire advises that early stage solopreneurs consider the community around them and build their business with a healthy curiosity in books, online resources, and virtual communities of fellow entrepreneurs. As they progress through their business, Claire also recommends connecting with a coach or strategist, like herself, to go further faster and avoid careless mistakes.</p>
<p><em>“Solopreneurs think, ‘I'm smart, I can figure this out.’ Yes, you can, but to go further faster, I think you need to work with a mentor or a coach or strategist. You're always going to get further faster by finding somebody who understands what you're trying to achieve.”</em></p>
<p> </p>
<p>What are some of the tenants that you teach people about coming across as authentically as possible?</p>
<p>Branding is a vital element of content creation and business ownership. However, the current world craves branding that comes across as authentic. Claire explains that authenticity comes from a willingness to make mistakes and put yourself out there, even if it feels or looks silly the first time. If a solopreneur is honestly trying to deliver value, that will show through any first-time awkwardness or silliness and still feel authentic to potential clients.</p>
<p><em>“Starting before you feel ready is really the only way that you can start because you can't know everything until you've tried some stuff. Showing up and making mistakes and maybe seeming a little bit foolish at the start, take it. That's what's gonna happen.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Claire Gallagher on <a href='https://www.linkedin.com/in/claire-gallagher-45939422/'>LinkedIn</a> and at <a href='https://clairecreative.com'>ClaireCreative.com</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ezx9zj/HVS_audio_Claire_Gallagher_v27cv3o.mp3" length="43686600" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Claire Gallagher, Designer and Solopreneur Strategist, comes to Hacker Valley to break down branding, visibility, and choosing solopreneurship over business ownership. Combining the terms solo and entrepreneur, solopreneurs are a different breed of business owner, and Claire has made it her mission to help them not make the same business mistakes she once made. Claire walks through the essentials of how her business caters to individuals looking to go it alone and how to make an impact while staying small. 
Timecoded Guide:
[00:00] Introducing the concept of solopreneurship
[04:32] Shifting to business strategy to better serve a client base
[09:19] Deciding alone as a solo entrepreneur
[16:40] Pricing your work and validating your professional value
[24:46] Making peace with looking silly as a business owner
 
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!





The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley





 
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: uptycs.com. 
 
Why did you choose to go down a path of catering to solopreneurs, versus working with enterprises or small and medium businesses?
Claire has dabbled in building teams and working in larger businesses in the past, but her calling has always brought her back to a company of one. For solopreneurs, Claire explains, it’s not that they cannot afford hiring employees or scaling their business. Instead, a solopreneur’s focus is on the balance between work and life, along with the power and experience to make their own decisions about their business. 
“I'm a loud introvert. I could talk all day, but essentially, I'm kind of introverted in secret. Generally, I like to work alone, to get into a creative flow, to not have anybody to answer to. This company of one, this solopreneurship, it suits my energy and my temperament.”
 
What are some of the pros and cons of going it alone as a solopreneur and keeping your business small? 
There are pros and cons in business, no matter the size. Claire’s strongest pro for becoming a solo entrepreneur has been her ability to pivot without impacting anyone but herself. Pivoting towards strategy was a hard decision, but it was so much easier to make on her own. Unfortunately, making decisions on one’s own can also be a con of solopreneurship. Claire has seen clients have a lack of accountability in sticking with their decisions when they don’t have anyone working with them.
“That's a pro, I was able to pivot without having to hire people, sack people, and really invest heavily in changing everything. That's a real plus, I could just pivot like that and it was a decision that I made, and I was responsible for it.” 
 
At what point would you recommend a solopreneur, or content creator, to reach out to someone like you so they could shine in this digital world?
Although solo entrepreneurs thrive in business on their own, it’s important to never go it alone. Claire advises that early stage solopreneurs consider the community around them and build their business with a healthy curiosity in books, online resources, and virtual communities of fellow entrepreneurs. As they progress through their business, Claire also recommends connecting with a coach or strategist, like herself, to go further faster and avoid careless mistakes.
“Solopreneurs think, ‘I'm smart, I can figure this out.’ Yes, you can, but to go further faster, I think you need to work with a mentor or a coach or strategist. You're always going to get further faster by finding somebody who understands what you're trying to achieve.”
 
What are some of the tenants that you teach people about coming across as authentically as]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1817</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>231</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Purposeful Communication Through PlexTrac with Dan DeCloss</title>
        <itunes:title>Purposeful Communication Through PlexTrac with Dan DeCloss</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/purposeful-communication-through-plextrac-with-dan-decloss/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/purposeful-communication-through-plextrac-with-dan-decloss/#comments</comments>        <pubDate>Thu, 18 Aug 2022 10:40:53 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a8f64bf7-ed5b-3cc5-9cda-30142049daff</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">We’re joined by sponsor and guest Dan DeCloss, CEO and Founder of PlexTrac, on the podcast today to talk about communication and collaboration between the red and blue side of cybersecurity and why security success depends on those two sides working together. On their mission to build stronger, more productive, and well-rounded security teams, PlexTrac provides incredible and insightful metric and messaging tools that change the game for the cybersecurity industry.</p>
<p class="x-scope qowt-word-para-1">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[05:36] Understanding PlexTrac’s history and mission for cybersecurity teams</p>
<p class="x-scope qowt-word-para-0">[09:58] Lack of empathy and understanding in red team and blue team communication</p>
<p class="x-scope qowt-word-para-0">[18:48] Breaking through the resentment and confusion within a team</p>
<p class="x-scope qowt-word-para-0">[24:45] Envisioning the future of PlexTrac’s community impact</p>
<p class="x-scope qowt-word-para-0">[27:52] Caring about your cybersecurity mission beyond yourself</p>
<p class="x-scope qowt-word-para-1">Sponsors:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='https://www.axonius.com/simonebiles?utm_campaign=Podcast%20Sponsorship&utm_source=referral&utm_medium=podcast&utm_content=hvs'>axonius.com/simone</a></p>


PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!


<p class="x-scope qowt-word-para-0">
What is the function of PlexTrac that would help you the most as a pen tester?</p>
<p class="x-scope qowt-word-para-0">With prior hands-on experience on the red side, Dan found his journey to creating PlexTrac to be full of moments where he wanted to fix the same problems he encountered over and over with reporting and communicating. One of these problems was solved easily with the addition of a video feature, a simple function that has existed since PlexTrac first began but is instrumental and is a huge time-saver for visual learners.</p>
<p class="x-scope qowt-word-para-0">“As a pen tester, I hated finding that I had 20-odd screenshots if it's a pretty complex exploit. I think the adage for us is like, if a picture's worth 1,000 words, then a video is worth 1,000 pictures, right?”</p>
<p class="x-scope qowt-word-para-0">
What do you think are some of the gaps in skills that organizations face when hiring these professionals to perform offensive operations?</p>
<p class="x-scope qowt-word-para-0">Communication is key— not just in life, but in this episode. While we’ve discussed skills gaps previously in cybersecurity, Dan is quick to point out that a consistent gap he sees in all areas of cybersecurity is effective communication. PlexTrac keeps this struggle to communicate in mind and creates easy, simple pathways and functions that encourage communication and facilitate collaborative problem solving.</p>
<p class="x-scope qowt-word-para-3">“If there's one area that I really emphasize with anybody that I'm mentoring or have hired in the past is, as a security person, whether you're red or blue, you really do need to be a good communicator and be able to communicate risk effectively within the right context.”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-0">What would you want to say to those folks that don't see eye-to-eye from the red or the blue side?</p>


 


<p class="x-scope qowt-word-para-0">We’re fighting the same fight, no matter if we’re on the red side or the blue side of cybersecurity. Dan’s message for our warring red and blue teams throughout the industry is to understand the importance of your mission and to not let relationships between red and blue feel clouded with misunderstanding or resentment. No one’s job is harder than anyone else’s, and each role on offensive and defensive plays a part in our collective victory.</p>
<p class="x-scope qowt-word-para-3">“I'm gonna just be point blank about it…Are you trying to just prove a point about your knowledge and your skills? Or, are you actually trying to make the world a safer place?”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-0">What would you want to say to all those folks out there [in cybersecurity]?</p>
<p class="x-scope qowt-word-para-0">As PlexTrac aims to make a huge impact on our community, Dan and his team acknowledge a need for a unified, focused, and collaborative cybersecurity industry, with hard workers on both the red and blue sides. With PlexTrac’s assistance in making reports, measurable results, and communication that much easier, our team at Hacker Valley is thankful to be a part of PlexTrac’s amazing network and can’t wait to share more tools like this with all of you.</p>
<p class="x-scope qowt-word-para-3">“I think keep fighting the good fight, for both sides, and recognizing that your mission is vital to the safety and security of your organization and the world at large, right? We are all in this battle together.”</p>
<p class="x-scope qowt-word-para-0">----------</p>
<p class="x-scope qowt-word-para-0">Links:</p>


 


<p class="x-scope qowt-word-para-0">Spend some time with our guest, Dan DeCloss, on<a href='https://www.linkedin.com/in/ddecloss/'> </a><a href='https://www.linkedin.com/in/ddecloss/'>LinkedIn</a>, and<a href='https://plextrac.com/hackervalley/'> </a><a href='https://plextrac.com/hackervalley/'>the PlexTrac website</a></p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on<a href='https://hackervalley.com'> </a><a href='https://hackervalley.com'>our website</a>,<a href='https://www.linkedin.com/company/hackervalleystudio/'> </a><a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>,<a href='https://www.instagram.com/hackervalleymedia/'> </a><a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and<a href='https://twitter.com/TheHackerValley'> </a><a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on Twitter and<a href='https://www.linkedin.com/in/ronaldeddings/'> </a>LinkedIn</p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on Twitter and<a href='https://www.linkedin.com/in/chrishvm/'> </a><a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">We’re joined by sponsor and guest Dan DeCloss, CEO and Founder of PlexTrac, on the podcast today to talk about communication and collaboration between the red and blue side of cybersecurity and why security success depends on those two sides working together. On their mission to build stronger, more productive, and well-rounded security teams, PlexTrac provides incredible and insightful metric and messaging tools that change the game for the cybersecurity industry.</p>
<p class="x-scope qowt-word-para-1">Timecoded Guide:</p>
<p class="x-scope qowt-word-para-0">[05:36] Understanding PlexTrac’s history and mission for cybersecurity teams</p>
<p class="x-scope qowt-word-para-0">[09:58] Lack of empathy and understanding in red team and blue team communication</p>
<p class="x-scope qowt-word-para-0">[18:48] Breaking through the resentment and confusion within a team</p>
<p class="x-scope qowt-word-para-0">[24:45] Envisioning the future of PlexTrac’s community impact</p>
<p class="x-scope qowt-word-para-0">[27:52] Caring about your cybersecurity mission beyond yourself</p>
<p class="x-scope qowt-word-para-1">Sponsors:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-0">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='https://www.axonius.com/simonebiles?utm_campaign=Podcast%20Sponsorship&utm_source=referral&utm_medium=podcast&utm_content=hvs'>axonius.com/simone</a></p>


PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!


<p class="x-scope qowt-word-para-0"><br>
What is the function of PlexTrac that would help you the most as a pen tester?</p>
<p class="x-scope qowt-word-para-0">With prior hands-on experience on the red side, Dan found his journey to creating PlexTrac to be full of moments where he wanted to fix the same problems he encountered over and over with reporting and communicating. One of these problems was solved easily with the addition of a video feature, a simple function that has existed since PlexTrac first began but is instrumental and is a huge time-saver for visual learners.</p>
<p class="x-scope qowt-word-para-0">“As a pen tester, I hated finding that I had 20-odd screenshots if it's a pretty complex exploit. I think the adage for us is like, if a picture's worth 1,000 words, then a video is worth 1,000 pictures, right?”</p>
<p class="x-scope qowt-word-para-0"><br>
What do you think are some of the gaps in skills that organizations face when hiring these professionals to perform offensive operations?</p>
<p class="x-scope qowt-word-para-0">Communication is key— not just in life, but in this episode. While we’ve discussed skills gaps previously in cybersecurity, Dan is quick to point out that a consistent gap he sees in all areas of cybersecurity is effective communication. PlexTrac keeps this struggle to communicate in mind and creates easy, simple pathways and functions that encourage communication and facilitate collaborative problem solving.</p>
<p class="x-scope qowt-word-para-3">“If there's one area that I really emphasize with anybody that I'm mentoring or have hired in the past is, as a security person, whether you're red or blue, you really do need to be a good communicator and be able to communicate risk effectively within the right context.”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-0">What would you want to say to those folks that don't see eye-to-eye from the red or the blue side?</p>


 


<p class="x-scope qowt-word-para-0">We’re fighting the same fight, no matter if we’re on the red side or the blue side of cybersecurity. Dan’s message for our warring red and blue teams throughout the industry is to understand the importance of your mission and to not let relationships between red and blue feel clouded with misunderstanding or resentment. No one’s job is harder than anyone else’s, and each role on offensive and defensive plays a part in our collective victory.</p>
<p class="x-scope qowt-word-para-3">“I'm gonna just be point blank about it…Are you trying to just prove a point about your knowledge and your skills? Or, are you actually trying to make the world a safer place?”</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-0">What would you want to say to all those folks out there [in cybersecurity]?</p>
<p class="x-scope qowt-word-para-0">As PlexTrac aims to make a huge impact on our community, Dan and his team acknowledge a need for a unified, focused, and collaborative cybersecurity industry, with hard workers on both the red and blue sides. With PlexTrac’s assistance in making reports, measurable results, and communication that much easier, our team at Hacker Valley is thankful to be a part of PlexTrac’s amazing network and can’t wait to share more tools like this with all of you.</p>
<p class="x-scope qowt-word-para-3">“I think keep fighting the good fight, for both sides, and recognizing that your mission is vital to the safety and security of your organization and the world at large, right? We are all in this battle together.”</p>
<p class="x-scope qowt-word-para-0">----------</p>
<p class="x-scope qowt-word-para-0">Links:</p>


 


<p class="x-scope qowt-word-para-0">Spend some time with our guest, Dan DeCloss, on<a href='https://www.linkedin.com/in/ddecloss/'> </a><a href='https://www.linkedin.com/in/ddecloss/'>LinkedIn</a>, and<a href='https://plextrac.com/hackervalley/'> </a><a href='https://plextrac.com/hackervalley/'>the PlexTrac website</a></p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on<a href='https://hackervalley.com'> </a><a href='https://hackervalley.com'>our website</a>,<a href='https://www.linkedin.com/company/hackervalleystudio/'> </a><a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>,<a href='https://www.instagram.com/hackervalleymedia/'> </a><a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and<a href='https://twitter.com/TheHackerValley'> </a><a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on Twitter and<a href='https://www.linkedin.com/in/ronaldeddings/'> </a>LinkedIn</p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochran on Twitter and<a href='https://www.linkedin.com/in/chrishvm/'> </a><a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/td6akc/HVR_for_HVS_Ep_49ylj3.mp3" length="34524672" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

We’re joined by sponsor and guest Dan DeCloss, CEO and Founder of PlexTrac, on the podcast today to talk about communication and collaboration between the red and blue side of cybersecurity and why security success depends on those two sides working together. On their mission to build stronger, more productive, and well-rounded security teams, PlexTrac provides incredible and insightful metric and messaging tools that change the game for the cybersecurity industry.
Timecoded Guide:
[05:36] Understanding PlexTrac’s history and mission for cybersecurity teams
[09:58] Lack of empathy and understanding in red team and blue team communication
[18:48] Breaking through the resentment and confusion within a team
[24:45] Envisioning the future of PlexTrac’s community impact
[27:52] Caring about your cybersecurity mission beyond yourself
Sponsors:
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone


PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!


What is the function of PlexTrac that would help you the most as a pen tester?
With prior hands-on experience on the red side, Dan found his journey to creating PlexTrac to be full of moments where he wanted to fix the same problems he encountered over and over with reporting and communicating. One of these problems was solved easily with the addition of a video feature, a simple function that has existed since PlexTrac first began but is instrumental and is a huge time-saver for visual learners.
“As a pen tester, I hated finding that I had 20-odd screenshots if it's a pretty complex exploit. I think the adage for us is like, if a picture's worth 1,000 words, then a video is worth 1,000 pictures, right?”
What do you think are some of the gaps in skills that organizations face when hiring these professionals to perform offensive operations?
Communication is key— not just in life, but in this episode. While we’ve discussed skills gaps previously in cybersecurity, Dan is quick to point out that a consistent gap he sees in all areas of cybersecurity is effective communication. PlexTrac keeps this struggle to communicate in mind and creates easy, simple pathways and functions that encourage communication and facilitate collaborative problem solving.
“If there's one area that I really emphasize with anybody that I'm mentoring or have hired in the past is, as a security person, whether you're red or blue, you really do need to be a good communicator and be able to communicate risk effectively within the right context.”
 
What would you want to say to those folks that don't see eye-to-eye from the red or the blue side?


 


We’re fighting the same fight, no matter if we’re on the red side or the blue side of cybersecurity. Dan’s message for our warring red and blue teams throughout the industry is to understand the importance of your mission and to not let relationships between red and blue feel clouded with misunderstanding or resentment. No one’s job is harder than anyone else’s, and each role on offensive and defensive plays a part in our collective victory.
“I'm gonna just be point blank about it…Are you trying to just prove a point about your knowledge and your skills? Or, are you actually trying to make the world a safer place?”
 
What would you want to say to all those folks out there [in cybersecurity]?
As PlexTrac aims to make a huge impact on our community, Dan and his team acknowledge a need for a unified, focused, and collaborative cybers]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2153</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>235</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Confident Communication through Storytelling with Anne Ricketts</title>
        <itunes:title>Confident Communication through Storytelling with Anne Ricketts</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/confident-communication-through-storytelling-with-anne-ricketts/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/confident-communication-through-storytelling-with-anne-ricketts/#comments</comments>        <pubDate>Tue, 16 Aug 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8a9affe7-d756-3421-813f-1eaa807260ce</guid>
                                    <description><![CDATA[<p>Anne Ricketts, Founder & Principal of Lighthouse Communications, brings her techniques for public speaking and presenting to the show to help Chris and Ron unpack unhelpful mindsets around storytelling and unhealthy speaking habits. Covering the basics from filler words to hand gestures, eye contact to working the camera, Anne explains the role storytelling plays in the way people communicate at the office, out in public in their free time, virtually on Zoom, and even onstage at events like TEDx. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Why Anne became a communication coach </p>
<p>[05:16] How COVID impacted public speaking and presentations</p>
<p>[12:57] Why you shouldn’t stop hand gesturing</p>
<p>[18:38] How to stop saying “um”, “like,” “so,” and other filler words</p>
<p>[22:45] What makes storytelling an essential career communication tool</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Complexity is increasing and manual asset inventory approaches no longer cut it. That's where Axonius comes in. Take control of security complexities by uncovering gaps in your organization. Sign up for a free walk through of the platform at <a href='https://www.axonius.com/live-demo?utm_campaign=Podcast%20Sponsorship&utm_source=referral&utm_medium=podcast&utm_content=hvs'>axonius.com/get-a-tour</a> </p>
<p>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>Why was communication coaching your chosen profession?</p>
<p>Anne wasn’t always a communication coach, but she’s always been passionate about helping others speak. In fact, prior to 2013, Anne taught English as a second language to a variety of people, first in Italy, then in San Francisco. When Anne founded Lighthouse Communications, her goal was to help everyone, English speaking or not, communicate efficiently and confidently. Speaking skills and storytelling talent can open up a world of opportunities for anyone, and Anne is excited that she can help others unlock their potential everyday. </p>
<p>“I really like helping people because there's so many small things you can do to look more confident, like the way you stand or projecting your voice. If you look more confident, you start to feel more confident.” </p>
<p> </p>
<p>In the past two years, because of the pandemic, what have been the ways that you've seen communication coaching change?</p>
<p>With so few events and courses happening in-person, Anne had to shift her mindset around coaching and her advice she gives to clients. Virtual presentation unlocked a new world of communication, but comes with new rules and a learning curve. Thankfully, Anne has learned to love the world of virtual and believes that when professionals give their all to connecting with their audience, amazing communication can still occur, even from long distances away.</p>
<p>“Normally, when teaching a class, you can see if someone's struggling or confused, you can walk over and connect with them. Everything was happening so fast in the Zoom room, I personally felt like I started from scratch.”</p>
<p> </p>
<p>How could someone who isn't the biggest fan of small talk reset and reframe small talk in a way that's valuable for them?</p>
<p>Networking and communicating can feel like a chore, especially when small talk is involved. Anne believes that small talk, as awkward and boring as it may be, allows professionals an amazing opportunity to practice connecting with others on a small scale and hone their listening and storytelling skills. Ask curious questions to connect with others during small talk moments, and don’t fear the occasional awkwardness that comes with meeting someone new.</p>
<p>“If you want to be good at small talk, it's just being curious. Asking questions like, ‘Hey, what's that in your background?,’ or in person, ‘Tell me more about yourself. Oh, interesting. Where did you go to school?’ Asking specific follow up questions and just being curious.”</p>
<p> </p>
<p>What advice would you have for anyone that has impactful details to share, but doesn't really know how to make it into a story?</p>
<p>Storytelling is one of the most valuable skills a professional can learn, according to Anne. Stories allow us an opportunity to connect with others emotionally and mentally, and can even inspire someone to action with the power of simple words. Anne’s biggest advice around the art of storytelling is to practice. Listen to the stories others tell, build your experiences around a framework that feels personally right to you, and practice, practice, practice.  </p>
<p>“What makes for a good story is tension, emotion. We want to know what was going through your head during that security hack, what was the reaction, what was at stake, and that's not necessarily, on an everyday basis, how we're trained to speak at work.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Anne Ricketts on <a href='https://www.linkedin.com/in/anne-ricketts-613b4810/'>LinkedIn</a></p>
<p>Check out Lighthouse Communications on <a href='https://www.linkedin.com/company/lhctraining/'>LinkedIn</a> and <a href='https://www.lhctraining.com/team'>their website</a></p>
<p><a href='https://www.youtube.com/watch?v=xDI32BRr2pY'>https://www.youtube.com/watch?v=xDI32BRr2pY</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Anne Ricketts, Founder & Principal of Lighthouse Communications, brings her techniques for public speaking and presenting to the show to help Chris and Ron unpack unhelpful mindsets around storytelling and unhealthy speaking habits. Covering the basics from filler words to hand gestures, eye contact to working the camera, Anne explains the role storytelling plays in the way people communicate at the office, out in public in their free time, virtually on Zoom, and even onstage at events like TEDx. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Why Anne became a communication coach </p>
<p>[05:16] How COVID impacted public speaking and presentations</p>
<p>[12:57] Why you shouldn’t stop hand gesturing</p>
<p>[18:38] How to stop saying “um”, “like,” “so,” and other filler words</p>
<p>[22:45] What makes storytelling an essential career communication tool</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Complexity is increasing and manual asset inventory approaches no longer cut it. That's where Axonius comes in. Take control of security complexities by uncovering gaps in your organization. Sign up for a free walk through of the platform at <a href='https://www.axonius.com/live-demo?utm_campaign=Podcast%20Sponsorship&utm_source=referral&utm_medium=podcast&utm_content=hvs'>axonius.com/get-a-tour</a> </p>
<p><br>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>Why was communication coaching your chosen profession?</p>
<p>Anne wasn’t always a communication coach, but she’s always been passionate about helping others speak. In fact, prior to 2013, Anne taught English as a second language to a variety of people, first in Italy, then in San Francisco. When Anne founded Lighthouse Communications, her goal was to help everyone, English speaking or not, communicate efficiently and confidently. Speaking skills and storytelling talent can open up a world of opportunities for anyone, and Anne is excited that she can help others unlock their potential everyday. </p>
<p><em>“I really like helping people because there's so many small things you can do to look more confident, like the way you stand or projecting your voice. If you look more confident, you start to feel more confident.” </em></p>
<p> </p>
<p>In the past two years, because of the pandemic, what have been the ways that you've seen communication coaching change?</p>
<p>With so few events and courses happening in-person, Anne had to shift her mindset around coaching and her advice she gives to clients. Virtual presentation unlocked a new world of communication, but comes with new rules and a learning curve. Thankfully, Anne has learned to love the world of virtual and believes that when professionals give their all to connecting with their audience, amazing communication can still occur, even from long distances away.</p>
<p><em>“Normally, when teaching a class, you can see if someone's struggling or confused, you can walk over and connect with them. Everything was happening so fast in the Zoom room, I personally felt like I started from scratch.”</em></p>
<p> </p>
<p>How could someone who isn't the biggest fan of small talk reset and reframe small talk in a way that's valuable for them?</p>
<p>Networking and communicating can feel like a chore, especially when small talk is involved. Anne believes that small talk, as awkward and boring as it may be, allows professionals an amazing opportunity to practice connecting with others on a small scale and hone their listening and storytelling skills. Ask curious questions to connect with others during small talk moments, and don’t fear the occasional awkwardness that comes with meeting someone new.</p>
<p><em>“If you want to be good at small talk, it's just being curious. Asking questions like, ‘Hey, what's that in your background?,’ or in person, ‘Tell me more about yourself. Oh, interesting. Where did you go to school?’ Asking specific follow up questions and just being curious.”</em></p>
<p> </p>
<p>What advice would you have for anyone that has impactful details to share, but doesn't really know how to make it into a story?</p>
<p>Storytelling is one of the most valuable skills a professional can learn, according to Anne. Stories allow us an opportunity to connect with others emotionally and mentally, and can even inspire someone to action with the power of simple words. Anne’s biggest advice around the art of storytelling is to practice. Listen to the stories others tell, build your experiences around a framework that feels personally right to you, and practice, practice, practice.  </p>
<p><em>“What makes for a good story is tension, emotion. We want to know what was going through your head during that security hack, what was the reaction, what was at stake, and that's not necessarily, on an everyday basis, how we're trained to speak at work.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Anne Ricketts on <a href='https://www.linkedin.com/in/anne-ricketts-613b4810/'>LinkedIn</a></p>
<p>Check out Lighthouse Communications on <a href='https://www.linkedin.com/company/lhctraining/'>LinkedIn</a> and <a href='https://www.lhctraining.com/team'>their website</a></p>
<p><a href='https://www.youtube.com/watch?v=xDI32BRr2pY'>https://www.youtube.com/watch?v=xDI32BRr2pY</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/a8js3d/HVS_audio_Anne_Rickketts_V39o754.mp3" length="43970828" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Anne Ricketts, Founder & Principal of Lighthouse Communications, brings her techniques for public speaking and presenting to the show to help Chris and Ron unpack unhelpful mindsets around storytelling and unhealthy speaking habits. Covering the basics from filler words to hand gestures, eye contact to working the camera, Anne explains the role storytelling plays in the way people communicate at the office, out in public in their free time, virtually on Zoom, and even onstage at events like TEDx. 
 
Timecoded Guide:
[00:00] Why Anne became a communication coach 
[05:16] How COVID impacted public speaking and presentations
[12:57] Why you shouldn’t stop hand gesturing
[18:38] How to stop saying “um”, “like,” “so,” and other filler words
[22:45] What makes storytelling an essential career communication tool
 
Sponsor Links:
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Complexity is increasing and manual asset inventory approaches no longer cut it. That's where Axonius comes in. Take control of security complexities by uncovering gaps in your organization. Sign up for a free walk through of the platform at axonius.com/get-a-tour 
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at academy.attackiq.com
 
Why was communication coaching your chosen profession?
Anne wasn’t always a communication coach, but she’s always been passionate about helping others speak. In fact, prior to 2013, Anne taught English as a second language to a variety of people, first in Italy, then in San Francisco. When Anne founded Lighthouse Communications, her goal was to help everyone, English speaking or not, communicate efficiently and confidently. Speaking skills and storytelling talent can open up a world of opportunities for anyone, and Anne is excited that she can help others unlock their potential everyday. 
“I really like helping people because there's so many small things you can do to look more confident, like the way you stand or projecting your voice. If you look more confident, you start to feel more confident.” 
 
In the past two years, because of the pandemic, what have been the ways that you've seen communication coaching change?
With so few events and courses happening in-person, Anne had to shift her mindset around coaching and her advice she gives to clients. Virtual presentation unlocked a new world of communication, but comes with new rules and a learning curve. Thankfully, Anne has learned to love the world of virtual and believes that when professionals give their all to connecting with their audience, amazing communication can still occur, even from long distances away.
“Normally, when teaching a class, you can see if someone's struggling or confused, you can walk over and connect with them. Everything was happening so fast in the Zoom room, I personally felt like I started from scratch.”
 
How could someone who isn't the biggest fan of small talk reset and reframe small talk in a way that's valuable for them?
Networking and communicating can feel like a chore, especially when small talk is involved. Anne believes that small talk, as awkward and boring as it may be, allows professionals an amazing opportunity to practice connecting with others on a small scale and hone their listening and storytelling skills. Ask curious questions to connect with others during small talk moments, and don’t fear the occasional awkwardness that comes with meeting someone new.
“If you want to be good at small talk, it's just being curious. Asking questions like, ‘Hey, what's that in your background?,’ or in person, ‘Tell me more about yourself. Oh, interesting. Where did you go to school?’ Asking specific follow up questions and just being curious.”
 
What advice would you have for anyone that has impactful details to share, but doesn't really know how to make it into a story?
Storytelling is o]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1828</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>230</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Representation Without Technicalities with Mari Galloway</title>
        <itunes:title>Representation Without Technicalities with Mari Galloway</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/representation-without-technicalities-with-mari-galloway/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/representation-without-technicalities-with-mari-galloway/#comments</comments>        <pubDate>Thu, 11 Aug 2022 08:09:21 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a8f71e5e-f08b-3fab-83c6-db8d1987a882</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">We’re breaking down the concept of difference makers this week, and we couldn’t help but call upon Mari Galloway, CEO of Women’s Society of Cyberjutsu, to be our guest during this conversation. As a black woman in cybersecurity who has dedicated a large portion of her career to helping women and girls become a part of the cyber community on both the technical and non-technical sides, Mari is a stunning example of making a difference and creating a path to expand cybersecurity beyond stereotypes.</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Timecoded Guide:</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[01:29] Defining the difference makers and explaining the OODA loop</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[13:52] Introducing Mari and the Women’s Society of Cyberjutsu</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[20:14] Finding her purpose in helping others find their purpose </p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[25:06] Explaining the roles and paths available outside of strictly technical </p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[30:31] Understanding imposter syndrome and forging a freedom-based career journey</p>
<p class="x-scope qowt-word-para-1">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-4">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-1"> </p>
<p class="x-scope qowt-word-para-1">What is that like to see people go from taking that original red pill all the way through starting their career in cybersecurity?</p>
<p class="x-scope qowt-word-para-0">When we talk about making a difference, many of us don’t get to see our impact as clearly as the Women’s Society of Cyberjutsu sometimes gets to see. Mari tells us numerous stories of women throughout this episode, including herself, who became a part of this industry because of the instrumental work they do in outreach and education. For Mari, seeing women change their minds and majors to become a part of the tech industry shows how vital this work is. </p>
<p class="x-scope qowt-word-para-5">“These are the moments we're waiting for, whether it's one person or 50 million people. We want you to feel confident enough to get the skills you need, get in the industry, continue to refine those skills, and be super successful.”</p>




<p class="x-scope qowt-word-para-5"> </p>
<p class="x-scope qowt-word-para-1">What would you equate your purpose to, and how does everything you do fit into it?</p>
<p class="x-scope qowt-word-para-0">Like many of us, Mari isn’t entirely sure what her purpose is, but she knows that she enjoys helping the next generation and making a difference in the landscape of cybersecurity. Working with a nonprofit is not an easy job, even if it is rewarding, and Mari still prioritizes her freedom alongside meeting her purpose. No matter what Mari’s future holds, she knows that this work and this purpose to help others will always find her. </p>
<p class="x-scope qowt-word-para-5">“I think as I get older, as I start to take steps back to just kind of look at what's happened and the impact that I'm having and others around me are having on the next generation of folks coming up, I think my purpose is to help people. It's to help other people see their potential.”</p>
<p class="x-scope qowt-word-para-5"> </p>
<p class="x-scope qowt-word-para-1">How do you feel like creating that safe environment has affected others?</p>
<p class="x-scope qowt-word-para-0">Helping others find their footing in the cybersecurity industry can be extremely rewarding, especially when Mari found herself in a situation of uncertainty when she first joined the Cyberjutsu Tribe. The community of cybersecurity and the stereotypes around hackers can feel incredibly uninviting from the outside. Offering people, especially women and young girls, an opportunity to step into a safe space where they can ask anything has been huge for Mari.</p>
<p class="x-scope qowt-word-para-5">“We call it our Cyberjutsu Tribe, and we want to make sure that anybody that comes to us feels like they can reach out and touch us and ask us questions and get answers and just have a conversation with us.”</p>
<p class="x-scope qowt-word-para-5"> </p>
<p class="x-scope qowt-word-para-1">How do we invite more people in and let them know that there are opportunities in cyber outside of technical roles?</p>
<p class="x-scope qowt-word-para-0">Whether you’re hacking, selling, managing, or marketing, there is a space for you in the cybersecurity world. You don’t have to code or to be extremely technical to fit in this industry anymore, and you don’t have to have a certain look. The Women’s Society of Cyberjutsu prioritizes educating people on every role involved in the industry and showing them that they don’t have to be a tech wizard or a computer guru to find a satisfying and profitable position.</p>
<p class="x-scope qowt-word-para-5">“You don't have to look like this to be a hacker. You can look like me…That stereotype, I think, is dying, as we see the number of women coming in and men coming into the space that don't look like that anymore.”</p>
<p class="x-scope qowt-word-para-6">
Links:</p>
<p class="x-scope qowt-word-para-0">Spend some time with our guest, Mari Galloway, on <a href='https://www.linkedin.com/in/themarigalloway/'>LinkedIn</a>, <a href='https://twitter.com/marigalloway'>Twitter</a>, <a href='https://www.mostlymimi.com'>her website </a>, and <a href='https://womenscyberjutsu.org/'>the Women’s Society of Cyberjutsu website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochan on <a href='https://twitter.com/chrishvm'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0"> </p>




<p class="x-scope qowt-word-para-0"></p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">We’re breaking down the concept of difference makers this week, and we couldn’t help but call upon Mari Galloway, CEO of Women’s Society of Cyberjutsu, to be our guest during this conversation. As a black woman in cybersecurity who has dedicated a large portion of her career to helping women and girls become a part of the cyber community on both the technical and non-technical sides, Mari is a stunning example of making a difference and creating a path to expand cybersecurity beyond stereotypes.</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Timecoded Guide:</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[01:29] Defining the difference makers and explaining the OODA loop</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[13:52] Introducing Mari and the Women’s Society of Cyberjutsu</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[20:14] Finding her purpose in helping others find their purpose </p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[25:06] Explaining the roles and paths available outside of strictly technical </p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-3">[30:31] Understanding imposter syndrome and forging a freedom-based career journey</p>
<p class="x-scope qowt-word-para-1">Sponsor Links:</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-4">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive <em>Red Team Content Bundle</em> for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-1"> </p>
<p class="x-scope qowt-word-para-1">What is that like to see people go from taking that original red pill all the way through starting their career in cybersecurity?</p>
<p class="x-scope qowt-word-para-0">When we talk about making a difference, many of us don’t get to see our impact as clearly as the Women’s Society of Cyberjutsu sometimes gets to see. Mari tells us numerous stories of women throughout this episode, including herself, who became a part of this industry because of the instrumental work they do in outreach and education. For Mari, seeing women change their minds and majors to become a part of the tech industry shows how vital this work is. </p>
<p class="x-scope qowt-word-para-5">“These are the moments we're waiting for, whether it's one person or 50 million people. We want you to feel confident enough to get the skills you need, get in the industry, continue to refine those skills, and be super successful.”</p>




<p class="x-scope qowt-word-para-5"> </p>
<p class="x-scope qowt-word-para-1">What would you equate your purpose to, and how does everything you do fit into it?</p>
<p class="x-scope qowt-word-para-0">Like many of us, Mari isn’t entirely sure what her purpose is, but she knows that she enjoys helping the next generation and making a difference in the landscape of cybersecurity. Working with a nonprofit is not an easy job, even if it is rewarding, and Mari still prioritizes her freedom alongside meeting her purpose. No matter what Mari’s future holds, she knows that this work and this purpose to help others will always find her. </p>
<p class="x-scope qowt-word-para-5">“I think as I get older, as I start to take steps back to just kind of look at what's happened and the impact that I'm having and others around me are having on the next generation of folks coming up, I think my purpose is to help people. It's to help other people see their potential.”</p>
<p class="x-scope qowt-word-para-5"> </p>
<p class="x-scope qowt-word-para-1">How do you feel like creating that safe environment has affected others?</p>
<p class="x-scope qowt-word-para-0">Helping others find their footing in the cybersecurity industry can be extremely rewarding, especially when Mari found herself in a situation of uncertainty when she first joined the Cyberjutsu Tribe. The community of cybersecurity and the stereotypes around hackers can feel incredibly uninviting from the outside. Offering people, especially women and young girls, an opportunity to step into a safe space where they can ask anything has been huge for Mari.</p>
<p class="x-scope qowt-word-para-5">“We call it our Cyberjutsu Tribe, and we want to make sure that anybody that comes to us feels like they can reach out and touch us and ask us questions and get answers and just have a conversation with us.”</p>
<p class="x-scope qowt-word-para-5"> </p>
<p class="x-scope qowt-word-para-1">How do we invite more people in and let them know that there are opportunities in cyber outside of technical roles?</p>
<p class="x-scope qowt-word-para-0">Whether you’re hacking, selling, managing, or marketing, there is a space for you in the cybersecurity world. You don’t have to code or to be extremely technical to fit in this industry anymore, and you don’t have to have a certain look. The Women’s Society of Cyberjutsu prioritizes educating people on every role involved in the industry and showing them that they don’t have to be a tech wizard or a computer guru to find a satisfying and profitable position.</p>
<p class="x-scope qowt-word-para-5">“You don't have to look like this to be a hacker. You can look like me…That stereotype, I think, is dying, as we see the number of women coming in and men coming into the space that don't look like that anymore.”</p>
<p class="x-scope qowt-word-para-6"><br>
Links:</p>
<p class="x-scope qowt-word-para-0">Spend some time with our guest, Mari Galloway, on <a href='https://www.linkedin.com/in/themarigalloway/'>LinkedIn</a>, <a href='https://twitter.com/marigalloway'>Twitter</a>, <a href='https://www.mostlymimi.com'>her website </a>, and <a href='https://womenscyberjutsu.org/'>the Women’s Society of Cyberjutsu website</a>.</p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochan on <a href='https://twitter.com/chrishvm'>Twitter</a>.</p>
<p class="x-scope qowt-word-para-0"> </p>




<p class="x-scope qowt-word-para-0"></p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kyvfsd/HVR_for_HVS_Ep_39liuu.mp3" length="40536576" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

We’re breaking down the concept of difference makers this week, and we couldn’t help but call upon Mari Galloway, CEO of Women’s Society of Cyberjutsu, to be our guest during this conversation. As a black woman in cybersecurity who has dedicated a large portion of her career to helping women and girls become a part of the cyber community on both the technical and non-technical sides, Mari is a stunning example of making a difference and creating a path to expand cybersecurity beyond stereotypes.
 
Timecoded Guide:
[01:29] Defining the difference makers and explaining the OODA loop
[13:52] Introducing Mari and the Women’s Society of Cyberjutsu
[20:14] Finding her purpose in helping others find their purpose 
[25:06] Explaining the roles and paths available outside of strictly technical 
[30:31] Understanding imposter syndrome and forging a freedom-based career journey
Sponsor Links:
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!
 
What is that like to see people go from taking that original red pill all the way through starting their career in cybersecurity?
When we talk about making a difference, many of us don’t get to see our impact as clearly as the Women’s Society of Cyberjutsu sometimes gets to see. Mari tells us numerous stories of women throughout this episode, including herself, who became a part of this industry because of the instrumental work they do in outreach and education. For Mari, seeing women change their minds and majors to become a part of the tech industry shows how vital this work is. 
“These are the moments we're waiting for, whether it's one person or 50 million people. We want you to feel confident enough to get the skills you need, get in the industry, continue to refine those skills, and be super successful.”




 
What would you equate your purpose to, and how does everything you do fit into it?
Like many of us, Mari isn’t entirely sure what her purpose is, but she knows that she enjoys helping the next generation and making a difference in the landscape of cybersecurity. Working with a nonprofit is not an easy job, even if it is rewarding, and Mari still prioritizes her freedom alongside meeting her purpose. No matter what Mari’s future holds, she knows that this work and this purpose to help others will always find her. 
“I think as I get older, as I start to take steps back to just kind of look at what's happened and the impact that I'm having and others around me are having on the next generation of folks coming up, I think my purpose is to help people. It's to help other people see their potential.”
 
How do you feel like creating that safe environment has affected others?
Helping others find their footing in the cybersecurity industry can be extremely rewarding, especially when Mari found herself in a situation of uncertainty when she first joined the Cyberjutsu Tribe. The community of cybersecurity and the stereotypes around hackers can feel incredibly uninviting from the outside. Offering people, especially women and young girls, an opportunity to step into a safe space where they can ask anything has been huge for Mari.
“We call it our Cyberjutsu Tribe, and we want to make sure that anybody that comes to us feels like they can reach out and touch us and ask us questions and get answers and just have a conversation with us.”
 
How do we invite more people in and let them know that there are ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2529</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>234</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Security Team Operating Systems with Christian Hyatt</title>
        <itunes:title>Security Team Operating Systems with Christian Hyatt</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/security-team-operating-systems-with-christian-hyatt/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/security-team-operating-systems-with-christian-hyatt/#comments</comments>        <pubDate>Tue, 09 Aug 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/900a7291-5af0-3e32-b386-f7cf6cf96f8f</guid>
                                    <description><![CDATA[<p>Christian Hyatt, CEO & Co-Founder of risk3sixty, knows the secret to building a strong cybersecurity team, and he calls it: Security Team Operating Systems. Walking through his entrepreneurial journey from inspiration as a young child to discovering his interest in the new phenomenon of cyber to co-founding risk3sixty, Christian covers every aspect of intelligent leading and team building. Ready to take your team to the next level? Christian knows 5 key elements you won’t want to miss.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Tackling cybersecurity as a business owner in an emerging industry </p>
<p>[07:04] Building better teams with an emphasis on core values</p>
<p>[14:16] Noticing the potential of decentralized technology and data</p>
<p>[18:51] Stepping away from hands-on technician work to be the boss</p>
<p>[22:37] Leading healthy teams through missions, KPIs, and meeting cadences</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>Where did the journey of wanting to be a cybersecurity and privacy business owner begin for you? </p>
<p> </p>
<p>While many guests on Hacker Valley take the journey from technician to eventual business founder, Christian felt the urge to become an entrepreneur from a young age. Watching his father and grandfather run their own businesses, Christian understood the responsibilities of taking this journey and wanted to make an impact in an industry that was blossoming with potential. Cybersecurity came into Christian’s life later, when he was employed at a consulting industry, but he saw the potential for growth immediately and wanted to be a part of it.</p>
<p> </p>
<p>“Along the way, what I learned about myself is I really love building teams. When we built risk3sixty, we were really culture-oriented, even from the early days. We were thinking about scaling the business, career plans, coaching plans, culture kind of stuff.”</p>
<p> </p>
<p>What are some of the lessons you’ve learned in the process of building your team at risk3sixty? </p>
<p> </p>
<p>Christian cites the books Traction by Gino Wickman and Scaling Up by Verne Harnish as two of his biggest inspirations and influences for team building early on in his entrepreneurial journey. Both of these authors heavily focus on the people element of professional teams, and Christian has implemented that same approach when forming cybersecurity and privacy teams at risk3sixty. The right people in the right positions will make or break a company, which is why risk3sixty has training and apprenticeship programs in place to build a strong foundation of skills with people who are passionate about learning and growing with the company.</p>
<p> </p>
<p>“It turns out, if you get the right people in the door, you invest in them, you coach with them, you develop relationships, they're going to serve your clients like no one else is going to do it. They're gonna be part of that mission, they're gonna want to serve, and you do great work.”</p>
<p> </p>
<p>Now that you aren’t as hands-on with security assessments as a CEO, what have you learned from the bigger picture, macro-perspective role you have now? </p>
<p> </p>
<p>Many cybersecurity technicians feel understandably cautious about taking over C-level positions because of the lack of hands-on technical assessment work. However, for Christian, he’s enjoyed gaining a different perspective on the industry and learning the “why” behind the “what” as CEO of risk3sixty. As CEO, Christian is able to better understand overarching trends and changes in the security assessments his company performs and has the opportunity to talk directly with security executives about opportunities for growth and investment.</p>
<p> </p>
<p>“You can walk into an organization and if they don't have a strong leader at the helm, they don't have a security team operating system, they're a little bit dysfunctional, I know already that I'm going to see some problems in there.”</p>
<p> </p>
<p>What are the most important characteristics that you're finding for folks that are leading really healthy cybersecurity teams?</p>
<p> </p>
<p>Security team operating systems are made up of the non-technical skills and characteristics that make a team effective. When Christian’s team at risk3sixty needed to hone in on these specific elements, they narrowed it down to 5. Teams need to have a (1) defined purpose and mission to go after and a (2) core set of values to not only guide them through their work, but also understand their (3) set of expected behaviors and standards. There also have to be (4) consistent meeting cadences in place and (5) a solid, standard process of goal setting, KPIs, and score carding. </p>
<p> </p>
<p>“A great team defines their purpose and mission. Usually, that’s aligned with a business objective. It might be about protecting data, it might be about customer trust, whatever it is that makes sense for that business, they've set a mission that that team can rally around.” </p>
<p> </p>
<p>---------------</p>
<p>Links:</p>
<p> </p>
<p>Keep up with Christian Hyatt on <a href='https://www.linkedin.com/in/christianhyatt/'>LinkedIn</a> </p>
<p>Check out risk3sixty on <a href='https://www.linkedin.com/company/risk3sixty/'>LinkedIn</a> and <a href='https://risk3sixty.com'>the risk3sixty website</a>.</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Christian Hyatt, CEO & Co-Founder of risk3sixty, knows the secret to building a strong cybersecurity team, and he calls it: Security Team Operating Systems. Walking through his entrepreneurial journey from inspiration as a young child to discovering his interest in the new phenomenon of cyber to co-founding risk3sixty, Christian covers every aspect of intelligent leading and team building. Ready to take your team to the next level? Christian knows 5 key elements you won’t want to miss.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Tackling cybersecurity as a business owner in an emerging industry </p>
<p>[07:04] Building better teams with an emphasis on core values</p>
<p>[14:16] Noticing the potential of decentralized technology and data</p>
<p>[18:51] Stepping away from hands-on technician work to be the boss</p>
<p>[22:37] Leading healthy teams through missions, KPIs, and meeting cadences</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p><br>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>Where did the journey of wanting to be a cybersecurity and privacy business owner begin for you? </p>
<p> </p>
<p>While many guests on Hacker Valley take the journey from technician to eventual business founder, Christian felt the urge to become an entrepreneur from a young age. Watching his father and grandfather run their own businesses, Christian understood the responsibilities of taking this journey and wanted to make an impact in an industry that was blossoming with potential. Cybersecurity came into Christian’s life later, when he was employed at a consulting industry, but he saw the potential for growth immediately and wanted to be a part of it.</p>
<p> </p>
<p><em>“Along the way, what I learned about myself is I really love building teams. When we built risk3sixty, we were really culture-oriented, even from the early days. We were thinking about scaling the business, career plans, coaching plans, culture kind of stuff.”</em></p>
<p> </p>
<p>What are some of the lessons you’ve learned in the process of building your team at risk3sixty? </p>
<p> </p>
<p>Christian cites the books <em>Traction</em> by Gino Wickman and <em>Scaling Up</em> by Verne Harnish as two of his biggest inspirations and influences for team building early on in his entrepreneurial journey. Both of these authors heavily focus on the people element of professional teams, and Christian has implemented that same approach when forming cybersecurity and privacy teams at risk3sixty. The right people in the right positions will make or break a company, which is why risk3sixty has training and apprenticeship programs in place to build a strong foundation of skills with people who are passionate about learning and growing with the company.</p>
<p> </p>
<p><em>“It turns out, if you get the right people in the door, you invest in them, you coach with them, you develop relationships, they're going to serve your clients like no one else is going to do it. They're gonna be part of that mission, they're gonna want to serve, and you do great work.”</em></p>
<p> </p>
<p>Now that you aren’t as hands-on with security assessments as a CEO, what have you learned from the bigger picture, macro-perspective role you have now? </p>
<p> </p>
<p>Many cybersecurity technicians feel understandably cautious about taking over C-level positions because of the lack of hands-on technical assessment work. However, for Christian, he’s enjoyed gaining a different perspective on the industry and learning the “why” behind the “what” as CEO of risk3sixty. As CEO, Christian is able to better understand overarching trends and changes in the security assessments his company performs and has the opportunity to talk directly with security executives about opportunities for growth and investment.</p>
<p> </p>
<p><em>“You can walk into an organization and if they don't have a strong leader at the helm, they don't have a security team operating system, they're a little bit dysfunctional, I know already that I'm going to see some problems in there.”</em></p>
<p> </p>
<p>What are the most important characteristics that you're finding for folks that are leading really healthy cybersecurity teams?</p>
<p> </p>
<p>Security team operating systems are made up of the non-technical skills and characteristics that make a team effective. When Christian’s team at risk3sixty needed to hone in on these specific elements, they narrowed it down to 5. Teams need to have a (1) defined purpose and mission to go after and a (2) core set of values to not only guide them through their work, but also understand their (3) set of expected behaviors and standards. There also have to be (4) consistent meeting cadences in place and (5) a solid, standard process of goal setting, KPIs, and score carding. </p>
<p> </p>
<p><em>“A great team defines their purpose and mission. Usually, that’s aligned with a business objective. It might be about protecting data, it might be about customer trust, whatever it is that makes sense for that business, they've set a mission that that team can rally around.” </em></p>
<p> </p>
<p>---------------</p>
<p>Links:</p>
<p> </p>
<p>Keep up with Christian Hyatt on <a href='https://www.linkedin.com/in/christianhyatt/'>LinkedIn</a> </p>
<p>Check out risk3sixty on <a href='https://www.linkedin.com/company/risk3sixty/'>LinkedIn</a> and <a href='https://risk3sixty.com'>the risk3sixty website</a>.</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gb9rfq/HVS_audio_Christian_Hyatt_V36ee94.mp3" length="39313737" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Christian Hyatt, CEO & Co-Founder of risk3sixty, knows the secret to building a strong cybersecurity team, and he calls it: Security Team Operating Systems. Walking through his entrepreneurial journey from inspiration as a young child to discovering his interest in the new phenomenon of cyber to co-founding risk3sixty, Christian covers every aspect of intelligent leading and team building. Ready to take your team to the next level? Christian knows 5 key elements you won’t want to miss.
 
Timecoded Guide:
[00:00] Tackling cybersecurity as a business owner in an emerging industry 
[07:04] Building better teams with an emphasis on core values
[14:16] Noticing the potential of decentralized technology and data
[18:51] Stepping away from hands-on technician work to be the boss
[22:37] Leading healthy teams through missions, KPIs, and meeting cadences
 
Sponsor Links:
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out axonius.com/mindbody 
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at academy.attackiq.com
 
Where did the journey of wanting to be a cybersecurity and privacy business owner begin for you? 
 
While many guests on Hacker Valley take the journey from technician to eventual business founder, Christian felt the urge to become an entrepreneur from a young age. Watching his father and grandfather run their own businesses, Christian understood the responsibilities of taking this journey and wanted to make an impact in an industry that was blossoming with potential. Cybersecurity came into Christian’s life later, when he was employed at a consulting industry, but he saw the potential for growth immediately and wanted to be a part of it.
 
“Along the way, what I learned about myself is I really love building teams. When we built risk3sixty, we were really culture-oriented, even from the early days. We were thinking about scaling the business, career plans, coaching plans, culture kind of stuff.”
 
What are some of the lessons you’ve learned in the process of building your team at risk3sixty? 
 
Christian cites the books Traction by Gino Wickman and Scaling Up by Verne Harnish as two of his biggest inspirations and influences for team building early on in his entrepreneurial journey. Both of these authors heavily focus on the people element of professional teams, and Christian has implemented that same approach when forming cybersecurity and privacy teams at risk3sixty. The right people in the right positions will make or break a company, which is why risk3sixty has training and apprenticeship programs in place to build a strong foundation of skills with people who are passionate about learning and growing with the company.
 
“It turns out, if you get the right people in the door, you invest in them, you coach with them, you develop relationships, they're going to serve your clients like no one else is going to do it. They're gonna be part of that mission, they're gonna want to serve, and you do great work.”
 
Now that you aren’t as hands-on with security assessments as a CEO, what have you learned from the bigger picture, macro-perspective role you have now? 
 
Many cybersecurity technicians feel understandably cautious about taking over C-level positions because of the lack of hands-on technical assessment work. However, for Christian, he’s enjoyed gaining a different perspective on the industry and learning the “why” behind the “what” as CEO of risk3sixty. As CEO, Christian is able to better understand overarching trends and changes in the security assessments his company performs and has the opportunity to talk directly with security executives about opportunities for growth and investment.
 
“You can walk into an organizatio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1635</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>228</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Learning from Cybersecurity Legends with Davin Jackson</title>
        <itunes:title>Learning from Cybersecurity Legends with Davin Jackson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/learning-from-cybersecurity-legends-with-davin-jackson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/learning-from-cybersecurity-legends-with-davin-jackson/#comments</comments>        <pubDate>Thu, 04 Aug 2022 11:11:13 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7d371fbb-d27c-33b5-8a50-5a8ed4115a8b</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">Those on the red team may not be household names to the everyday person, but they are absolutely legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he’s learned from them.</p>
<p class="x-scope qowt-word-para-1">Timecode Guide:</p>
<p class="x-scope qowt-word-para-0">[00:50] The importance of red teaming, especially during this season</p>
<p class="x-scope qowt-word-para-0">[02:17] Ron and Chris’ first experience working in a red team environment</p>
<p class="x-scope qowt-word-para-0">[11:23] Communication and collaboration between blue and red</p>
<p class="x-scope qowt-word-para-0">[16:53] Knowledge gained from Davin Jackson’s humble beginnings in tech</p>
<p class="x-scope qowt-word-para-0">[22:19] Gaining the blue perspective with Hacker Valley Blue</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-2">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>




<p class="x-scope qowt-word-para-0">PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0">_____________</p>
<p class="x-scope qowt-word-para-0">Legends, Icons, Teachers, and Friends</p>
<p class="x-scope qowt-word-para-0">From Marcus Carey to Johnny Long, we’re excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them.</p>
<p class="x-scope qowt-word-para-3">“I think that's the most important thing in red teaming, it’s passing that knowledge on to someone else.” - Chris Cochran</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Communication, collaboration, and community instead of red vs blue</p>
<p class="x-scope qowt-word-para-0">It is not two teams with two separate fights when we’re talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we’re happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams.</p>
<p class="x-scope qowt-word-para-3">“There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you’re going to go deeper and deeper.” - Ron Eddings</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Legends met, lessons learned, tech loneliness understood</p>
<p class="x-scope qowt-word-para-0">In the latter half of our episode, we’re joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it </p>





<p class="x-scope qowt-word-para-0">feels like a dead end), and being always willing to share what you’ve learned.</p>
<p class="x-scope qowt-word-para-3">“It’s about consistency, and you have to have self control and discipline…It’s one thing to get it, but it’s another to maintain that success.” - Davin</p>
<p class="x-scope qowt-word-para-0">----------</p>
<p class="x-scope qowt-word-para-0">Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on<a href='https://alphacybersecurity.tech'> </a><a href='https://alphacybersecurity.tech'>his website</a>,<a href='https://twitter.com/Djax_Alpha'> </a><a href='https://twitter.com/Djax_Alpha'>Twitter</a>,<a href='https://www.instagram.com/djax_alpha/'> </a><a href='https://www.instagram.com/djax_alpha/'>Instagram</a>,<a href='https://www.facebook.com/AlphaCyberSec/'> </a><a href='https://www.facebook.com/AlphaCyberSec/'>Facebook</a>, and<a href='https://hackervalley.com/show/hacker-valley-blue/'> </a><a href='https://hackervalley.com/show/hacker-valley-blue/'>weekly</a><a href='https://hackervalley.com/show/hacker-valley-blue/'> on the Hacker Valley Blue podcast</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on<a href='https://twitter.com/ronaldeddings'> </a><a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>





<p class="x-scope qowt-word-para-0">Catch up with Chris Cochan on<a href='https://twitter.com/chrishvm'> </a><a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on<a href='https://hackervalley.com'> </a><a href='https://hackervalley.com'>our website</a>,<a href='https://www.linkedin.com/company/hackervalleystudio/'> </a><a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>,<a href='https://www.instagram.com/hackervalleymedia/'> </a><a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and<a href='https://twitter.com/TheHackerValley'> </a><a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">Those on the red team may not be household names to the everyday person, but they are absolutely legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he’s learned from them.</p>
<p class="x-scope qowt-word-para-1">Timecode Guide:</p>
<p class="x-scope qowt-word-para-0">[00:50] The importance of red teaming, especially during this season</p>
<p class="x-scope qowt-word-para-0">[02:17] Ron and Chris’ first experience working in a red team environment</p>
<p class="x-scope qowt-word-para-0">[11:23] Communication and collaboration between blue and red</p>
<p class="x-scope qowt-word-para-0">[16:53] Knowledge gained from Davin Jackson’s humble beginnings in tech</p>
<p class="x-scope qowt-word-para-0">[22:19] Gaining the blue perspective with Hacker Valley Blue</p>
<p class="x-scope qowt-word-para-0">Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p class="x-scope qowt-word-para-2">Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>




<p class="x-scope qowt-word-para-0">PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy today!</p>
<p class="x-scope qowt-word-para-0">_____________</p>
<p class="x-scope qowt-word-para-0">Legends, Icons, Teachers, and Friends</p>
<p class="x-scope qowt-word-para-0">From Marcus Carey to Johnny Long, we’re excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them.</p>
<p class="x-scope qowt-word-para-3">“I think that's the most important thing in red teaming, it’s passing that knowledge on to someone else.” - Chris Cochran</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Communication, collaboration, and community instead of red vs blue</p>
<p class="x-scope qowt-word-para-0">It is not two teams with two separate fights when we’re talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we’re happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams.</p>
<p class="x-scope qowt-word-para-3">“There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you’re going to go deeper and deeper.” - Ron Eddings</p>
<p class="x-scope qowt-word-para-0"> </p>
<p class="x-scope qowt-word-para-1">Legends met, lessons learned, tech loneliness understood</p>
<p class="x-scope qowt-word-para-0">In the latter half of our episode, we’re joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it </p>





<p class="x-scope qowt-word-para-0">feels like a dead end), and being always willing to share what you’ve learned.</p>
<p class="x-scope qowt-word-para-3">“It’s about consistency, and you have to have self control and discipline…It’s one thing to get it, but it’s another to maintain that success.” - Davin</p>
<p class="x-scope qowt-word-para-0">----------</p>
<p class="x-scope qowt-word-para-0">Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on<a href='https://alphacybersecurity.tech'> </a><a href='https://alphacybersecurity.tech'>his website</a>,<a href='https://twitter.com/Djax_Alpha'> </a><a href='https://twitter.com/Djax_Alpha'>Twitter</a>,<a href='https://www.instagram.com/djax_alpha/'> </a><a href='https://www.instagram.com/djax_alpha/'>Instagram</a>,<a href='https://www.facebook.com/AlphaCyberSec/'> </a><a href='https://www.facebook.com/AlphaCyberSec/'>Facebook</a>, and<a href='https://hackervalley.com/show/hacker-valley-blue/'> </a><a href='https://hackervalley.com/show/hacker-valley-blue/'>weekly</a><a href='https://hackervalley.com/show/hacker-valley-blue/'> on the Hacker Valley Blue podcast</a>.</p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on<a href='https://twitter.com/ronaldeddings'> </a><a href='https://twitter.com/ronaldeddings'>Twitter</a> and <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a></p>





<p class="x-scope qowt-word-para-0">Catch up with Chris Cochan on<a href='https://twitter.com/chrishvm'> </a><a href='https://twitter.com/chrishvm'>Twitter</a> and <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a></p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on<a href='https://hackervalley.com'> </a><a href='https://hackervalley.com'>our website</a>,<a href='https://www.linkedin.com/company/hackervalleystudio/'> </a><a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>,<a href='https://www.instagram.com/hackervalleymedia/'> </a><a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and<a href='https://twitter.com/TheHackerValley'> </a><a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zcwt4y/HVR_for_HVS_Ep_2btx9s.mp3" length="28811136" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

Those on the red team may not be household names to the everyday person, but they are absolutely legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he’s learned from them.
Timecode Guide:
[00:50] The importance of red teaming, especially during this season
[02:17] Ron and Chris’ first experience working in a red team environment
[11:23] Communication and collaboration between blue and red
[16:53] Knowledge gained from Davin Jackson’s humble beginnings in tech
[22:19] Gaining the blue perspective with Hacker Valley Blue
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone




PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!
_____________
Legends, Icons, Teachers, and Friends
From Marcus Carey to Johnny Long, we’re excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them.
“I think that's the most important thing in red teaming, it’s passing that knowledge on to someone else.” - Chris Cochran
 
Communication, collaboration, and community instead of red vs blue
It is not two teams with two separate fights when we’re talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we’re happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams.
“There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you’re going to go deeper and deeper.” - Ron Eddings
 
Legends met, lessons learned, tech loneliness understood
In the latter half of our episode, we’re joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it 





feels like a dead end), and being always willing to share what you’ve learned.
“It’s about consistency, and you have to have self control and discipline…It’s one thing to get it, but it’s another to maintain that success.” - Davin
----------
Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and weekly on the Hacker Valley Blue podcast.
Follow Ron Eddings on Twitter and LinkedIn





Catch up with Chris Cochan on Twitter and LinkedIn
Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1796</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>229</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Finding the Right IT Teacher with Kevin Apolinario</title>
        <itunes:title>Finding the Right IT Teacher with Kevin Apolinario</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/finding-the-right-it-teacher-with-kevin-apolinario/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/finding-the-right-it-teacher-with-kevin-apolinario/#comments</comments>        <pubDate>Tue, 02 Aug 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/eeb5ea41-bcb3-3d38-920d-358d3e695cea</guid>
                                    <description><![CDATA[<p>Kevin Apolinario, better known as Kevtech IT Support on Youtube, brings his teaching skills to Hacker Valley to talk about the barriers to entry in IT. Disheartened by the lack of good advice given to him as he entered the tech world, Kev breaks down programs and concepts, such as helpdesk, for IT practitioners that may not have access to expensive equipment or formal education. Anyone can learn IT, and it’s Kev’s mission to help everyone find the method and the teacher that helps them learn the best.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Forming Kevtech IT Support to give the right IT advice</p>
<p>[07:21] Helpdesk success through customer service skills</p>
<p>[11:49] Printers on VPNs and other major IT troubleshooting lessons</p>
<p>[15:56] Customizing teaching and learning experiences for each IT practitioner</p>
<p>[19:54] Better IT and cyber online communities through shared passion</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>What was your inspiration to start teaching as Kevtech IT Support? </p>
<p> </p>
<p>Kev hardly had a traditional journey into IT, instead having jobs in the restaurant industry and law enforcement before even considering entering the tech world. When Kev became a Field Technician for the Department of Education and began learning the ropes of IT, he realized there weren’t resources available for someone of his background to learn simple concepts or master common technical programs. After dealing with the frustrations of education gaps and unreliable advice, Kev decided to be the person for new IT technicians to learn from.</p>
<p> </p>
<p>“My journey was rough, because I didn't have anyone guiding me, I didn't have anyone telling me what certs to get. I didn't have anyone telling me the tips and tricks for starting in IT.”</p>
<p> </p>
<p>Was it intentional to interweave your name and brand and have them be synonymous? </p>
<p> </p>
<p>Hacker Valley feels synonymous with Chris and Ron’s branding for themselves, and Kev maintains a similar element of that with Kevtech IT Support, especially considering he weaves his name directly into his branding. For Kev, this was an entirely purposeful decision, born out of his own desire to be known as Kev, the helpdesk IT guru on YouTube. Building a brand with authenticity about who he is personally and professionally shows other IT professionals that their work or education experiences don’t have to be separate from who they really are.</p>
<p> </p>
<p>“That was on purpose for me because I always wanted to be known as the helpdesk guru of IT. Someone that does IT superbly and helps everyone…I wanted to actually show people real-life experiences.”</p>
<p> </p>
<p>How would you go about having a tough conversation with somebody whose passion isn’t in IT or cyber? </p>
<p> </p>
<p>Some people are just in it for the money, whether that “it” is IT or cybersecurity. Considering the spotlight being placed on cyber labor shortages and tech skills gaps, many professionals have considered joining the field without the passion to support their new job shift. Although Kev believes everyone should be welcome to learn about IT, he understands that there’s a cause of concern in making IT all about the money. The industry needs passionate individuals, Kev explains, and the desire to learn needs to be present when you take that next step into IT.</p>
<p> </p>
<p>“I'm sorry, but this field is not for everyone. If you're going to work helpdesk, or IT support, you need to know how to deal with customer service, you need to know how to deal with people.”</p>
<p> </p>
<p>What piece of advice would you have for cyber or IT professionals looking to level up their community?</p>
<p> </p>
<p>From Kev’s perspective, gatekeeping isn’t just mean, it’s legitimately harmful to the IT community. IT professionals can’t level up without leaders willing to step up and teach their knowledge. Hiding IT tips or tricks doesn’t save careers, it only succeeds in hurting other IT practitioners and negatively impacting customers relying on that expertise. Kev advocates for increasing transparency within the IT and cyber communities, and explains that gaining knowledge should be valued more than capital gains by practitioners and professionals.</p>
<p> </p>
<p>“I believe in helping the community, I believe in sharing your knowledge. So, the more engaged you get with the community, the better it is for everyone.”</p>
<p> </p>
<p>---------------</p>
<p>Links:</p>
<p> </p>
<p>Keep up with Kevin Apolinario on <a href='https://www.linkedin.com/in/itprofessionalkevinapolinario/'>LinkedIn</a></p>
<p>Check out Kevtech IT Support on <a href='https://www.youtube.com/c/KevtechITSupport'>YouTube</a> and <a href='https://discord.com/invite/ZCFuZbJ'>Discord</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Kevin Apolinario, better known as Kevtech IT Support on Youtube, brings his teaching skills to Hacker Valley to talk about the barriers to entry in IT. Disheartened by the lack of good advice given to him as he entered the tech world, Kev breaks down programs and concepts, such as helpdesk, for IT practitioners that may not have access to expensive equipment or formal education. Anyone can learn IT, and it’s Kev’s mission to help everyone find the method and the teacher that helps them learn the best.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Forming Kevtech IT Support to give the right IT advice</p>
<p>[07:21] Helpdesk success through customer service skills</p>
<p>[11:49] Printers on VPNs and other major IT troubleshooting lessons</p>
<p>[15:56] Customizing teaching and learning experiences for each IT practitioner</p>
<p>[19:54] Better IT and cyber online communities through shared passion</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p><br>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>What was your inspiration to start teaching as Kevtech IT Support? </p>
<p> </p>
<p>Kev hardly had a traditional journey into IT, instead having jobs in the restaurant industry and law enforcement before even considering entering the tech world. When Kev became a Field Technician for the Department of Education and began learning the ropes of IT, he realized there weren’t resources available for someone of his background to learn simple concepts or master common technical programs. After dealing with the frustrations of education gaps and unreliable advice, Kev decided to be the person for new IT technicians to learn from.</p>
<p> </p>
<p><em>“My journey was rough, because I didn't have anyone guiding me, I didn't have anyone telling me what certs to get. I didn't have anyone telling me the tips and tricks for starting in IT.”</em></p>
<p> </p>
<p>Was it intentional to interweave your name and brand and have them be synonymous? </p>
<p> </p>
<p>Hacker Valley feels synonymous with Chris and Ron’s branding for themselves, and Kev maintains a similar element of that with Kevtech IT Support, especially considering he weaves his name directly into his branding. For Kev, this was an entirely purposeful decision, born out of his own desire to be known as Kev, the helpdesk IT guru on YouTube. Building a brand with authenticity about who he is personally and professionally shows other IT professionals that their work or education experiences don’t have to be separate from who they really are.</p>
<p> </p>
<p><em>“That was on purpose for me because I always wanted to be known as the helpdesk guru of IT. Someone that does IT superbly and helps everyone…I wanted to actually show people real-life experiences.”</em></p>
<p> </p>
<p>How would you go about having a tough conversation with somebody whose passion isn’t in IT or cyber? </p>
<p> </p>
<p>Some people are just in it for the money, whether that “it” is IT or cybersecurity. Considering the spotlight being placed on cyber labor shortages and tech skills gaps, many professionals have considered joining the field without the passion to support their new job shift. Although Kev believes everyone should be welcome to learn about IT, he understands that there’s a cause of concern in making IT all about the money. The industry needs passionate individuals, Kev explains, and the desire to learn needs to be present when you take that next step into IT.</p>
<p> </p>
<p><em>“I'm sorry, but this field is not for everyone. If you're going to work helpdesk, or IT support, you need to know how to deal with customer service, you need to know how to deal with people.”</em></p>
<p> </p>
<p>What piece of advice would you have for cyber or IT professionals looking to level up their community?</p>
<p> </p>
<p>From Kev’s perspective, gatekeeping isn’t just mean, it’s legitimately harmful to the IT community. IT professionals can’t level up without leaders willing to step up and teach their knowledge. Hiding IT tips or tricks doesn’t save careers, it only succeeds in hurting other IT practitioners and negatively impacting customers relying on that expertise. Kev advocates for increasing transparency within the IT and cyber communities, and explains that gaining knowledge should be valued more than capital gains by practitioners and professionals.</p>
<p> </p>
<p><em>“I believe in helping the community, I believe in sharing your knowledge. So, the more engaged you get with the community, the better it is for everyone.”</em></p>
<p> </p>
<p>---------------</p>
<p>Links:</p>
<p> </p>
<p>Keep up with Kevin Apolinario on <a href='https://www.linkedin.com/in/itprofessionalkevinapolinario/'>LinkedIn</a></p>
<p>Check out Kevtech IT Support on <a href='https://www.youtube.com/c/KevtechITSupport'>YouTube</a> and <a href='https://discord.com/invite/ZCFuZbJ'>Discord</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wp6xeu/HVS_audio_Kevin_Apolinario643g6.mp3" length="35678977" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Kevin Apolinario, better known as Kevtech IT Support on Youtube, brings his teaching skills to Hacker Valley to talk about the barriers to entry in IT. Disheartened by the lack of good advice given to him as he entered the tech world, Kev breaks down programs and concepts, such as helpdesk, for IT practitioners that may not have access to expensive equipment or formal education. Anyone can learn IT, and it’s Kev’s mission to help everyone find the method and the teacher that helps them learn the best.
 
Timecoded Guide:
[00:00] Forming Kevtech IT Support to give the right IT advice
[07:21] Helpdesk success through customer service skills
[11:49] Printers on VPNs and other major IT troubleshooting lessons
[15:56] Customizing teaching and learning experiences for each IT practitioner
[19:54] Better IT and cyber online communities through shared passion
 
Sponsor Links:
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out axonius.com/mindbody 
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at academy.attackiq.com
 
What was your inspiration to start teaching as Kevtech IT Support? 
 
Kev hardly had a traditional journey into IT, instead having jobs in the restaurant industry and law enforcement before even considering entering the tech world. When Kev became a Field Technician for the Department of Education and began learning the ropes of IT, he realized there weren’t resources available for someone of his background to learn simple concepts or master common technical programs. After dealing with the frustrations of education gaps and unreliable advice, Kev decided to be the person for new IT technicians to learn from.
 
“My journey was rough, because I didn't have anyone guiding me, I didn't have anyone telling me what certs to get. I didn't have anyone telling me the tips and tricks for starting in IT.”
 
Was it intentional to interweave your name and brand and have them be synonymous? 
 
Hacker Valley feels synonymous with Chris and Ron’s branding for themselves, and Kev maintains a similar element of that with Kevtech IT Support, especially considering he weaves his name directly into his branding. For Kev, this was an entirely purposeful decision, born out of his own desire to be known as Kev, the helpdesk IT guru on YouTube. Building a brand with authenticity about who he is personally and professionally shows other IT professionals that their work or education experiences don’t have to be separate from who they really are.
 
“That was on purpose for me because I always wanted to be known as the helpdesk guru of IT. Someone that does IT superbly and helps everyone…I wanted to actually show people real-life experiences.”
 
How would you go about having a tough conversation with somebody whose passion isn’t in IT or cyber? 
 
Some people are just in it for the money, whether that “it” is IT or cybersecurity. Considering the spotlight being placed on cyber labor shortages and tech skills gaps, many professionals have considered joining the field without the passion to support their new job shift. Although Kev believes everyone should be welcome to learn about IT, he understands that there’s a cause of concern in making IT all about the money. The industry needs passionate individuals, Kev explains, and the desire to learn needs to be present when you take that next step into IT.
 
“I'm sorry, but this field is not for everyone. If you're going to work helpdesk, or IT support, you need to know how to deal with customer service, you need to know how to deal with people.”
 
What piece of advice would you have for cyber or IT professionals looking to level up their community?
 
From Kev’s perspective, gatekeeping isn’t just mean, it’s ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1486</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>227</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Making Hacking Accessible with Deviant Ollam</title>
        <itunes:title>Making Hacking Accessible with Deviant Ollam</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/making-hacking-accessible-with-deviant-ollam/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/making-hacking-accessible-with-deviant-ollam/#comments</comments>        <pubDate>Thu, 28 Jul 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1b490ab9-d83c-3ef0-886c-7a9d78e9f102</guid>
                                    <description><![CDATA[

<p class="x-scope qowt-word-para-0">In this season of Hacker Valley Red, we focus on cybersecurity legends in offensive operations with a legend in the physical pen testing and lockpicking: Deviant Ollam. As a pioneer in our industry and an author of two incredible books about lockpicking, Deviant shares his history from hobbyist to professional and all that he’s learned along the way about making the secrets of the hacking world accessible to all.</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[01:28] Defining the pioneers in cybersecurity</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[08:47] Deviant’s first explorations in lockpicking </p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[16:03] Accessing and democratizing hacking secrets</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[18:58] Becoming an author to transfer his knowledge</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[23:12] Seeing the past, present, and future of hacking</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy! And be sure to come say hello to us at Black Hat at Booth #1686!</p>
<p class="x-scope qowt-word-para-0">----------------</p>
<p class="x-scope qowt-word-para-3">What does it mean to be a pioneer in cybersecurity? </p>
<p class="x-scope qowt-word-para-0">As our season focuses on legends, it’s important that we explain what makes these individuals such a vital part of our community. In the case of this episode, we explain that our guest Deviant is nothing short of a pioneer. Deviant has been willing to take on new challenges and revolutionize the industry throughout his career, influencing hundreds of individuals and leaving a lasting educational impact on the entire industry.</p>
<p class="x-scope qowt-word-para-4">“That ‘zero to one’ part can be the hardest part of any progression in any field, but especially in cybersecurity.” — Chris</p>
<p class="x-scope qowt-word-para-4"> </p>
<p class="x-scope qowt-word-para-3">When you reflect on changing this whole industry, how does that make you feel?</p>
<p class="x-scope qowt-word-para-0">Despite our guest’s legendary reputation, Deviant is humble about his achievements, caring more about how his work has impacted others than himself. What he focuses most on in his teaching, presentations, and writing is making lockpicking and penetration testing accessible and understandable. Instead of harboring secrets and perpetuating exclusionary policies, Deviant wants anyone to be able to master these skills and understand this knowledge.</p>
<p class="x-scope qowt-word-para-4">“I’m not the first one who ever did this. What I like to think of my contributions is that they have chiefly been making it accessible and democratizing this knowledge.” — Deviant </p>





<p class="x-scope qowt-word-para-4"> </p>
<p class="x-scope qowt-word-para-3">Do you think it's harder today to stand out than it was a couple decades ago?</p>
<p class="x-scope qowt-word-para-0">For Deviant, our globalized internet and algorithm-focus social media sites are both a blessing and a curse. While knowledge can be found on every corner of the web and anyone can become familiar with information that was once borderline inaccessible, Deviant also recognizes that younger hackers and lockpickers will have a very different rise to success than he did years ago, especially due to fragmented audiences and tricky algorithms. </p>
<p class="x-scope qowt-word-para-4">“We have more avenues to put yourself on display, to put yourself out there than ever before, but that means the audience is fragmented and is spread so thin.” — Deviant</p>
<p class="x-scope qowt-word-para-4"> </p>
<p class="x-scope qowt-word-para-3">What piece of advice would you have for the folks that want to make an impact in security and technology and in our community today?</p>
<p class="x-scope qowt-word-para-0">Although success will look different for newer members of our cybersecurity community, Deviant is confident that the younger innovative minds of the future will be able to solve so many of the long-standing problems within our industry. However, he reminds our younger audience that they need to still respect the tenured members of the cybersecurity world and to learn from them without oversimplifying the issues past professionals have faced. </p>
<p class="x-scope qowt-word-para-4">“Start thinking about it in a way that doesn’t use ‘just,’ because every old head in the industry has heard that….We couldn’t ‘just’ do it, or we would’ve ‘just’ done it.” - Deviant</p>
<p class="x-scope qowt-word-para-0">------</p>
<p class="x-scope qowt-word-para-0">LINKS:</p>





<p class="x-scope qowt-word-para-0">Spend some time with our guest, Deviant Ollam, on <a href='https://deviating.net'>his website</a>, <a href='https://twitter.com/deviantollam'>Twitter</a>, <a href='https://www.instagram.com/deviantollam/'>Instagram</a>, and <a href='https://www.youtube.com/user/DeviantOllam'>Youtube channel</a>. </p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochan on <a href='https://twitter.com/chrishvm'>Twitter</a>.</p>

]]></description>
                                                            <content:encoded><![CDATA[

<p class="x-scope qowt-word-para-0">In this season of Hacker Valley Red, we focus on cybersecurity legends in offensive operations with a legend in the physical pen testing and lockpicking: Deviant Ollam. As a pioneer in our industry and an author of two incredible books about lockpicking, Deviant shares his history from hobbyist to professional and all that he’s learned along the way about making the secrets of the hacking world accessible to all.</p>
<p class="x-scope qowt-word-para-0">Timecoded Guide:</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[01:28] Defining the pioneers in cybersecurity</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[08:47] Deviant’s first explorations in lockpicking </p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[16:03] Accessing and democratizing hacking secrets</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[18:58] Becoming an author to transfer his knowledge</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">[23:12] Seeing the past, present, and future of hacking</p>
<p class="qowt-li-1_0 qowt-list x-scope qowt-word-para-2">Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>PlexTrac is pleased to offer an exclusive <em>Red Team Content Bundle</em> for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to <a href='http://plextrac.com/HackerValley'>PlexTrac.com/HackerValley</a> to learn more about the platform and get your copy! And be sure to come say hello to us at Black Hat at Booth #1686!</p>
<p class="x-scope qowt-word-para-0">----------------</p>
<p class="x-scope qowt-word-para-3">What does it mean to be a pioneer in cybersecurity? </p>
<p class="x-scope qowt-word-para-0">As our season focuses on legends, it’s important that we explain what makes these individuals such a vital part of our community. In the case of this episode, we explain that our guest Deviant is nothing short of a pioneer. Deviant has been willing to take on new challenges and revolutionize the industry throughout his career, influencing hundreds of individuals and leaving a lasting educational impact on the entire industry.</p>
<p class="x-scope qowt-word-para-4">“That ‘zero to one’ part can be the hardest part of any progression in any field, but especially in cybersecurity.” — Chris</p>
<p class="x-scope qowt-word-para-4"> </p>
<p class="x-scope qowt-word-para-3">When you reflect on changing this whole industry, how does that make you feel?</p>
<p class="x-scope qowt-word-para-0">Despite our guest’s legendary reputation, Deviant is humble about his achievements, caring more about how his work has impacted others than himself. What he focuses most on in his teaching, presentations, and writing is making lockpicking and penetration testing accessible and understandable. Instead of harboring secrets and perpetuating exclusionary policies, Deviant wants anyone to be able to master these skills and understand this knowledge.</p>
<p class="x-scope qowt-word-para-4">“I’m not the first one who ever did this. What I like to think of my contributions is that they have chiefly been making it accessible and democratizing this knowledge.” — Deviant </p>





<p class="x-scope qowt-word-para-4"> </p>
<p class="x-scope qowt-word-para-3">Do you think it's harder today to stand out than it was a couple decades ago?</p>
<p class="x-scope qowt-word-para-0">For Deviant, our globalized internet and algorithm-focus social media sites are both a blessing and a curse. While knowledge can be found on every corner of the web and anyone can become familiar with information that was once borderline inaccessible, Deviant also recognizes that younger hackers and lockpickers will have a very different rise to success than he did years ago, especially due to fragmented audiences and tricky algorithms. </p>
<p class="x-scope qowt-word-para-4">“We have more avenues to put yourself on display, to put yourself out there than ever before, but that means the audience is fragmented and is spread so thin.” — Deviant</p>
<p class="x-scope qowt-word-para-4"> </p>
<p class="x-scope qowt-word-para-3">What piece of advice would you have for the folks that want to make an impact in security and technology and in our community today?</p>
<p class="x-scope qowt-word-para-0">Although success will look different for newer members of our cybersecurity community, Deviant is confident that the younger innovative minds of the future will be able to solve so many of the long-standing problems within our industry. However, he reminds our younger audience that they need to still respect the tenured members of the cybersecurity world and to learn from them without oversimplifying the issues past professionals have faced. </p>
<p class="x-scope qowt-word-para-4">“Start thinking about it in a way that doesn’t use ‘just,’ because every old head in the industry has heard that….We couldn’t ‘just’ do it, or we would’ve ‘just’ done it.” - Deviant</p>
<p class="x-scope qowt-word-para-0">------</p>
<p class="x-scope qowt-word-para-0">LINKS:</p>





<p class="x-scope qowt-word-para-0">Spend some time with our guest, Deviant Ollam, on <a href='https://deviating.net'>his website</a>, <a href='https://twitter.com/deviantollam'>Twitter</a>, <a href='https://www.instagram.com/deviantollam/'>Instagram</a>, and <a href='https://www.youtube.com/user/DeviantOllam'>Youtube channel</a>. </p>
<p class="x-scope qowt-word-para-0">Keep up with Hacker Valley on <a href='https://hackervalley.com'>our website</a>, <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a>, and <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Follow Ron Eddings on <a href='https://twitter.com/ronaldeddings'>Twitter</a>. </p>
<p class="x-scope qowt-word-para-0">Catch up with Chris Cochan on <a href='https://twitter.com/chrishvm'>Twitter</a>.</p>

]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/33c298/HVR_for_HVS_Ep_1_1_9o85d.mp3" length="32931456" type="audio/mpeg"/>
        <itunes:summary><![CDATA[

In this season of Hacker Valley Red, we focus on cybersecurity legends in offensive operations with a legend in the physical pen testing and lockpicking: Deviant Ollam. As a pioneer in our industry and an author of two incredible books about lockpicking, Deviant shares his history from hobbyist to professional and all that he’s learned along the way about making the secrets of the hacking world accessible to all.
Timecoded Guide:
[01:28] Defining the pioneers in cybersecurity
[08:47] Deviant’s first explorations in lockpicking 
[16:03] Accessing and democratizing hacking secrets
[18:58] Becoming an author to transfer his knowledge
[23:12] Seeing the past, present, and future of hacking
Sponsor Links:
Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy! And be sure to come say hello to us at Black Hat at Booth #1686!
----------------
What does it mean to be a pioneer in cybersecurity? 
As our season focuses on legends, it’s important that we explain what makes these individuals such a vital part of our community. In the case of this episode, we explain that our guest Deviant is nothing short of a pioneer. Deviant has been willing to take on new challenges and revolutionize the industry throughout his career, influencing hundreds of individuals and leaving a lasting educational impact on the entire industry.
“That ‘zero to one’ part can be the hardest part of any progression in any field, but especially in cybersecurity.” — Chris
 
When you reflect on changing this whole industry, how does that make you feel?
Despite our guest’s legendary reputation, Deviant is humble about his achievements, caring more about how his work has impacted others than himself. What he focuses most on in his teaching, presentations, and writing is making lockpicking and penetration testing accessible and understandable. Instead of harboring secrets and perpetuating exclusionary policies, Deviant wants anyone to be able to master these skills and understand this knowledge.
“I’m not the first one who ever did this. What I like to think of my contributions is that they have chiefly been making it accessible and democratizing this knowledge.” — Deviant 





 
Do you think it's harder today to stand out than it was a couple decades ago?
For Deviant, our globalized internet and algorithm-focus social media sites are both a blessing and a curse. While knowledge can be found on every corner of the web and anyone can become familiar with information that was once borderline inaccessible, Deviant also recognizes that younger hackers and lockpickers will have a very different rise to success than he did years ago, especially due to fragmented audiences and tricky algorithms. 
“We have more avenues to put yourself on display, to put yourself out there than ever before, but that means the audience is fragmented and is spread so thin.” — Deviant
 
What piece of advice would you have for the folks that want to make an impact in security and technology and in our community today?
Although success will look different for newer members of our cybersecurity community, Deviant is confident that the younger innovative minds of the future will be able to solve so many of the long-standing problems within our industry. However, he reminds our younger audience that they need to still respect the tenured members of the cybersecurity world and to learn from them without oversimplifying t]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2054</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>226</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cyber Espionage &amp; Entrepreneurship with Karim Hijazi</title>
        <itunes:title>Cyber Espionage &amp; Entrepreneurship with Karim Hijazi</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cyber-espionage-entrepreneurship-with-karim-hijazi/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cyber-espionage-entrepreneurship-with-karim-hijazi/#comments</comments>        <pubDate>Tue, 26 Jul 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d68590bc-fdf7-31d8-bf9c-d6fcc8317c69</guid>
                                    <description><![CDATA[<p>Karim Hijazi, Founder & CEO at Prevailion and host of the Introverted Iconoclast podcast, comes to Hacker Valley Studio to discuss his varied experiences in entrepreneurship. With a humble start in bartending, Karim explains how learning about people inspired his exploration into counterespionage and cybersecurity. Armed with stories from the streets of NYC to the hallways of his own companies, this episode is a look into the mind of a successful entrepreneur and founder of 2 incredible businesses.

</p>
<p>Timecoded Guide:</p>
<p>[00:00] Bartending in NYC and its overlap with espionage and entrepreneurship</p>
<p>[07:14] Real-life knowledge application in cyber intelligence </p>
<p>[12:15] Founding Unveillance and being acquired by Mandiant </p>
<p>[18:22] Karim’s entrepreneurial mindset and his journey with Prevailion </p>
<p>[24:51] DIY podcasting with Introverted Iconoclast and learning to tell his stories</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> 
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>How do your experiences in bartending and espionage overlap?</p>
<p>The jobs taken as a means to an end just might teach something invaluable. This was the case for Karim, who took a job bartending to make ends meet while he figured out what he wanted to do with his future. At the time, cybersecurity and counterespionage weren’t on Karim’s radar, but bartending taught him about people; how they act when they want something and how to connect with them even in the busiest and most public places. Learning this changed the game for Karim when he got into the espionage world and assisted him even more so when he became an entrepreneur in the industry.</p>
<p>“It's just learning the way to slowly gain a confidence level with someone. It's actually where the word "con man" comes from, confidence man. Ultimately, that is how you get the information you need.” </p>
<p> </p>
<p>What are the different aspects that organizations or individuals look at with counterintelligence?</p>
<p>At Karim’s own firm, the shift from competitive intelligence to counterintelligence focused around three security aspects. One, identifying weak spots and vulnerabilities, noticing your points of exploitations and vectors of attack. Two, taking advantage of disinformation, using it to root out moles within an organization and throw off cyber adversaries. Finally, three, finding out where your information is going and noticing where there is weaker security than your own. Karim emphasizes that in this third aspect, it is not so much about an organization’s strategy when the information is still at home. It’s harder to secure information once it goes elsewhere.</p>
<p>“A controlled rumor within an organization can do several things. It can weed out a mole that you may have, a spy within your organization that maybe you don't know about, that's been able to be hired and gotten through the background checks and whatnot.”</p>
<p> </p>
<p>When you look back to starting your journey as an entrepreneur, what are some of the wrong assumptions you made early on? </p>
<p>Karim, like many entrepreneurs, was under the impression when he founded his first company, Unveillance, that he should be seeking to hire, not to do anything himself. While hiring is an important part of being a business owner, Karim has realized that it's better to learn how every piece of the machine of a company works before hiring. Trying things out for himself and taking a chance on his own abilities hasn’t been easy, but it’s made him a better leader for his employees. If they drop the ball or need his assistance, he’s able to lead from a place of understanding and call the shots with his own vision in mind and his own knowledge to back him up. </p>
<p>“As a CEO, it's almost imperative for you to go and try it all, even if you fumble through it and you get by with something that is subpar. It's better to have tried it and understand it, so now you know how to call the shots a little better.” </p>
<p> </p>
<p>What prompted you to start your podcast, Introverted Iconoclast?</p>
<p>Ironically enough, Karim’s podcast was a do-it-yourself project born out of having an employee drop the ball on creating it for him. Relying on himself and struggling his way through the beginning, Karim realized that podcasting is not just about the equipment and the idea behind it, it’s about the stories being told. Focusing on the lead up and context around some of his own career stories and professional highlights, Karim was able to discover the rhythm for his podcast and build a solid foundation of content that opened up doors for new topics to be addressed and new guests to welcome onto his show. </p>
<p>“It's very cathartic for me. Speaking the stories out loud, rather than just sort of regaling people over a dinner or thinking back on them nostalgically, is extremely interesting because you remember things you don't remember when you're casually talking about them.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Karim Hijazi on <a href='https://www.linkedin.com/in/karimhijazi/'>LinkedIn</a> and <a href='https://twitter.com/karimhijazi'>Twitter</a></p>
<p>Check out Prevailion on <a href='https://www.prevailion.com'>their website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Karim Hijazi, Founder & CEO at Prevailion and host of the Introverted Iconoclast podcast, comes to Hacker Valley Studio to discuss his varied experiences in entrepreneurship. With a humble start in bartending, Karim explains how learning about people inspired his exploration into counterespionage and cybersecurity. Armed with stories from the streets of NYC to the hallways of his own companies, this episode is a look into the mind of a successful entrepreneur and founder of 2 incredible businesses.<br>
<br>
</p>
<p>Timecoded Guide:</p>
<p>[00:00] Bartending in NYC and its overlap with espionage and entrepreneurship</p>
<p>[07:14] Real-life knowledge application in cyber intelligence </p>
<p>[12:15] Founding Unveillance and being acquired by Mandiant </p>
<p>[18:22] Karim’s entrepreneurial mindset and his journey with Prevailion </p>
<p>[24:51] DIY podcasting with Introverted Iconoclast and learning to tell his stories</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> <br>
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>How do your experiences in bartending and espionage overlap?</p>
<p>The jobs taken as a means to an end just might teach something invaluable. This was the case for Karim, who took a job bartending to make ends meet while he figured out what he wanted to do with his future. At the time, cybersecurity and counterespionage weren’t on Karim’s radar, but bartending taught him about people; how they act when they want something and how to connect with them even in the busiest and most public places. Learning this changed the game for Karim when he got into the espionage world and assisted him even more so when he became an entrepreneur in the industry.</p>
<p><em>“It's just learning the way to slowly gain a confidence level with someone. It's actually where the word "con man" comes from, confidence man. Ultimately, that is how you get the information you need.” </em></p>
<p> </p>
<p>What are the different aspects that organizations or individuals look at with counterintelligence?</p>
<p>At Karim’s own firm, the shift from competitive intelligence to counterintelligence focused around three security aspects. One, identifying weak spots and vulnerabilities, noticing your points of exploitations and vectors of attack. Two, taking advantage of disinformation, using it to root out moles within an organization and throw off cyber adversaries. Finally, three, finding out where your information is going and noticing where there is weaker security than your own. Karim emphasizes that in this third aspect, it is not so much about an organization’s strategy when the information is still at home. It’s harder to secure information once it goes elsewhere.</p>
<p><em>“A controlled rumor within an organization can do several things. It can weed out a mole that you may have, a spy within your organization that maybe you don't know about, that's been able to be hired and gotten through the background checks and whatnot.”</em></p>
<p> </p>
<p>When you look back to starting your journey as an entrepreneur, what are some of the wrong assumptions you made early on? </p>
<p>Karim, like many entrepreneurs, was under the impression when he founded his first company, Unveillance, that he should be seeking to hire, not to do anything himself. While hiring is an important part of being a business owner, Karim has realized that it's better to learn how every piece of the machine of a company works before hiring. Trying things out for himself and taking a chance on his own abilities hasn’t been easy, but it’s made him a better leader for his employees. If they drop the ball or need his assistance, he’s able to lead from a place of understanding and call the shots with his own vision in mind and his own knowledge to back him up. </p>
<p><em>“As a CEO, it's almost imperative for you to go and try it all, even if you fumble through it and you get by with something that is subpar. It's better to have tried it and understand it, so now you know how to call the shots a little better.” </em></p>
<p> </p>
<p>What prompted you to start your podcast, Introverted Iconoclast?</p>
<p>Ironically enough, Karim’s podcast was a do-it-yourself project born out of having an employee drop the ball on creating it for him. Relying on himself and struggling his way through the beginning, Karim realized that podcasting is not just about the equipment and the idea behind it, it’s about the stories being told. Focusing on the lead up and context around some of his own career stories and professional highlights, Karim was able to discover the rhythm for his podcast and build a solid foundation of content that opened up doors for new topics to be addressed and new guests to welcome onto his show. </p>
<p><em>“It's very cathartic for me. Speaking the stories out loud, rather than just sort of regaling people over a dinner or thinking back on them nostalgically, is extremely interesting because you remember things you don't remember when you're casually talking about them.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Karim Hijazi on <a href='https://www.linkedin.com/in/karimhijazi/'>LinkedIn</a> and <a href='https://twitter.com/karimhijazi'>Twitter</a></p>
<p>Check out Prevailion on <a href='https://www.prevailion.com'>their website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xfxqyy/HVS_audio_Karim_Hijazi9u0ey.mp3" length="48001604" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Karim Hijazi, Founder & CEO at Prevailion and host of the Introverted Iconoclast podcast, comes to Hacker Valley Studio to discuss his varied experiences in entrepreneurship. With a humble start in bartending, Karim explains how learning about people inspired his exploration into counterespionage and cybersecurity. Armed with stories from the streets of NYC to the hallways of his own companies, this episode is a look into the mind of a successful entrepreneur and founder of 2 incredible businesses.
Timecoded Guide:
[00:00] Bartending in NYC and its overlap with espionage and entrepreneurship
[07:14] Real-life knowledge application in cyber intelligence 
[12:15] Founding Unveillance and being acquired by Mandiant 
[18:22] Karim’s entrepreneurial mindset and his journey with Prevailion 
[24:51] DIY podcasting with Introverted Iconoclast and learning to tell his stories
 
Sponsor Links:
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out axonius.com/mindbody AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at academy.attackiq.com
 
How do your experiences in bartending and espionage overlap?
The jobs taken as a means to an end just might teach something invaluable. This was the case for Karim, who took a job bartending to make ends meet while he figured out what he wanted to do with his future. At the time, cybersecurity and counterespionage weren’t on Karim’s radar, but bartending taught him about people; how they act when they want something and how to connect with them even in the busiest and most public places. Learning this changed the game for Karim when he got into the espionage world and assisted him even more so when he became an entrepreneur in the industry.
“It's just learning the way to slowly gain a confidence level with someone. It's actually where the word "con man" comes from, confidence man. Ultimately, that is how you get the information you need.” 
 
What are the different aspects that organizations or individuals look at with counterintelligence?
At Karim’s own firm, the shift from competitive intelligence to counterintelligence focused around three security aspects. One, identifying weak spots and vulnerabilities, noticing your points of exploitations and vectors of attack. Two, taking advantage of disinformation, using it to root out moles within an organization and throw off cyber adversaries. Finally, three, finding out where your information is going and noticing where there is weaker security than your own. Karim emphasizes that in this third aspect, it is not so much about an organization’s strategy when the information is still at home. It’s harder to secure information once it goes elsewhere.
“A controlled rumor within an organization can do several things. It can weed out a mole that you may have, a spy within your organization that maybe you don't know about, that's been able to be hired and gotten through the background checks and whatnot.”
 
When you look back to starting your journey as an entrepreneur, what are some of the wrong assumptions you made early on? 
Karim, like many entrepreneurs, was under the impression when he founded his first company, Unveillance, that he should be seeking to hire, not to do anything himself. While hiring is an important part of being a business owner, Karim has realized that it's better to learn how every piece of the machine of a company works before hiring. Trying things out for himself and taking a chance on his own abilities hasn’t been easy, but it’s made him a better leader for his employees. If they drop the ball or need his assistance, he’s able to lead from a place of understanding and call the shots with his own vision in mind and his own knowledge to back hi]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1999</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>225</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Where Cyber Meets Content Creation with Henri Davis</title>
        <itunes:title>Where Cyber Meets Content Creation with Henri Davis</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/where-cyber-meets-content-creation-with-henri-davis/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/where-cyber-meets-content-creation-with-henri-davis/#comments</comments>        <pubDate>Tue, 19 Jul 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e2cb8ad6-8854-3e52-b037-847bb7873857</guid>
                                    <description><![CDATA[<p>Henri Davis, CEO of TechTual Consulting & host of the TechTual Talk Podcast, comes to Hacker Valley this week to talk about his history with cybersecurity incident response and the content he currently creates with the TechTual Chatter Youtube channel. From interview tips, passion vs creativity, the intersection of cybersecurity and content creation, Henri walks through the path his career has taken him on, as well as imparts advice on those looking to follow a similar journey.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Explaining incident response’s role in cyber </p>
<p>[07:15] Henri’s journey from incident response to TechTual CEO </p>
<p>[14:04] TechTual Consulting’s content about interviews & breaking into cybersecurity</p>
<p>[23:43] Marrying passions together within your career path</p>
<p>[29:54] Career path advice, cybersecurity vs content creation</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>If you could explain it to someone who has never been in a cybersecurity incident before, what is it like from the beginning of the incident through to closure?</p>
<p>While the majority of Henri’s work revolves currently on content creation, Henri’s background in cyber has extensive involvement in incident response. Incident response, although vital for today’s cyber industry, is sometimes misunderstood, even by cybersecurity practitioners. Henri explains that incident response is something you don’t see the usefulness of until you do it, and that attempting to work through an incident can feel like dealing with a car crash; you always have a risk of something like this happening, and it matters how you prepare for it.</p>
<p>“An incident is like a car wreck. A wreck is something that you have a potential risk for, but you drive with insurance hoping that if it does happen, you know what to do. And even though it happens, you're still not prepared for the actual wreck.”</p>
<p> </p>
<p>How are you hoping to help people, especially those breaking into cybersecurity, with TechTual’s content?</p>
<p>Henri’s focus on TechTual has given him an outlet for content creation and he hopes to use that platform to consistently help others. With the pandemic creating many jobless and job searching people, Henri saw an opportunity to focus on cybersecurity and IT content and assist outsiders looking to transition into the cyber industry. From tips about interviews to assistance with resumes, Henri often covers the basics with the mission to empower others, no matter their background, to embrace the ever-expanding industry. </p>
<p>“My goal is to say it's okay. Everyone has a starting place, everyone has to start from somewhere. Just build your skill set up and eventually, you won't even have to have your LinkedIn profile open for work.”</p>
<p> </p>
<p>When you find something that you're passionate about, and then you find another thing that you're passionate about, how do you marry those two together?</p>
<p>A marriage between passion is definitely possible, especially when looking at someone like Henri, who combines his love of content creation with his experience in cybersecurity and his passion for helping others. However, Henri is realistic in explaining that there’s a give and a take to the decisions made around your career path and how passions impact that. Henri recommends choosing a career path not just centered around passion, but instead focused on providing for yourself and your family. When your needs are fulfilled with your job, your passions and hobbies can grow and turn into legitimate projects in your life.</p>
<p>“If I was just by myself, I could just bet on myself, I always bet on myself. When you have that family aspect to it, you have to kind of weigh your options and see when the time is going to be right, and how you can do that.”</p>
<p> </p>
<p>What is that one piece of advice that you would have for somebody that's looking to take one path in their career journey, but they have many paths before them?</p>
<p>During episodes of TechTual Talk and TechTual Chatter, Henri focuses heavily on career advice, especially when it comes to making the right decisions in your career journey and behaving professionally during the interview and job search processes. When asked about advice he would give, Henri explains that prioritizing logical paths and being honest in the work you do will always have a positive impact on job prospects. For example, lying in the interview process can lead to long term dissatisfaction between employee and employer, and building a career without a logical path is never a strong foundation for anyone’s future.</p>
<p>“What is the most logical path for you right now? Which one is the lowest barrier to entry for you? What's going to take care of you, or whatever your situation is? Try to do that first, and then reserve time for your passion.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Henri Davis on <a href='https://www.linkedin.com/in/henri-davis/'>LinkedIn</a> and <a href='https://www.techualconsulting.com/about'>the TechTual Consulting Website</a>.</p>
<p>Check out Henri’s podcast, <a href='https://www.thetechtualtalk.com'>TechTual Talk</a>, and his Youtube Channel, <a href='https://www.youtube.com/channel/UCqgQD21JkzgaowYBCfivl0A'>TechTual Chatter.</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Henri Davis, CEO of TechTual Consulting & host of the TechTual Talk Podcast, comes to Hacker Valley this week to talk about his history with cybersecurity incident response and the content he currently creates with the TechTual Chatter Youtube channel. From interview tips, passion vs creativity, the intersection of cybersecurity and content creation, Henri walks through the path his career has taken him on, as well as imparts advice on those looking to follow a similar journey.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Explaining incident response’s role in cyber </p>
<p>[07:15] Henri’s journey from incident response to TechTual CEO </p>
<p>[14:04] TechTual Consulting’s content about interviews & breaking into cybersecurity</p>
<p>[23:43] Marrying passions together within your career path</p>
<p>[29:54] Career path advice, cybersecurity vs content creation</p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>If you could explain it to someone who has never been in a cybersecurity incident before, what is it like from the beginning of the incident through to closure?</p>
<p>While the majority of Henri’s work revolves currently on content creation, Henri’s background in cyber has extensive involvement in incident response. Incident response, although vital for today’s cyber industry, is sometimes misunderstood, even by cybersecurity practitioners. Henri explains that incident response is something you don’t see the usefulness of until you do it, and that attempting to work through an incident can feel like dealing with a car crash; you always have a risk of something like this happening, and it matters how you prepare for it.</p>
<p><em>“An incident is like a car wreck. A wreck is something that you have a potential risk for, but you drive with insurance hoping that if it does happen, you know what to do. And even though it happens, you're still not prepared for the actual wreck.”</em></p>
<p> </p>
<p>How are you hoping to help people, especially those breaking into cybersecurity, with TechTual’s content?</p>
<p>Henri’s focus on TechTual has given him an outlet for content creation and he hopes to use that platform to consistently help others. With the pandemic creating many jobless and job searching people, Henri saw an opportunity to focus on cybersecurity and IT content and assist outsiders looking to transition into the cyber industry. From tips about interviews to assistance with resumes, Henri often covers the basics with the mission to empower others, no matter their background, to embrace the ever-expanding industry. </p>
<p><em>“My goal is to say it's okay. Everyone has a starting place, everyone has to start from somewhere. Just build your skill set up and eventually, you won't even have to have your LinkedIn profile open for work.”</em></p>
<p> </p>
<p>When you find something that you're passionate about, and then you find another thing that you're passionate about, how do you marry those two together?</p>
<p>A marriage between passion is definitely possible, especially when looking at someone like Henri, who combines his love of content creation with his experience in cybersecurity and his passion for helping others. However, Henri is realistic in explaining that there’s a give and a take to the decisions made around your career path and how passions impact that. Henri recommends choosing a career path not just centered around passion, but instead focused on providing for yourself and your family. When your needs are fulfilled with your job, your passions and hobbies can grow and turn into legitimate projects in your life.</p>
<p><em>“If I was just by myself, I could just bet on myself, I always bet on myself. When you have that family aspect to it, you have to kind of weigh your options and see when the time is going to be right, and how you can do that.”</em></p>
<p> </p>
<p>What is that one piece of advice that you would have for somebody that's looking to take one path in their career journey, but they have many paths before them?</p>
<p>During episodes of TechTual Talk and TechTual Chatter, Henri focuses heavily on career advice, especially when it comes to making the right decisions in your career journey and behaving professionally during the interview and job search processes. When asked about advice he would give, Henri explains that prioritizing logical paths and being honest in the work you do will always have a positive impact on job prospects. For example, lying in the interview process can lead to long term dissatisfaction between employee and employer, and building a career without a logical path is never a strong foundation for anyone’s future.</p>
<p><em>“What is the most logical path for you right now? Which one is the lowest barrier to entry for you? What's going to take care of you, or whatever your situation is? Try to do that first, and then reserve time for your passion.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Henri Davis on <a href='https://www.linkedin.com/in/henri-davis/'>LinkedIn</a> and <a href='https://www.techualconsulting.com/about'>the TechTual Consulting Website</a>.</p>
<p>Check out Henri’s podcast, <a href='https://www.thetechtualtalk.com'>TechTual Talk</a>, and his Youtube Channel, <a href='https://www.youtube.com/channel/UCqgQD21JkzgaowYBCfivl0A'>TechTual Chatter.</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9kxp93/HVS_audio_Henri_Davis75dib.mp3" length="47242432" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Henri Davis, CEO of TechTual Consulting & host of the TechTual Talk Podcast, comes to Hacker Valley this week to talk about his history with cybersecurity incident response and the content he currently creates with the TechTual Chatter Youtube channel. From interview tips, passion vs creativity, the intersection of cybersecurity and content creation, Henri walks through the path his career has taken him on, as well as imparts advice on those looking to follow a similar journey.
 
Timecoded Guide:
[00:00] Explaining incident response’s role in cyber 
[07:15] Henri’s journey from incident response to TechTual CEO 
[14:04] TechTual Consulting’s content about interviews & breaking into cybersecurity
[23:43] Marrying passions together within your career path
[29:54] Career path advice, cybersecurity vs content creation
 
Sponsor Links:
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out axonius.com/mindbody 
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at academy.attackiq.com
 
If you could explain it to someone who has never been in a cybersecurity incident before, what is it like from the beginning of the incident through to closure?
While the majority of Henri’s work revolves currently on content creation, Henri’s background in cyber has extensive involvement in incident response. Incident response, although vital for today’s cyber industry, is sometimes misunderstood, even by cybersecurity practitioners. Henri explains that incident response is something you don’t see the usefulness of until you do it, and that attempting to work through an incident can feel like dealing with a car crash; you always have a risk of something like this happening, and it matters how you prepare for it.
“An incident is like a car wreck. A wreck is something that you have a potential risk for, but you drive with insurance hoping that if it does happen, you know what to do. And even though it happens, you're still not prepared for the actual wreck.”
 
How are you hoping to help people, especially those breaking into cybersecurity, with TechTual’s content?
Henri’s focus on TechTual has given him an outlet for content creation and he hopes to use that platform to consistently help others. With the pandemic creating many jobless and job searching people, Henri saw an opportunity to focus on cybersecurity and IT content and assist outsiders looking to transition into the cyber industry. From tips about interviews to assistance with resumes, Henri often covers the basics with the mission to empower others, no matter their background, to embrace the ever-expanding industry. 
“My goal is to say it's okay. Everyone has a starting place, everyone has to start from somewhere. Just build your skill set up and eventually, you won't even have to have your LinkedIn profile open for work.”
 
When you find something that you're passionate about, and then you find another thing that you're passionate about, how do you marry those two together?
A marriage between passion is definitely possible, especially when looking at someone like Henri, who combines his love of content creation with his experience in cybersecurity and his passion for helping others. However, Henri is realistic in explaining that there’s a give and a take to the decisions made around your career path and how passions impact that. Henri recommends choosing a career path not just centered around passion, but instead focused on providing for yourself and your family. When your needs are fulfilled with your job, your passions and hobbies can grow and turn into legitimate projects in your life.
“If I was just by myself, I could just bet on myself, I always bet on myself. When you have that family aspect to]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1968</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>224</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Financial Independence &amp; Freedom with Eddie Thomason</title>
        <itunes:title>Financial Independence &amp; Freedom with Eddie Thomason</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/financial-independence-freedom-with-eddie-thomason/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/financial-independence-freedom-with-eddie-thomason/#comments</comments>        <pubDate>Tue, 12 Jul 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9f4519ea-d947-31ad-b234-bfac82acaa7f</guid>
                                    <description><![CDATA[<p>Eddie Thomason, bestselling author, speaker, consultant, and creator of the Simply Secure podcast, comes to Hacker Valley Studio to discuss financial independence, the freedom of a healthy work-life balance, and habits that have helped him succeed. As a father of two with a full-time job and a thriving content creation career, Eddie explains not only how he does it all, but also how much he cares about helping other security professionals achieve the same level of success.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Eddie’s background & his current cyber role with Data Locker</p>
<p>[06:07] Growing up in Baltimore City & finding his podcasting inspiration</p>
<p>[13:10] Balancing work & life with calendar planning </p>
<p>[19:13] 4 essential habits: reading, listening, association, & work</p>
<p>[28:20] Advice for digital content creators & security professionals </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>What is the connection between cybersecurity and this financial independence and freedom mindset you have?</p>
<p>In his book, on his podcast, and throughout his career, Eddie has emphasized the importance of financial independence, especially when it comes to diversifying his income. Instead of calling his projects and revenue streams “side hustles,” Eddie prefers to think of them as baby businesses; small businesses in the infant stage that have massive professional potential. With COVID severely changing Eddie’s economic perspective, he firmly believes in having multiple sources of income and in fostering the growth of each project until he’s seeing revenue to rival the full-time income he already makes in his day job.</p>
<p>“If you look at it as a side hustle, that's all it's ever going to be, it's just something that creates a little bit of extra income, but if you look at it as a baby business, that could really replace the income that you currently make.” </p>
<p> </p>
<p>How do you balance content creation, day-to-day job responsibilities, and fatherhood? </p>
<p>Being an author and a cybersecurity consultant can both already be demanding jobs, but throwing 2 young children and an entire podcast into the mix makes Eddie’s success borderline hard to believe. However, Eddie credits his success to understanding his priorities and heavily managing his calendar. Entrepreneurs need to think of their schedules down to the minute, maybe even the second. Eddie is not afraid to set aside time for his children, even if it means he has to work in the evenings on his own entrepreneurial goals. Eddie knows that when he puts his calendar together, he is giving himself the time he needs and deserves to work and spend time on what’s important to him, even alongside all his other responsibilities as an employee.</p>
<p>“If you're going to work for 8 hours a day for somebody else's dream, then why can't you come home on a daily basis and give yourself at least 2 hours? We're not talking about a whole nother 8, but give yourself at least two hours. From the hours of 5 to 7, what can you do to invest in yourself?”</p>
<p> </p>
<p>What are some successful habits you’ve picked up throughout your life and that you mention in your book, Unlock Yourself?</p>
<p>Four successful habits guide Eddie through his busy life as an entrepreneur and full-time worker, the first of which is reading. Reading is a source of knowledge and connection with others, and Eddie has learned amazing lessons from reading books and articles. The second is listening, which, just like reading, offers Eddie the ability to learn and to connect with the world. Coming in third is association. Surrounding himself with people who inspire him and are dedicated to his goals reminds Eddie of how badly he wants this. Fourth and finally, work. Putting in the work without expecting the success to happen overnight helps Eddie with his patience and always leads to a much better payoff.</p>
<p>“If you surround yourself with incredible people who inspire you and uplift you and encourage you, then there's no reason why you should not get to your goal. There's no reason why you should give up because you have people that understand how badly you want to accomplish your goals. They won't let you quit on yourself.” </p>
<p> </p>
<p>Do you have advice for those looking to achieve success similar to you? </p>
<p>Although it may seem daunting to tackle a career as extensive as Eddie’s, Eddie is confident that his mindset around work can help anyone become successful. Most specifically, amongst all the entrepreneurial advice Eddie gives, his strongest point centers around understanding the “why.” Knowing why he does what he does not only helps keep Eddie on track for a solid work-life balance, it also allows him to see the impact his work has on the people around him. With his wife being a stay-at-home mom and his children being young, Eddie understands the necessity of his hard work and wants to inspire his family with his continued success.</p>
<p>“If I don't perform, the people around me suffer. If I don't do what I need to do, then the people around me are not going to be better off. The impact that it is going to have on them is so much heavier than the impact that it'll actually have on me individually.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Eddie Thomason on <a href='https://eddiethomason.com'>his website</a>, <a href='https://www.youtube.com/channel/UC7UxSUwaDlQarb0yswQ_-cQ'>Youtube</a>, <a href='https://www.linkedin.com/company/simply-secure-podcast'>LinkedIn</a>, <a href='https://www.instagram.com/simplysecurepodcast/'>Instagram</a>, and <a href='https://www.facebook.com/Simply-Secure-Podcast'>Facebook</a></p>
<p>Check out Eddie’s podcast, <a href='https://linktr.ee/ssp2022'>the Simply Secure Podcast</a>, and his book, <a href='https://eddiethomason.com/book/'>Unlock Yourself</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Eddie Thomason, bestselling author, speaker, consultant, and creator of the Simply Secure podcast, comes to Hacker Valley Studio to discuss financial independence, the freedom of a healthy work-life balance, and habits that have helped him succeed. As a father of two with a full-time job and a thriving content creation career, Eddie explains not only how he does it all, but also how much he cares about helping other security professionals achieve the same level of success.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[00:00] Eddie’s background & his current cyber role with Data Locker</p>
<p>[06:07] Growing up in Baltimore City & finding his podcasting inspiration</p>
<p>[13:10] Balancing work & life with calendar planning </p>
<p>[19:13] 4 essential habits: reading, listening, association, & work</p>
<p>[28:20] Advice for digital content creators & security professionals </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at <a href='http://academy.attackiq.com'>academy.attackiq.com</a></p>
<p> </p>
<p>What is the connection between cybersecurity and this financial independence and freedom mindset you have?</p>
<p>In his book, on his podcast, and throughout his career, Eddie has emphasized the importance of financial independence, especially when it comes to diversifying his income. Instead of calling his projects and revenue streams “side hustles,” Eddie prefers to think of them as baby businesses; small businesses in the infant stage that have massive professional potential. With COVID severely changing Eddie’s economic perspective, he firmly believes in having multiple sources of income and in fostering the growth of each project until he’s seeing revenue to rival the full-time income he already makes in his day job.</p>
<p><em>“If you look at it as a side hustle, that's all it's ever going to be, it's just something that creates a little bit of extra income, but if you look at it as a baby business, that could really replace the income that you currently make.” </em></p>
<p> </p>
<p>How do you balance content creation, day-to-day job responsibilities, and fatherhood? </p>
<p>Being an author and a cybersecurity consultant can both already be demanding jobs, but throwing 2 young children and an entire podcast into the mix makes Eddie’s success borderline hard to believe. However, Eddie credits his success to understanding his priorities and heavily managing his calendar. Entrepreneurs need to think of their schedules down to the minute, maybe even the second. Eddie is not afraid to set aside time for his children, even if it means he has to work in the evenings on his own entrepreneurial goals. Eddie knows that when he puts his calendar together, he is giving himself the time he needs and deserves to work and spend time on what’s important to him, even alongside all his other responsibilities as an employee.</p>
<p><em>“If you're going to work for 8 hours a day for somebody else's dream, then why can't you come home on a daily basis and give yourself at least 2 hours? We're not talking about a whole nother 8, but give yourself at least two hours. From the hours of 5 to 7, what can you do to invest in yourself?”</em></p>
<p> </p>
<p>What are some successful habits you’ve picked up throughout your life and that you mention in your book, <em>Unlock Yourself</em>?</p>
<p>Four successful habits guide Eddie through his busy life as an entrepreneur and full-time worker, the first of which is reading. Reading is a source of knowledge and connection with others, and Eddie has learned amazing lessons from reading books and articles. The second is listening, which, just like reading, offers Eddie the ability to learn and to connect with the world. Coming in third is association. Surrounding himself with people who inspire him and are dedicated to his goals reminds Eddie of how badly he wants this. Fourth and finally, work. Putting in the work without expecting the success to happen overnight helps Eddie with his patience and always leads to a much better payoff.</p>
<p><em>“If you surround yourself with incredible people who inspire you and uplift you and encourage you, then there's no reason why you should not get to your goal. There's no reason why you should give up because you have people that understand how badly you want to accomplish your goals. They won't let you quit on yourself.” </em></p>
<p> </p>
<p>Do you have advice for those looking to achieve success similar to you? </p>
<p>Although it may seem daunting to tackle a career as extensive as Eddie’s, Eddie is confident that his mindset around work can help anyone become successful. Most specifically, amongst all the entrepreneurial advice Eddie gives, his strongest point centers around understanding the “why.” Knowing why he does what he does not only helps keep Eddie on track for a solid work-life balance, it also allows him to see the impact his work has on the people around him. With his wife being a stay-at-home mom and his children being young, Eddie understands the necessity of his hard work and wants to inspire his family with his continued success.</p>
<p><em>“If I don't perform, the people around me suffer. If I don't do what I need to do, then the people around me are not going to be better off. The impact that it is going to have on them is so much heavier than the impact that it'll actually have on me individually.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Keep up with Eddie Thomason on <a href='https://eddiethomason.com'>his website</a>, <a href='https://www.youtube.com/channel/UC7UxSUwaDlQarb0yswQ_-cQ'>Youtube</a>, <a href='https://www.linkedin.com/company/simply-secure-podcast'>LinkedIn</a>, <a href='https://www.instagram.com/simplysecurepodcast/'>Instagram</a>, and <a href='https://www.facebook.com/Simply-Secure-Podcast'>Facebook</a></p>
<p>Check out Eddie’s podcast, <a href='https://linktr.ee/ssp2022'>the Simply Secure Podcast</a>, and his book, <a href='https://eddiethomason.com/book/'>Unlock Yourself</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fb98u7/HVS_audio_Eddie_Thomason_v28jnwn.mp3" length="48852928" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Eddie Thomason, bestselling author, speaker, consultant, and creator of the Simply Secure podcast, comes to Hacker Valley Studio to discuss financial independence, the freedom of a healthy work-life balance, and habits that have helped him succeed. As a father of two with a full-time job and a thriving content creation career, Eddie explains not only how he does it all, but also how much he cares about helping other security professionals achieve the same level of success.
 
Timecoded Guide:
[00:00] Eddie’s background & his current cyber role with Data Locker
[06:07] Growing up in Baltimore City & finding his podcasting inspiration
[13:10] Balancing work & life with calendar planning 
[19:13] 4 essential habits: reading, listening, association, & work
[28:20] Advice for digital content creators & security professionals 
 
Sponsor Links:
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out axonius.com/mindbody 
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at academy.attackiq.com
 
What is the connection between cybersecurity and this financial independence and freedom mindset you have?
In his book, on his podcast, and throughout his career, Eddie has emphasized the importance of financial independence, especially when it comes to diversifying his income. Instead of calling his projects and revenue streams “side hustles,” Eddie prefers to think of them as baby businesses; small businesses in the infant stage that have massive professional potential. With COVID severely changing Eddie’s economic perspective, he firmly believes in having multiple sources of income and in fostering the growth of each project until he’s seeing revenue to rival the full-time income he already makes in his day job.
“If you look at it as a side hustle, that's all it's ever going to be, it's just something that creates a little bit of extra income, but if you look at it as a baby business, that could really replace the income that you currently make.” 
 
How do you balance content creation, day-to-day job responsibilities, and fatherhood? 
Being an author and a cybersecurity consultant can both already be demanding jobs, but throwing 2 young children and an entire podcast into the mix makes Eddie’s success borderline hard to believe. However, Eddie credits his success to understanding his priorities and heavily managing his calendar. Entrepreneurs need to think of their schedules down to the minute, maybe even the second. Eddie is not afraid to set aside time for his children, even if it means he has to work in the evenings on his own entrepreneurial goals. Eddie knows that when he puts his calendar together, he is giving himself the time he needs and deserves to work and spend time on what’s important to him, even alongside all his other responsibilities as an employee.
“If you're going to work for 8 hours a day for somebody else's dream, then why can't you come home on a daily basis and give yourself at least 2 hours? We're not talking about a whole nother 8, but give yourself at least two hours. From the hours of 5 to 7, what can you do to invest in yourself?”
 
What are some successful habits you’ve picked up throughout your life and that you mention in your book, Unlock Yourself?
Four successful habits guide Eddie through his busy life as an entrepreneur and full-time worker, the first of which is reading. Reading is a source of knowledge and connection with others, and Eddie has learned amazing lessons from reading books and articles. The second is listening, which, just like reading, offers Eddie the ability to learn and to connect with the world. Coming in third is association. Surrounding himself with people who inspire him and are dedicated to his]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2035</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>223</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Future of Artificial Intelligence with Jeff Gardner</title>
        <itunes:title>The Future of Artificial Intelligence with Jeff Gardner</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-future-of-artificial-intelligence-with-jeff-gardner/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-future-of-artificial-intelligence-with-jeff-gardner/#comments</comments>        <pubDate>Tue, 05 Jul 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a91c05fd-626a-3fb1-a356-8b7f0a62f3f9</guid>
                                    <description><![CDATA[<p>Jeff Gardner, CISO at Germantown Technologies, comes to Hacker Valley Studio this week to talk about the future of cybersecurity and what up-and-coming hackers may encounter on their journey into an ever-evolving industry. With a specific focus and interest in artificial intelligence, or AI, Jeff’s discussion in this episode covers the current perception of AI in tech, the timeline of when we may see highly-intelligent AI come into play, and what the future of AI looks like from a cybersecurity standpoint. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[03:54] Focusing on numerous areas during his day job as CISO and understanding the necessity of a strong team of trusted cyber professionals</p>
<p>[09:00] Getting excited about current and upcoming technology in cyber while remaining realistic about present day limitations and needs </p>
<p>[15:53] Automating security analyst tasks and finding the quality control balance between machine knowledge and human intuition</p>
<p>[22:50] Breaking down the concept of “bad AI” and understanding how to address the issues that may arise if AI is used for nefarious purposes</p>
<p>[28:22] Addressing the future of unique thought and creativity for computers and for human beings </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. Be sure to check out the Attack IQ Academy for free cybersecurity training, featuring Ron and Chris of Hacker Valley Studio, at <a href='http://academy.attackiq.com/'>academy.attackiq.com</a></p>
<p> </p>
<p>What are some of the things that you are expecting the next generation to be doing when it comes to bypassing security in a way that they won't get caught?</p>
<p>Jeff, like many hackers and security pros in the industry, started his journey in cyber by hacking different systems from his own computer as a kid just because he could get away with it. While that type of hacking still exists, there are new ways for systems to manage and counteract these threats and attacks, as well as expose who is behind it. The new generation of hackers will learn in different ways on different technology, and Jeff is confident that what they choose will come because of where the security industry is already going, with devices that use machine learning and pattern learning, as well as the continuing development of AI. </p>
<p>“When it comes to artificial intelligence and all the myriad of models and neurons and all that, we're still pretty much at single neuron, maybe double neuron systems. But, as things evolve, it's gonna be harder and harder to bypass those defenses.” </p>
<p> </p>
<p>What is your perspective of AI not being here and available for us yet?</p>
<p>In Jeff’s opinion, the biggest thing missing from our current AI to really make it the intelligence we claim it is, is creativity. We have smart technology, we have technology that can automate tasks and can be told very easily what to do, all through feeding in data and processes. However, Jeff points out that most of what we call artificial intelligence in the cyber and tech industries doesn’t have the creativity or the human intuition to match the human brain. We’re in an exciting escalation of technology and intelligence, but we aren’t at true AI yet. </p>
<p>“I think one of the things that's missing from AI, and it's being solved rapidly, is creativity. We train it through models, but those models are only the data that we give it. How smart is the system if you just give it a plethora of data and have it come to its own conclusions?” </p>
<p> </p>
<p>How far away do you think we are from highly intelligent AI?</p>
<p>Although the futuristic AI that appears in science fiction movies and books isn’t here yet, Jeff believes we aren’t far off from a level of computer technology that we have never seen before. With the quantum leaps in technology that we’ve continued to see, namely in computers starting to solve math problems we’ve never even thought of or engage with art in a way we’ve never dreamed possible. What we see now is the tip of the iceberg, but the future holds massive potential for what AI will look like and what automation of certain tasks will look like, with accuracy rates for analysis technology continuing to narrow to 99.9% accuracy rates. </p>
<p>“When you can get to that level of processing speed, you can do things we can't even dream of, and that's what they're doing now. They're solving math problems in ways that humans have never thought of, they're creating art in ways that humans couldn't imagine.”</p>
<p> </p>
<p>How do we create AI for good? </p>
<p>The fear of the “evil” or “bad” artificial intelligence comes up frequently when we discuss what the future of AI may look like from a security standpoint. However, Jeff is confident that the issue is not as black and white as our fears make it. For starters, when we understand the purpose behind what “bad” AI might be programmed to do, we can put other measures in place to combat it. On the other hand, the struggle of good vs bad, right vs wrong has been a problem in hacking and in cyber since the first white hats and black hats came into existence. The fear of bad AI is a philosophical discussion instead of just a technical conversation.</p>
<p>“I think it all comes down to, like you said, purpose. What's the purpose of the bad AI? What's it trying to do? Is it trying to hack our systems and steal the data? Is it trying to cause physical harm?”</p>
<p>---------------</p>
<p>Links:</p>
<p>Stay in touch with Jeff Gardner on <a href='https://www.linkedin.com/in/jeffrey-g-56944252/'>LinkedIn</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Jeff Gardner, CISO at Germantown Technologies, comes to Hacker Valley Studio this week to talk about the future of cybersecurity and what up-and-coming hackers may encounter on their journey into an ever-evolving industry. With a specific focus and interest in artificial intelligence, or AI, Jeff’s discussion in this episode covers the current perception of AI in tech, the timeline of when we may see highly-intelligent AI come into play, and what the future of AI looks like from a cybersecurity standpoint. </p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[03:54] Focusing on numerous areas during his day job as CISO and understanding the necessity of a strong team of trusted cyber professionals</p>
<p>[09:00] Getting excited about current and upcoming technology in cyber while remaining realistic about present day limitations and needs </p>
<p>[15:53] Automating security analyst tasks and finding the quality control balance between machine knowledge and human intuition</p>
<p>[22:50] Breaking down the concept of “bad AI” and understanding how to address the issues that may arise if AI is used for nefarious purposes</p>
<p>[28:22] Addressing the future of unique thought and creativity for computers and for human beings </p>
<p> </p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a> </p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. Be sure to check out the Attack IQ Academy for free cybersecurity training, featuring Ron and Chris of Hacker Valley Studio, at <a href='http://academy.attackiq.com/'>academy.attackiq.com</a></p>
<p> </p>
<p>What are some of the things that you are expecting the next generation to be doing when it comes to bypassing security in a way that they won't get caught?</p>
<p>Jeff, like many hackers and security pros in the industry, started his journey in cyber by hacking different systems from his own computer as a kid just because he could get away with it. While that type of hacking still exists, there are new ways for systems to manage and counteract these threats and attacks, as well as expose who is behind it. The new generation of hackers will learn in different ways on different technology, and Jeff is confident that what they choose will come because of where the security industry is already going, with devices that use machine learning and pattern learning, as well as the continuing development of AI. </p>
<p><em>“When it comes to artificial intelligence and all the myriad of models and neurons and all that, we're still pretty much at single neuron, maybe double neuron systems. But, as things evolve, it's gonna be harder and harder to bypass those defenses.” </em></p>
<p> </p>
<p>What is your perspective of AI not being here and available for us yet?</p>
<p>In Jeff’s opinion, the biggest thing missing from our current AI to really make it the intelligence we claim it is, is creativity. We have smart technology, we have technology that can automate tasks and can be told very easily what to do, all through feeding in data and processes. However, Jeff points out that most of what we call artificial intelligence in the cyber and tech industries doesn’t have the creativity or the human intuition to match the human brain. We’re in an exciting escalation of technology and intelligence, but we aren’t at true AI yet. </p>
<p><em>“I think one of the things that's missing from AI, and it's being solved rapidly, is creativity. We train it through models, but those models are only the data that we give it. How smart is the system if you just give it a plethora of data and have it come to its own conclusions?” </em></p>
<p> </p>
<p>How far away do you think we are from highly intelligent AI?</p>
<p>Although the futuristic AI that appears in science fiction movies and books isn’t here yet, Jeff believes we aren’t far off from a level of computer technology that we have never seen before. With the quantum leaps in technology that we’ve continued to see, namely in computers starting to solve math problems we’ve never even thought of or engage with art in a way we’ve never dreamed possible. What we see now is the tip of the iceberg, but the future holds massive potential for what AI will look like and what automation of certain tasks will look like, with accuracy rates for analysis technology continuing to narrow to 99.9% accuracy rates. </p>
<p><em>“When you can get to that level of processing speed, you can do things we can't even dream of, and that's what they're doing now. They're solving math problems in ways that humans have never thought of, they're creating art in ways that humans couldn't imagine.”</em></p>
<p> </p>
<p>How do we create AI for good? </p>
<p>The fear of the “evil” or “bad” artificial intelligence comes up frequently when we discuss what the future of AI may look like from a security standpoint. However, Jeff is confident that the issue is not as black and white as our fears make it. For starters, when we understand the purpose behind what “bad” AI might be programmed to do, we can put other measures in place to combat it. On the other hand, the struggle of good vs bad, right vs wrong has been a problem in hacking and in cyber since the first white hats and black hats came into existence. The fear of bad AI is a philosophical discussion instead of just a technical conversation.</p>
<p><em>“I think it all comes down to, like you said, purpose. What's the purpose of the bad AI? What's it trying to do? Is it trying to hack our systems and steal the data? Is it trying to cause physical harm?”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Stay in touch with Jeff Gardner on <a href='https://www.linkedin.com/in/jeffrey-g-56944252/'>LinkedIn</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rwyfea/HVS_audio_Jeffrey_Gardner_v2alyft.mp3" length="47103590" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Jeff Gardner, CISO at Germantown Technologies, comes to Hacker Valley Studio this week to talk about the future of cybersecurity and what up-and-coming hackers may encounter on their journey into an ever-evolving industry. With a specific focus and interest in artificial intelligence, or AI, Jeff’s discussion in this episode covers the current perception of AI in tech, the timeline of when we may see highly-intelligent AI come into play, and what the future of AI looks like from a cybersecurity standpoint. 
 
Timecoded Guide:
[03:54] Focusing on numerous areas during his day job as CISO and understanding the necessity of a strong team of trusted cyber professionals
[09:00] Getting excited about current and upcoming technology in cyber while remaining realistic about present day limitations and needs 
[15:53] Automating security analyst tasks and finding the quality control balance between machine knowledge and human intuition
[22:50] Breaking down the concept of “bad AI” and understanding how to address the issues that may arise if AI is used for nefarious purposes
[28:22] Addressing the future of unique thought and creativity for computers and for human beings 
 
Sponsor Links:
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Want to learn more about how Mindbody enhanced their asset visibility and increased their cybersecurity maturity rating with Axonius? Check out axonius.com/mindbody 
AttackIQ - better insights, better decisions, and real security outcomes. Be sure to check out the Attack IQ Academy for free cybersecurity training, featuring Ron and Chris of Hacker Valley Studio, at academy.attackiq.com
 
What are some of the things that you are expecting the next generation to be doing when it comes to bypassing security in a way that they won't get caught?
Jeff, like many hackers and security pros in the industry, started his journey in cyber by hacking different systems from his own computer as a kid just because he could get away with it. While that type of hacking still exists, there are new ways for systems to manage and counteract these threats and attacks, as well as expose who is behind it. The new generation of hackers will learn in different ways on different technology, and Jeff is confident that what they choose will come because of where the security industry is already going, with devices that use machine learning and pattern learning, as well as the continuing development of AI. 
“When it comes to artificial intelligence and all the myriad of models and neurons and all that, we're still pretty much at single neuron, maybe double neuron systems. But, as things evolve, it's gonna be harder and harder to bypass those defenses.” 
 
What is your perspective of AI not being here and available for us yet?
In Jeff’s opinion, the biggest thing missing from our current AI to really make it the intelligence we claim it is, is creativity. We have smart technology, we have technology that can automate tasks and can be told very easily what to do, all through feeding in data and processes. However, Jeff points out that most of what we call artificial intelligence in the cyber and tech industries doesn’t have the creativity or the human intuition to match the human brain. We’re in an exciting escalation of technology and intelligence, but we aren’t at true AI yet. 
“I think one of the things that's missing from AI, and it's being solved rapidly, is creativity. We train it through models, but those models are only the data that we give it. How smart is the system if you just give it a plethora of data and have it come to its own conclusions?” 
 
How far away do you think we are from highly intelligent AI?
Although the futuristic AI that appears in science fiction movies and books isn’t here yet, Jeff believes we aren’t far off from a level of computer technology that we have never seen before. With the quantum leaps in technology that we’ve continued to see, namely in computer]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1962</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>222</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Learning to Lead Future Tech Leaders with Dr. Stacey Ashley</title>
        <itunes:title>Learning to Lead Future Tech Leaders with Dr. Stacey Ashley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/learning-to-lead-future-tech-leaders-with-stacey-ashley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/learning-to-lead-future-tech-leaders-with-stacey-ashley/#comments</comments>        <pubDate>Tue, 28 Jun 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/0c35d339-977a-3d81-820a-55fe849ffa22</guid>
                                    <description><![CDATA[<p>Leadership expert, Dr. Stacey Ashley, joins us at the Hacker Valley Studio to talk about her journey from the corporate world of leadership to her current roles in consulting and coaching. As a speaker, author, and educator for leaders, especially executive and C-level leaders, Dr. Ashley shares foundational skills needed to go from expert to leader, mindset shifts that need to occur regarding our perspective on our own leadership responsibilities, and experiences that inspired her to become an author. </p>
<p>Timecoded Guide: </p>
<p>[02:58] Developing stronger leadership capabilities and understanding the value of scaling work with her decision to become an author  </p>
<p>[09:51] Jumping over the hurdles and obstacles to becoming a better leader through mindfulness, practice, and checking the privilege of your executive role </p>
<p>[13:45] Knowing when to get off the treadmill of busyness and focusing on setting better boundaries for yourself as a leader </p>
<p>[20:53] Cultivating the next level of leadership with a focus on mentoring, role modeling, and coaching  </p>
<p>[25:40] Providing advice for future leaders and understanding the values of awareness and of developing your listening skills  </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced its asset visibility and increased its cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a></p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at  <a href='http://academy.attackiq.com/'>academy.attackiq.com</a> </p>
<p> </p>
<p>What have been some of the challenges that you've seen, out of yourself or from others, to start to cultivate that leadership ability? </p>
<p>There’s a common path to leadership in many industries, especially tech and cyber, where becoming good at your job skyrockets you into leadership spaces and executive roles. While this is often an achievement worth being proud of, Dr. Ashley warns that we rarely mentor and teach these newly appointed leaders how to lead. Expert skills are important to have, but not being able to satisfy your executive role and your leadership responsibilities with developed leadership skills leads to confusion and dissatisfaction amongst employees and clients who aren’t receiving the type of leadership guidance normally delivered by someone in that role. </p>
<p>“It's great to have those specialist skills, but it's not enough. If you're going to lead people, if you're going to lead a program of work, if you're going to be a thought leader, or an influencer, or any of those things, you need to have more skills.” </p>
<p> </p>
<p>What are some of the common obstacles that people have that keeps them from being the best leader that they can be? </p>
<p>Dr. Ashley is the first to admit that tech leadership issues and obstacles are hardly a one size fits all. However, a commonality she sees is a focus on busyness instead of on active leadership practices. Being “busy” does not translate into high levels of productivity, especially for leaders in prominent company or industry roles. She advises that a better focus for leaders and aspiring executives is to practice their leadership skills and prioritize finding a coach or mentor, instead of just filling up their schedule with unnecessary busy work. </p>
<p>“This whole concept of busy isn't actually very effective. Busy is just doing stuff for the sake of doing stuff. One of the things that I find that great leaders do is that they're really clear about where they make a difference, where they add value, where they can make a real contribution. They don't focus on being busy, they focus on the important stuff.”  </p>
<p> </p>
<p>What sort of creative license do you give for those people that just want to be helpful, but are over taxed when it comes to their job?  </p>
<p>We all want to better prioritize our tasks and to feel less overwhelmed by our work, but setting boundaries often feels mean or unrealistic for those used to being helpful and people pleasing. Dr. Ashley sees this a lot in her work, where she often advises people to consider how they’re saying no and what ways they’re presenting what they’re working on. By showing people that you have important tasks that rely on your focus to attend to, you’re inviting them to see your time in a much more understanding light and you will invite them to consider that they should try on their own for a solution and prioritize their own tasks before they can engage with you again. </p>
<p>“I think if we let people know that we're doing something else, and that it has a big impact, then they're much more understanding. Also, we're giving that other person some time to see if they can figure that thing out on their own rather than relying on us.” </p>
<p> </p>
<p>What are some of the tenants that you follow for cultivating the next level of leadership? </p>
<p>Dr. Ashley believes that one of our key responsibilities as leaders is to grow this next generation of leaders and help them develop the best leadership skills imaginable. She advocates for this by focusing on three core tenants. The first being mentorship, meaning you’re willing to share your knowledge, wisdom, and experiences all on a personal mentorship front. The second is role modeling, where you’re showing how to be a good leader, representing what that looks like for everyone in your business. The third? Coaching, which she bases a large majority of her career around. Being able to coach and provide a customizable approach for future leaders allows them to address what they need to learn and where they need to grow. </p>
<p>“I don't know if every leader recognizes this, but every day, you are role modeling. You may not be role modeling great stuff, but you are role modeling. And so, you have a responsibility every day to recognize your role modeling.” </p>
<p>--------------- </p>
<p>Links: </p>
<p>Stay in touch with Dr. Stacey Ashley on <a href='https://www.linkedin.com/in/staceyashley'>LinkedIn</a>, <a href='https://www.facebook.com/thestaceyashley/'>Facebook</a>, and <a href='https://www.instagram.com/staceyashleycoaching/'>Instagram</a> </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a>  </p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a> </p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a> </p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a> </p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Leadership expert, Dr. Stacey Ashley, joins us at the Hacker Valley Studio to talk about her journey from the corporate world of leadership to her current roles in consulting and coaching. As a speaker, author, and educator for leaders, especially executive and C-level leaders, Dr. Ashley shares foundational skills needed to go from expert to leader, mindset shifts that need to occur regarding our perspective on our own leadership responsibilities, and experiences that inspired her to become an author. </p>
<p>Timecoded Guide: </p>
<p>[02:58] Developing stronger leadership capabilities and understanding the value of scaling work with her decision to become an author  </p>
<p>[09:51] Jumping over the hurdles and obstacles to becoming a better leader through mindfulness, practice, and checking the privilege of your executive role </p>
<p>[13:45] Knowing when to get off the treadmill of busyness and focusing on setting better boundaries for yourself as a leader </p>
<p>[20:53] Cultivating the next level of leadership with a focus on mentoring, role modeling, and coaching  </p>
<p>[25:40] Providing advice for future leaders and understanding the values of awareness and of developing your listening skills  </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! </p>
<p>Want to learn more about how Mindbody enhanced its asset visibility and increased its cybersecurity maturity rating with Axonius? Check out <a href='http://axonius.com/mindbody'>axonius.com/mindbody</a></p>
<p>AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at  <a href='http://academy.attackiq.com/'>academy.attackiq.com</a> </p>
<p> </p>
<p>What have been some of the challenges that you've seen, out of yourself or from others, to start to cultivate that leadership ability? </p>
<p>There’s a common path to leadership in many industries, especially tech and cyber, where becoming good at your job skyrockets you into leadership spaces and executive roles. While this is often an achievement worth being proud of, Dr. Ashley warns that we rarely mentor and teach these newly appointed leaders how to lead. Expert skills are important to have, but not being able to satisfy your executive role and your leadership responsibilities with developed leadership skills leads to confusion and dissatisfaction amongst employees and clients who aren’t receiving the type of leadership guidance normally delivered by someone in that role. </p>
<p><em>“It's great to have those specialist skills, but it's not enough. If you're going to lead people, if you're going to lead a program of work, if you're going to be a thought leader, or an influencer, or any of those things, you need to have more skills.”</em> </p>
<p> </p>
<p>What are some of the common obstacles that people have that keeps them from being the best leader that they can be? </p>
<p>Dr. Ashley is the first to admit that tech leadership issues and obstacles are hardly a one size fits all. However, a commonality she sees is a focus on busyness instead of on active leadership practices. Being “busy” does not translate into high levels of productivity, especially for leaders in prominent company or industry roles. She advises that a better focus for leaders and aspiring executives is to practice their leadership skills and prioritize finding a coach or mentor, instead of just filling up their schedule with unnecessary busy work. </p>
<p><em>“This whole concept of busy isn't actually very effective. Busy is just doing stuff for the sake of doing stuff. One of the things that I find that great leaders do is that they're really clear about where they make a difference, where they add value, where they can make a real contribution. They don't focus on being busy, they focus on the important stuff.” </em> </p>
<p> </p>
<p>What sort of creative license do you give for those people that just want to be helpful, but are over taxed when it comes to their job?  </p>
<p>We all want to better prioritize our tasks and to feel less overwhelmed by our work, but setting boundaries often feels mean or unrealistic for those used to being helpful and people pleasing. Dr. Ashley sees this a lot in her work, where she often advises people to consider how they’re saying no and what ways they’re presenting what they’re working on. By showing people that you have important tasks that rely on your focus to attend to, you’re inviting them to see your time in a much more understanding light and you will invite them to consider that they should try on their own for a solution and prioritize their own tasks before they can engage with you again. </p>
<p><em>“I think if we let people know that we're doing something else, and that it has a big impact, then they're much more understanding. Also, we're giving that other person some time to see if they can figure that thing out on their own rather than relying on us.”</em> </p>
<p> </p>
<p>What are some of the tenants that you follow for cultivating the next level of leadership? </p>
<p>Dr. Ashley believes that one of our key responsibilities as leaders is to grow this next generation of leaders and help them develop the best leadership skills imaginable. She advocates for this by focusing on three core tenants. The first being mentorship, meaning you’re willing to share your knowledge, wisdom, and experiences all on a personal mentorship front. The second is role modeling, where you’re showing how to be a good leader, representing what that looks like for everyone in your business. The third? Coaching, which she bases a large majority of her career around. Being able to coach and provide a customizable approach for future leaders allows them to address what they need to learn and where they need to grow. </p>
<p><em>“I don't know if every leader recognizes this, but every day, you are role modeling. You may not be role modeling great stuff, but you are role modeling. And so, you have a responsibility every day to recognize your role modeling.”</em> </p>
<p>--------------- </p>
<p>Links: </p>
<p>Stay in touch with Dr. Stacey Ashley on <a href='https://www.linkedin.com/in/staceyashley'>LinkedIn</a>, <a href='https://www.facebook.com/thestaceyashley/'>Facebook</a>, and <a href='https://www.instagram.com/staceyashleycoaching/'>Instagram</a> </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a>  </p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a> </p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a> </p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a> </p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/izc5kq/HVS_audio_Stacey_Ashley_v17mlk6.mp3" length="41448002" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Leadership expert, Dr. Stacey Ashley, joins us at the Hacker Valley Studio to talk about her journey from the corporate world of leadership to her current roles in consulting and coaching. As a speaker, author, and educator for leaders, especially executive and C-level leaders, Dr. Ashley shares foundational skills needed to go from expert to leader, mindset shifts that need to occur regarding our perspective on our own leadership responsibilities, and experiences that inspired her to become an author. 
Timecoded Guide: 
[02:58] Developing stronger leadership capabilities and understanding the value of scaling work with her decision to become an author  
[09:51] Jumping over the hurdles and obstacles to becoming a better leader through mindfulness, practice, and checking the privilege of your executive role 
[13:45] Knowing when to get off the treadmill of busyness and focusing on setting better boundaries for yourself as a leader 
[20:53] Cultivating the next level of leadership with a focus on mentoring, role modeling, and coaching  
[25:40] Providing advice for future leaders and understanding the values of awareness and of developing your listening skills  
Sponsor Links: 
Thank you to our sponsors Axonius and AttackIQ for bringing this episode to life! 
Want to learn more about how Mindbody enhanced its asset visibility and increased its cybersecurity maturity rating with Axonius? Check out axonius.com/mindbody
AttackIQ - better insights, better decisions, and real security outcomes. That's why we partnered with them to create free cybersecurity trainings! Check it out at  academy.attackiq.com 
 
What have been some of the challenges that you've seen, out of yourself or from others, to start to cultivate that leadership ability? 
There’s a common path to leadership in many industries, especially tech and cyber, where becoming good at your job skyrockets you into leadership spaces and executive roles. While this is often an achievement worth being proud of, Dr. Ashley warns that we rarely mentor and teach these newly appointed leaders how to lead. Expert skills are important to have, but not being able to satisfy your executive role and your leadership responsibilities with developed leadership skills leads to confusion and dissatisfaction amongst employees and clients who aren’t receiving the type of leadership guidance normally delivered by someone in that role. 
“It's great to have those specialist skills, but it's not enough. If you're going to lead people, if you're going to lead a program of work, if you're going to be a thought leader, or an influencer, or any of those things, you need to have more skills.” 
 
What are some of the common obstacles that people have that keeps them from being the best leader that they can be? 
Dr. Ashley is the first to admit that tech leadership issues and obstacles are hardly a one size fits all. However, a commonality she sees is a focus on busyness instead of on active leadership practices. Being “busy” does not translate into high levels of productivity, especially for leaders in prominent company or industry roles. She advises that a better focus for leaders and aspiring executives is to practice their leadership skills and prioritize finding a coach or mentor, instead of just filling up their schedule with unnecessary busy work. 
“This whole concept of busy isn't actually very effective. Busy is just doing stuff for the sake of doing stuff. One of the things that I find that great leaders do is that they're really clear about where they make a difference, where they add value, where they can make a real contribution. They don't focus on being busy, they focus on the important stuff.”  
 
What sort of creative license do you give for those people that just want to be helpful, but are over taxed when it comes to their job?  
We all want to better prioritize our tasks and to feel less overwhelmed by our work, but setting boundaries often feels mean or unrealistic for t]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1726</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>221</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Making Corporate Leadership Human with Ginny Clarke</title>
        <itunes:title>Making Corporate Leadership Human with Ginny Clarke</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/making-corporate-leadership-human-with-ginny-clarke/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/making-corporate-leadership-human-with-ginny-clarke/#comments</comments>        <pubDate>Tue, 21 Jun 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/97ec37eb-d40f-3a5e-9085-7991277ebbb1</guid>
                                    <description><![CDATA[<p>We invite our friend, Ginny Clarke, to Hacker Valley this week to talk about conscious leadership and self-awareness as a way to take our organizations to the next level. Using her prior experience at tech giants like Google and her five dimensions of leadership, Ginny explains how we can better hold the leaders in our lives accountable, what will benefit our civilization the most for future generations in the workplace, and where we should focus our efforts for diversity, equity, and inclusion.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[05:34] Losing her parents at a young age, connecting to a spiritual guide to cope with grief and stress, and getting back in touch with ourselves in order to connect with others</p>
<p>[12:03] Seeing and validating the past experiences of our fellow humans, healing ourselves in order to heal organizations, and acknowledging the role of mental health in the health of our companies</p>
<p>[16:34] Understanding diversity, equity, and inclusion beyond just hiring, and stopping yourself from waiting for an organization to step up to an opportunity that belongs to underrepresented communities</p>
<p>[22:38] Shifting the metrics of how we value organizations and leadership, and seeing where the accountability issues of CEOs for what they really are</p>
<p>[27:48] Leaving a legacy through creativity and inspiring others to recognize how they have the power to change the world

</p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a>.</p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>How do we move current leadership statistics to something much healthier?</p>
<p>With a depth of experience in recruiting executive leaders in a variety of organizations, Ginny shares a striking and horrifying statistic with us: 18% of leaders are considered good. Only 18% feels incredibly low, especially when a large portion of companies claims to hire the best leaders based on pedigree-level qualifications. In Ginny’s opinion, leaders are not held to a high enough standard in the workplace, and aren’t measured on their performance beyond basic financials. With so much more at stake, Ginny warns that companies are only as strong as their leaders, and are even weaker when they never hold those leaders accountable.</p>
<p>“That’s why we have organizations that are, I dare say, quite fragile. It’s because of the lack of leadership. They might have a lot of money, they might have really intelligent, well-educated people, but to the extent, those organizations don't have actual leaders for whom they are holding accountable for their leadership competencies.”</p>
<p> </p>
<p>How do we show up better for others and really see the whole human?</p>
<p>We cannot improve our society as long as we continue to see ourselves as completely separate from it. This, among other world-changing views, guides Ginny towards seeing people beyond just their outward appearance, viewing them as a whole human, composed of all of their experiences. There is so much fear, anxiety, and bias, especially in the world of hiring and recruiting, and Ginny hopes to show up better for others through better accountability for our leaders and a stronger connection to ourselves.</p>
<p>“We, as a civilization, can't fix it as long as we're seeing it as separate from ourselves. So, that's where the self-love comes from, and the support and the sharing and the non-dualistic orientation, which defies everything about tech, right? Tech is all about the binary, the ones and zeros, and here, I'm talking about something that is far more inclusive than that.”</p>
<p> </p>
<p>What have you learned from this big effort that we have going on with diversity, equity, and inclusion?</p>
<p>Ginny, much like many of us in tech, cares about efforts of diversity, equity, and inclusion, but believes that many companies talk the talk without ever walking the walk. When working with recruiters in large companies, Ginny discovered that many don’t understand how to implement diversity in an impactful way in their organizations, beyond appearances and statistics. Encouraging colleagues to be true to their authentic selves in the workplace, she believes that now is the time to embrace diversity at work beyond the limitations of waiting for company leaders to embrace them.</p>
<p>“I think there's been organizational malpractice as it relates to diversity, equity, and inclusion. I think you got a lot of people who actually don't want to understand it, they're not going to the root cause. They're throwing money at it, they're hiring a chief diversity officer and saying, ‘Okay, you fix it.’”</p>
<p> </p>
<p>What do you think people can do today to start to make an impact and move the world in a positive direction?</p>
<p>The secret to changing the world? Ginny believes that it’s acknowledging that you have the power to change it at all. On her own spiritual journey, Ginny has discovered there’s so much more to our impact on our surroundings beyond our everyday actions at work. Using examples of heightened vibrations, inspired creativity, and personal accountability, Ginny explains that your ability to change the world has never been as powerful as it is right now, as our society and civilization continue to shift towards new forms of leadership and new developments in organizations are the world. </p>
<p>“I want to activate and stimulate people's imagination. You know, young kids have imagination and that creativity, that spawns, that manifests, that takes hold, that becomes real, and that's how we change the world, so that it's good for all and that becomes the objective. That's my legacy. It's creating good for all.”</p>
<p>---------------</p>
<p>Links:</p>
<p>Stay in touch with Ginny Clarke on <a href='https://www.ginnyclarke.com'>her website</a>, <a href='https://www.linkedin.com/in/ginnyclarke/'>LinkedIn</a>, <a href='https://twitter.com/GinnyClarke'>Twitter</a>, and <a href='https://www.instagram.com/ginny_clarke/?hl=en'>Instagram</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We invite our friend, Ginny Clarke, to Hacker Valley this week to talk about conscious leadership and self-awareness as a way to take our organizations to the next level. Using her prior experience at tech giants like Google and her five dimensions of leadership, Ginny explains how we can better hold the leaders in our lives accountable, what will benefit our civilization the most for future generations in the workplace, and where we should focus our efforts for diversity, equity, and inclusion.</p>
<p> </p>
<p>Timecoded Guide:</p>
<p>[05:34] Losing her parents at a young age, connecting to a spiritual guide to cope with grief and stress, and getting back in touch with ourselves in order to connect with others</p>
<p>[12:03] Seeing and validating the past experiences of our fellow humans, healing ourselves in order to heal organizations, and acknowledging the role of mental health in the health of our companies</p>
<p>[16:34] Understanding diversity, equity, and inclusion beyond just hiring, and stopping yourself from waiting for an organization to step up to an opportunity that belongs to underrepresented communities</p>
<p>[22:38] Shifting the metrics of how we value organizations and leadership, and seeing where the accountability issues of CEOs for what they really are</p>
<p>[27:48] Leaving a legacy through creativity and inspiring others to recognize how they have the power to change the world<br>
<br>
</p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a>.</p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>How do we move current leadership statistics to something much healthier?</p>
<p>With a depth of experience in recruiting executive leaders in a variety of organizations, Ginny shares a striking and horrifying statistic with us: 18% of leaders are considered good. Only 18% feels incredibly low, especially when a large portion of companies claims to hire the best leaders based on pedigree-level qualifications. In Ginny’s opinion, leaders are not held to a high enough standard in the workplace, and aren’t measured on their performance beyond basic financials. With so much more at stake, Ginny warns that companies are only as strong as their leaders, and are even weaker when they never hold those leaders accountable.</p>
<p><em>“That’s why we have organizations that are, I dare say, quite fragile. It’s because of the lack of leadership. They might have a lot of money, they might have really intelligent, well-educated people, but to the extent, those organizations don't have actual leaders for whom they are holding accountable for their leadership competencies.”</em></p>
<p> </p>
<p>How do we show up better for others and really see the whole human?</p>
<p>We cannot improve our society as long as we continue to see ourselves as completely separate from it. This, among other world-changing views, guides Ginny towards seeing people beyond just their outward appearance, viewing them as a whole human, composed of all of their experiences. There is so much fear, anxiety, and bias, especially in the world of hiring and recruiting, and Ginny hopes to show up better for others through better accountability for our leaders and a stronger connection to ourselves.</p>
<p><em>“We, as a civilization, can't fix it as long as we're seeing it as separate from ourselves. So, that's where the self-love comes from, and the support and the sharing and the non-dualistic orientation, which defies everything about tech, right? Tech is all about the binary, the ones and zeros, and here, I'm talking about something that is far more inclusive than that.”</em></p>
<p> </p>
<p>What have you learned from this big effort that we have going on with diversity, equity, and inclusion?</p>
<p>Ginny, much like many of us in tech, cares about efforts of diversity, equity, and inclusion, but believes that many companies talk the talk without ever walking the walk. When working with recruiters in large companies, Ginny discovered that many don’t understand how to implement diversity in an impactful way in their organizations, beyond appearances and statistics. Encouraging colleagues to be true to their authentic selves in the workplace, she believes that now is the time to embrace diversity at work beyond the limitations of waiting for company leaders to embrace them.</p>
<p><em>“I think there's been organizational malpractice as it relates to diversity, equity, and inclusion. I think you got a lot of people who actually don't want to understand it, they're not going to the root cause. They're throwing money at it, they're hiring a chief diversity officer and saying, ‘Okay, you fix it.’”</em></p>
<p> </p>
<p>What do you think people can do today to start to make an impact and move the world in a positive direction?</p>
<p>The secret to changing the world? Ginny believes that it’s acknowledging that you have the power to change it at all. On her own spiritual journey, Ginny has discovered there’s so much more to our impact on our surroundings beyond our everyday actions at work. Using examples of heightened vibrations, inspired creativity, and personal accountability, Ginny explains that your ability to change the world has never been as powerful as it is right now, as our society and civilization continue to shift towards new forms of leadership and new developments in organizations are the world. </p>
<p><em>“I want to activate and stimulate people's imagination. You know, young kids have imagination and that creativity, that spawns, that manifests, that takes hold, that becomes real, and that's how we change the world, so that it's good for all and that becomes the objective. That's my legacy. It's creating good for all.”</em></p>
<p>---------------</p>
<p>Links:</p>
<p>Stay in touch with Ginny Clarke on <a href='https://www.ginnyclarke.com'>her website</a>, <a href='https://www.linkedin.com/in/ginnyclarke/'>LinkedIn</a>, <a href='https://twitter.com/GinnyClarke'>Twitter</a>, and <a href='https://www.instagram.com/ginny_clarke/?hl=en'>Instagram</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/c8qfyr/HVS_audio_Ginny_Clarke_v364h0r.mp3" length="45259321" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We invite our friend, Ginny Clarke, to Hacker Valley this week to talk about conscious leadership and self-awareness as a way to take our organizations to the next level. Using her prior experience at tech giants like Google and her five dimensions of leadership, Ginny explains how we can better hold the leaders in our lives accountable, what will benefit our civilization the most for future generations in the workplace, and where we should focus our efforts for diversity, equity, and inclusion.
 
Timecoded Guide:
[05:34] Losing her parents at a young age, connecting to a spiritual guide to cope with grief and stress, and getting back in touch with ourselves in order to connect with others
[12:03] Seeing and validating the past experiences of our fellow humans, healing ourselves in order to heal organizations, and acknowledging the role of mental health in the health of our companies
[16:34] Understanding diversity, equity, and inclusion beyond just hiring, and stopping yourself from waiting for an organization to step up to an opportunity that belongs to underrepresented communities
[22:38] Shifting the metrics of how we value organizations and leadership, and seeing where the accountability issues of CEOs for what they really are
[27:48] Leaving a legacy through creativity and inspiring others to recognize how they have the power to change the world
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone.
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: uptycs.com. 
 
How do we move current leadership statistics to something much healthier?
With a depth of experience in recruiting executive leaders in a variety of organizations, Ginny shares a striking and horrifying statistic with us: 18% of leaders are considered good. Only 18% feels incredibly low, especially when a large portion of companies claims to hire the best leaders based on pedigree-level qualifications. In Ginny’s opinion, leaders are not held to a high enough standard in the workplace, and aren’t measured on their performance beyond basic financials. With so much more at stake, Ginny warns that companies are only as strong as their leaders, and are even weaker when they never hold those leaders accountable.
“That’s why we have organizations that are, I dare say, quite fragile. It’s because of the lack of leadership. They might have a lot of money, they might have really intelligent, well-educated people, but to the extent, those organizations don't have actual leaders for whom they are holding accountable for their leadership competencies.”
 
How do we show up better for others and really see the whole human?
We cannot improve our society as long as we continue to see ourselves as completely separate from it. This, among other world-changing views, guides Ginny towards seeing people beyond just their outward appearance, viewing them as a whole human, composed of all of their experiences. There is so much fear, anxiety, and bias, especially in the world of hiring and recruiting, and Ginny hopes to show up better for others through better accountability for our leaders and a stronger connection to ourselves.
“We, as a civilization, can't fix it as long as we're seeing it as separate from ourselves. So, that's where the self-love comes from, and the support and the sharing and the non-dualistic orientation, which defies everything about tech, right? Tech is all about the binary, the ones and zeros, and here, I'm talking about something that is far more inclusive than that.”
 
What have you learned from this big effort that we have going on with diversity, equity, and inclusion?
Ginny, much like man]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1885</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>220</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Co-founding Revelstoke through Communication with Bob Kruse</title>
        <itunes:title>Co-founding Revelstoke through Communication with Bob Kruse</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/co-founding-revelstoke-through-communication-with-bob-kruse/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/co-founding-revelstoke-through-communication-with-bob-kruse/#comments</comments>        <pubDate>Tue, 14 Jun 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8603b369-9ef5-32c3-b316-08bd27f488b8</guid>
                                    <description><![CDATA[<p>We invite Bob Kruse, Co-Founder and CEO of Revelstoke Security, down to Hacker Valley Studios this week to talk about his journey from investment banking to cybersecurity sales to owning and operating his company with Josh McCarthy. With a focus on communication and peoples skills, Bob discusses how to be a leader in the cybersecurity community, including building strong relationships with staff members, connecting with cyber experts, and developing successful security teams.</p>
<p>Timecoded Guide:</p>
<p>[03:40] Selling software to cybersecurity practitioners and managing the skepticism around marketing to an audience that’s taught to doubt and question</p>
<p>[08:12] Gaining inspiration for Revelstoke Security from the entrepreneurs in his family and his experience starting his cyber business with his partner Josh McCarthy</p>
<p>[12:51] What being an early-stage startup looked like for Revelstoke and lessons learned from their first pitches to cybersecurity investors</p>
<p>[15:01] Comparing and contrasting being someone in cybersecurity sales to being a CEO of his very own company </p>
<p>[20:58] Looking towards the future of Revelstoke Security as they expand into new markets and continue to build their business around providing solid cybersecurity jobs

</p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a>.</p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>Were there any speculations like, "Hey, can this guy really go from sales to being a CEO at a tech company?" </p>
<p>Bob’s focus throughout his career in cybersecurity has completely revolved around sales. From his first cybersecurity role at Oracle Corporation to his recent position at Demisto, Bob’s prominence and impact on the cyber industry has always had sales at the center. Co-founding Revelstoke, Bob encountered skepticism and wariness from investors, curious if he would be able to transition into a cybersecurity CEO. Thanks to his knack for knowledge and his confident partner Josh, Bob has defied expectations and built up his own confidence in his new role.</p>
<p>“It's about having a co-founder that compliments you, that you can implicitly trust, and implicitly trusts you. You can have the best technology in the world and the best idea in the world, but if you don't have a trusted relationship…it's not going to be successful.” </p>
<p>
Between your previous life in sales, and now, being a founder and CEO, what are some of the parallels? </p>
<p>With so much experience in sales on his resume, we were curious which parts of Bob’s journey to CEO were similar to previous positions he’s held. It turns out, just like we’ve discussed on Hacker Valley Red, communication has been a key element no matter Bob’s position in cyber. No matter who he’s talking to, or what side of the house he’s marketing towards, people skills continue to be his forte. Being able to have discussions with employees, investors, and potential clients relies heavily on honest authentic communication skills, even though his business knowledge has had to grow immensely since becoming CEO.</p>
<p>“Today, I still lean on my people skills, and over-communicate. I try to have one-on-ones with everybody in the company. I welcome every new hire we have, and it's increasingly important, obviously, as we have a widely distributed team.”</p>
<p> </p>
<p>Where has your focus on introductions and networking come from? </p>
<p>We know Bob as an introduction master, and he’s even helped us with meeting some of the biggest guests we’ve invited to Hacker Valley. With so many cyber security experts in his network from all corners of the cybersecurity industry, we had to ask Bob where he learned the value of making those connections. It turns out— it’s always been that way for Bob Kruse, from the days of his early childhood working at his father’s business. Connecting others, communicating with them, and learning how to help has been his passion for his entire life.</p>
<p>“When somebody needs your help, it's a compliment. I've always found it as a compliment in that I have something they don't, and I can impart on them some sort of an introduction, or a reference, or some knowledge.”</p>
<p> </p>
<p>What impact or impression are you hoping to leave on the world with Revelstoke?</p>
<p>There are a lot of cybersecurity startups that make their way down to Hacker Valley, but Revelstoke Security seems like a different breed, with a strong staff at its core— so strong that they’ve only grown since they began and have yet to lose a single employee. With an impact like that on the cyber job market, we asked Bob what he sees on the horizon for Revelstoke. He made it clear: more jobs. Success, for Bob and Josh at Revelstoke, relies on building strong teams and providing the right jobs for those team members and their families. </p>
<p>“Success…is starting a company and providing jobs for people, jobs that never existed before you decided to start a company. I want my legacy to be somebody that not only started a successful company financially, but that employed a lot of people and supported a lot of families.”</p>
<p>----------</p>
<p>Links:</p>
<p>Stay in touch with Bob Kruse on <a href='http://linkedin.com/in/krusebob'>LinkedIn</a> and <a href='https://profiles.bizjournals.com/profile/Bob-Kruse-CEO-Revelstoke-Security/430b5b81-45ef-4c20-aad5-48fea7299965'>the Business Journal Leadership Trust website</a>.</p>
<p>Learn more about Revelstoke Security on <a href='https://www.revelstoke.io/about/'>their website</a>.</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We invite Bob Kruse, Co-Founder and CEO of Revelstoke Security, down to Hacker Valley Studios this week to talk about his journey from investment banking to cybersecurity sales to owning and operating his company with Josh McCarthy. With a focus on communication and peoples skills, Bob discusses how to be a leader in the cybersecurity community, including building strong relationships with staff members, connecting with cyber experts, and developing successful security teams.</p>
<p>Timecoded Guide:</p>
<p>[03:40] Selling software to cybersecurity practitioners and managing the skepticism around marketing to an audience that’s taught to doubt and question</p>
<p>[08:12] Gaining inspiration for Revelstoke Security from the entrepreneurs in his family and his experience starting his cyber business with his partner Josh McCarthy</p>
<p>[12:51] What being an early-stage startup looked like for Revelstoke and lessons learned from their first pitches to cybersecurity investors</p>
<p>[15:01] Comparing and contrasting being someone in cybersecurity sales to being a CEO of his very own company </p>
<p>[20:58] Looking towards the future of Revelstoke Security as they expand into new markets and continue to build their business around providing solid cybersecurity jobs<br>
<br>
</p>
<p>Sponsor Links:</p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a>.</p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: <a href='https://www.uptycs.com/'>uptycs.com</a>. </p>
<p> </p>
<p>Were there any speculations like, "Hey, can this guy really go from sales to being a CEO at a tech company?" </p>
<p>Bob’s focus throughout his career in cybersecurity has completely revolved around sales. From his first cybersecurity role at Oracle Corporation to his recent position at Demisto, Bob’s prominence and impact on the cyber industry has always had sales at the center. Co-founding Revelstoke, Bob encountered skepticism and wariness from investors, curious if he would be able to transition into a cybersecurity CEO. Thanks to his knack for knowledge and his confident partner Josh, Bob has defied expectations and built up his own confidence in his new role.</p>
<p><em>“It's about having a co-founder that compliments you, that you can implicitly trust, and implicitly trusts you. You can have the best technology in the world and the best idea in the world, but if you don't have a trusted relationship…it's not going to be successful.” </em></p>
<p><br>
Between your previous life in sales, and now, being a founder and CEO, what are some of the parallels? </p>
<p>With so much experience in sales on his resume, we were curious which parts of Bob’s journey to CEO were similar to previous positions he’s held. It turns out, just like we’ve discussed on Hacker Valley Red, communication has been a key element no matter Bob’s position in cyber. No matter who he’s talking to, or what side of the house he’s marketing towards, people skills continue to be his forte. Being able to have discussions with employees, investors, and potential clients relies heavily on honest authentic communication skills, even though his business knowledge has had to grow immensely since becoming CEO.</p>
<p><em>“Today, I still lean on my people skills, and over-communicate. I try to have one-on-ones with everybody in the company. I welcome every new hire we have, and it's increasingly important, obviously, as we have a widely distributed team.”</em></p>
<p> </p>
<p>Where has your focus on introductions and networking come from? </p>
<p>We know Bob as an introduction master, and he’s even helped us with meeting some of the biggest guests we’ve invited to Hacker Valley. With so many cyber security experts in his network from all corners of the cybersecurity industry, we had to ask Bob where he learned the value of making those connections. It turns out— it’s always been that way for Bob Kruse, from the days of his early childhood working at his father’s business. Connecting others, communicating with them, and learning how to help has been his passion for his entire life.</p>
<p><em>“When somebody needs your help, it's a compliment. I've always found it as a compliment in that I have something they don't, and I can impart on them some sort of an introduction, or a reference, or some knowledge.”</em></p>
<p> </p>
<p>What impact or impression are you hoping to leave on the world with Revelstoke?</p>
<p>There are a lot of cybersecurity startups that make their way down to Hacker Valley, but Revelstoke Security seems like a different breed, with a strong staff at its core— so strong that they’ve only grown since they began and have yet to lose a single employee. With an impact like that on the cyber job market, we asked Bob what he sees on the horizon for Revelstoke. He made it clear: more jobs. Success, for Bob and Josh at Revelstoke, relies on building strong teams and providing the right jobs for those team members and their families. </p>
<p><em>“Success…is starting a company and providing jobs for people, jobs that never existed before you decided to start a company. I want my legacy to be somebody that not only started a successful company financially, but that employed a lot of people and supported a lot of families.”</em></p>
<p>----------</p>
<p>Links:</p>
<p>Stay in touch with Bob Kruse on <a href='http://linkedin.com/in/krusebob'>LinkedIn</a> and <a href='https://profiles.bizjournals.com/profile/Bob-Kruse-CEO-Revelstoke-Security/430b5b81-45ef-4c20-aad5-48fea7299965'>the Business Journal Leadership Trust website</a>.</p>
<p>Learn more about Revelstoke Security on <a href='https://www.revelstoke.io/about/'>their website</a>.</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fqqfx7/HVS_audio_BOB_KRUSE_v2aaxno.mp3" length="40418331" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We invite Bob Kruse, Co-Founder and CEO of Revelstoke Security, down to Hacker Valley Studios this week to talk about his journey from investment banking to cybersecurity sales to owning and operating his company with Josh McCarthy. With a focus on communication and peoples skills, Bob discusses how to be a leader in the cybersecurity community, including building strong relationships with staff members, connecting with cyber experts, and developing successful security teams.
Timecoded Guide:
[03:40] Selling software to cybersecurity practitioners and managing the skepticism around marketing to an audience that’s taught to doubt and question
[08:12] Gaining inspiration for Revelstoke Security from the entrepreneurs in his family and his experience starting his cyber business with his partner Josh McCarthy
[12:51] What being an early-stage startup looked like for Revelstoke and lessons learned from their first pitches to cybersecurity investors
[15:01] Comparing and contrasting being someone in cybersecurity sales to being a CEO of his very own company 
[20:58] Looking towards the future of Revelstoke Security as they expand into new markets and continue to build their business around providing solid cybersecurity jobs
Sponsor Links:
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone.
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution: uptycs.com. 
 
Were there any speculations like, "Hey, can this guy really go from sales to being a CEO at a tech company?" 
Bob’s focus throughout his career in cybersecurity has completely revolved around sales. From his first cybersecurity role at Oracle Corporation to his recent position at Demisto, Bob’s prominence and impact on the cyber industry has always had sales at the center. Co-founding Revelstoke, Bob encountered skepticism and wariness from investors, curious if he would be able to transition into a cybersecurity CEO. Thanks to his knack for knowledge and his confident partner Josh, Bob has defied expectations and built up his own confidence in his new role.
“It's about having a co-founder that compliments you, that you can implicitly trust, and implicitly trusts you. You can have the best technology in the world and the best idea in the world, but if you don't have a trusted relationship…it's not going to be successful.” 
Between your previous life in sales, and now, being a founder and CEO, what are some of the parallels? 
With so much experience in sales on his resume, we were curious which parts of Bob’s journey to CEO were similar to previous positions he’s held. It turns out, just like we’ve discussed on Hacker Valley Red, communication has been a key element no matter Bob’s position in cyber. No matter who he’s talking to, or what side of the house he’s marketing towards, people skills continue to be his forte. Being able to have discussions with employees, investors, and potential clients relies heavily on honest authentic communication skills, even though his business knowledge has had to grow immensely since becoming CEO.
“Today, I still lean on my people skills, and over-communicate. I try to have one-on-ones with everybody in the company. I welcome every new hire we have, and it's increasingly important, obviously, as we have a widely distributed team.”
 
Where has your focus on introductions and networking come from? 
We know Bob as an introduction master, and he’s even helped us with meeting some of the biggest guests we’ve invited to Hacker Valley. With so many cyber security experts in his network from all corners of the cybersecurity industry, we had to ask Bob where he learned the value of making those connecti]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1683</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>219</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Emotions In Cybersecurity with Sherianna Boyle</title>
        <itunes:title>Emotions In Cybersecurity with Sherianna Boyle</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/emotions-in-cybersecurity-with-sherianna-boyle/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/emotions-in-cybersecurity-with-sherianna-boyle/#comments</comments>        <pubDate>Tue, 07 Jun 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/55ce25a4-59f3-364e-b4ed-bb48aabc71c0</guid>
                                    <description><![CDATA[<p>In the turbulent world of cybersecurity, it can be difficult to not get caught up in the emotions of it all. Fear uncertainty, doubt...not to mention, burnout. It's not surprising cybersecurity is often seen as being a highly stressful field. But is it possible we may be addressing and interpreting our emotions, as practitioners, in the wrong way? Ron and Chris are joined by author and coach, Sherianna Boyle, to talk about the role that emotions play in our daily lives and how to process them correctly. In this episode, Sherianna walks us through:</p>
<p>    -What goes into emotional detoxing</p>
<p>    -The difference between reaction and emotion</p>
<p>    -How breathwork can transform your life</p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a> </p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution <a href='https://www.uptycs.com/'>uptycs.com/</a>  Be sure to stop by their booth #435 at RSA 2022</p>
<p>Guest Bio:</p>
<p>Sherianna Boyle is an author of nine books  including, Emotional Detox Now: 135 Self-Guided Practices to Renew Your Mind, Heart & Body. She is also the founder of the CLEANSE Method® Emotional Detox Coaching® Cleanse Yoga® servicing clients, businesses, healthcare providers and educators worldwide, virtually or on site. You can hear more from Sherianna, and her work, on her show Emotional Detox Now Podcast. </p>
<p>Links:</p>
<p>Stay in touch with Sherianna Boyle on <a href='https://www.linkedin.com/in/sheriannaboyle/'>LinkedIn</a> and <a href='https://twitter.com/SheriannaBoyle'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In the turbulent world of cybersecurity, it can be difficult to not get caught up in the emotions of it all. Fear uncertainty, doubt...not to mention, burnout. It's not surprising cybersecurity is often seen as being a highly stressful field. But is it possible we may be addressing and interpreting our emotions, as practitioners, in the wrong way? Ron and Chris are joined by author and coach, Sherianna Boyle, to talk about the role that emotions play in our daily lives and how to process them correctly. In this episode, Sherianna walks us through:</p>
<p>    -What goes into emotional detoxing</p>
<p>    -The difference between reaction and emotion</p>
<p>    -How breathwork can transform your life</p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a> </p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution <a href='https://www.uptycs.com/'>uptycs.com/</a>  Be sure to stop by their booth #435 at RSA 2022</p>
<p>Guest Bio:</p>
<p>Sherianna Boyle is an author of nine books  including, Emotional Detox Now: 135 Self-Guided Practices to Renew Your Mind, Heart & Body. She is also the founder of the CLEANSE Method® Emotional Detox Coaching® Cleanse Yoga® servicing clients, businesses, healthcare providers and educators worldwide, virtually or on site. You can hear more from Sherianna, and her work, on her show Emotional Detox Now Podcast. </p>
<p>Links:</p>
<p>Stay in touch with Sherianna Boyle on <a href='https://www.linkedin.com/in/sheriannaboyle/'>LinkedIn</a> and <a href='https://twitter.com/SheriannaBoyle'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7s5x6h/Sherianna_Boyle.mp3" length="81052112" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In the turbulent world of cybersecurity, it can be difficult to not get caught up in the emotions of it all. Fear uncertainty, doubt...not to mention, burnout. It's not surprising cybersecurity is often seen as being a highly stressful field. But is it possible we may be addressing and interpreting our emotions, as practitioners, in the wrong way? Ron and Chris are joined by author and coach, Sherianna Boyle, to talk about the role that emotions play in our daily lives and how to process them correctly. In this episode, Sherianna walks us through:
    -What goes into emotional detoxing
    -The difference between reaction and emotion
    -How breathwork can transform your life
Sponsor Links: 
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone 
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution uptycs.com/  Be sure to stop by their booth #435 at RSA 2022
Guest Bio:
Sherianna Boyle is an author of nine books  including, Emotional Detox Now: 135 Self-Guided Practices to Renew Your Mind, Heart & Body. She is also the founder of the CLEANSE Method® Emotional Detox Coaching® Cleanse Yoga® servicing clients, businesses, healthcare providers and educators worldwide, virtually or on site. You can hear more from Sherianna, and her work, on her show Emotional Detox Now Podcast. 
Links:
Stay in touch with Sherianna Boyle on LinkedIn and Twitter
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2026</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>218</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Being THE Cyber Warrior with Derek Scheller</title>
        <itunes:title>Being THE Cyber Warrior with Derek Scheller</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/being-the-cyber-warrior-with-derek-scheller/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/being-the-cyber-warrior-with-derek-scheller/#comments</comments>        <pubDate>Tue, 31 May 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/defe99f7-e580-3c93-a4a2-3bd002a5afc6</guid>
                                    <description><![CDATA[<p>Making an impact in the cybersecurity community as a content creator is no easy task! Just ask Derek Scheller, aka The Cyber Warrior. Derek joins hosts Ron and Chris to talk about how he brings his unique personality and positive messages to inspire folks within, and breaking into, cyber. In this this episode, Derek shares:</p>
<ul><li style="font-weight:400;">His passion to inspire and motivate others</li>
<li style="font-weight:400;">How to make your content stand out</li>
<li style="font-weight:400;">How the WWE has inspired his unique persona</li>
<li style="font-weight:400;">His thoughts on vulnerability and being authentically yourself</li>
<li style="font-weight:400;">Tips for making impactful and sticky content</li>
</ul>
<p>Check out Ron and Chris’ interview with The Cyber Warrior on Security Happy Hour, <a href='https://www.youtube.com/watch?v=zsGdyt_AX3s'>here</a>! </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution Uptycs.com Be sure to stop by their booth #435 at RSA 2022</p>
<p>Guest Bio:</p>
<p>Derek Scheller is a Senior Security Consultant for Seiso, LLC. In 2017, he retired from the US Army as a Cyber Network Defender and worked in both defensive and offensive operations. When he is not helping clients with their security needs, he is a content creator that aims to help as many people as possible enter the cyber security space. You can find him on YouTube Twitch, LinkedIn, and Facebook under Cyber Warrior Studios, where he posts weekly.</p>
<p>Links:</p>
<p>Stay in touch with Derek Scheller with Cyber Warrior Studios on <a href='https://www.linkedin.com/company/cyber-warrior-studios-llc'>LinkedIn</a> and <a href='https://www.twitter.com/cyberwarriorst1'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out more from <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Making an impact in the cybersecurity community as a content creator is no easy task! Just ask Derek Scheller, aka The Cyber Warrior. Derek joins hosts Ron and Chris to talk about how he brings his unique personality and positive messages to inspire folks within, and breaking into, cyber. In this this episode, Derek shares:</p>
<ul><li style="font-weight:400;">His passion to inspire and motivate others</li>
<li style="font-weight:400;">How to make your content stand out</li>
<li style="font-weight:400;">How the WWE has inspired his unique persona</li>
<li style="font-weight:400;">His thoughts on vulnerability and being authentically yourself</li>
<li style="font-weight:400;">Tips for making impactful and sticky content</li>
</ul>
<p>Check out Ron and Chris’ interview with The Cyber Warrior on Security Happy Hour, <a href='https://www.youtube.com/watch?v=zsGdyt_AX3s'>here</a>! </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution Uptycs.com Be sure to stop by their booth #435 at RSA 2022</p>
<p>Guest Bio:</p>
<p>Derek Scheller is a Senior Security Consultant for Seiso, LLC. In 2017, he retired from the US Army as a Cyber Network Defender and worked in both defensive and offensive operations. When he is not helping clients with their security needs, he is a content creator that aims to help as many people as possible enter the cyber security space. You can find him on YouTube Twitch, LinkedIn, and Facebook under Cyber Warrior Studios, where he posts weekly.</p>
<p>Links:</p>
<p>Stay in touch with Derek Scheller with Cyber Warrior Studios on <a href='https://www.linkedin.com/company/cyber-warrior-studios-llc'>LinkedIn</a> and <a href='https://www.twitter.com/cyberwarriorst1'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out more from <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vxdifq/Derek_Scheller.mp3" length="67776128" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Making an impact in the cybersecurity community as a content creator is no easy task! Just ask Derek Scheller, aka The Cyber Warrior. Derek joins hosts Ron and Chris to talk about how he brings his unique personality and positive messages to inspire folks within, and breaking into, cyber. In this this episode, Derek shares:
His passion to inspire and motivate others
How to make your content stand out
How the WWE has inspired his unique persona
His thoughts on vulnerability and being authentically yourself
Tips for making impactful and sticky content
Check out Ron and Chris’ interview with The Cyber Warrior on Security Happy Hour, here! 
Sponsor Links: 
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution Uptycs.com Be sure to stop by their booth #435 at RSA 2022
Guest Bio:
Derek Scheller is a Senior Security Consultant for Seiso, LLC. In 2017, he retired from the US Army as a Cyber Network Defender and worked in both defensive and offensive operations. When he is not helping clients with their security needs, he is a content creator that aims to help as many people as possible enter the cyber security space. You can find him on YouTube Twitch, LinkedIn, and Facebook under Cyber Warrior Studios, where he posts weekly.
Links:
Stay in touch with Derek Scheller with Cyber Warrior Studios on LinkedIn and Twitter
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out more from Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1694</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>217</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Adapt and Overcome with Amy Bream</title>
        <itunes:title>Adapt and Overcome with Amy Bream</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/adapt-and-overcome-with-amy-bream/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/adapt-and-overcome-with-amy-bream/#comments</comments>        <pubDate>Wed, 25 May 2022 21:04:50 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e7d39d8b-386c-365f-aa96-71ae7fa1d518</guid>
                                    <description><![CDATA[<p>Life is full of complexity -- just ask adaptive athlete Amy Bream, this episode's special guest. She was born with one leg, but that didn’t stop her from growing up to become a kickboxer. In 2021, she competed in the CrossFit Games, placing in the top five. And in 2022, she came in first at Wodapalooza — one of the biggest fitness competitions in the world. The key to her success? Controlling what she can. Join her, Ron and Chris as they discuss:</p>
<p>        -How self perception shapes how others interact with you</p>
<p>        -The power of showing up and believing in yourself</p>
<p>        -Amy’s viral moment at the CrossFit Games</p>
<p>        -Her partnership with Axonius</p>
<p>        -Her advice for those struggling to show up in life</p>
<p>Check out Amy's Controlling Complexity video, presented by Axonius: axonius.com/amybream </p>
<p> </p>
<p>Sponsor: </p>
<p>Thank you to our Axonius, for bringing this episode to life!</p>
<p>Life is complex, but it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>Links:</p>
<p>Visit Amy Bream on <a href='https://www.instagram.com/onelegtostandon/?hl=en'>Instagram</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Life is full of complexity -- just ask adaptive athlete Amy Bream, this episode's special guest. She was born with one leg, but that didn’t stop her from growing up to become a kickboxer. In 2021, she competed in the CrossFit Games, placing in the top five. And in 2022, she came in first at Wodapalooza — one of the biggest fitness competitions in the world. The key to her success? Controlling what she can. Join her, Ron and Chris as they discuss:</p>
<p>        -How self perception shapes how others interact with you</p>
<p>        -The power of showing up and believing in yourself</p>
<p>        -Amy’s viral moment at the CrossFit Games</p>
<p>        -Her partnership with Axonius</p>
<p>        -Her advice for those struggling to show up in life</p>
<p>Check out Amy's Controlling Complexity video, presented by Axonius: axonius.com/amybream </p>
<p> </p>
<p>Sponsor: </p>
<p>Thank you to our Axonius, for bringing this episode to life!</p>
<p>Life is complex, but it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>Links:</p>
<p>Visit Amy Bream on <a href='https://www.instagram.com/onelegtostandon/?hl=en'>Instagram</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2d6kcc/Amy_Bream_Final_Mixaa2hw.mp3" length="31176960" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Life is full of complexity -- just ask adaptive athlete Amy Bream, this episode's special guest. She was born with one leg, but that didn’t stop her from growing up to become a kickboxer. In 2021, she competed in the CrossFit Games, placing in the top five. And in 2022, she came in first at Wodapalooza — one of the biggest fitness competitions in the world. The key to her success? Controlling what she can. Join her, Ron and Chris as they discuss:
        -How self perception shapes how others interact with you
        -The power of showing up and believing in yourself
        -Amy’s viral moment at the CrossFit Games
        -Her partnership with Axonius
        -Her advice for those struggling to show up in life
Check out Amy's Controlling Complexity video, presented by Axonius: axonius.com/amybream 
 
Sponsor: 
Thank you to our Axonius, for bringing this episode to life!
Life is complex, but it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
Links:
Visit Amy Bream on Instagram
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1944</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>216</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Adventures In The Outerverse with Robin Thurston</title>
        <itunes:title>Adventures In The Outerverse with Robin Thurston</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/adventures-in-the-outerverse-with-robin-thurston/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/adventures-in-the-outerverse-with-robin-thurston/#comments</comments>        <pubDate>Tue, 24 May 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/17a23d92-bda9-3dc2-b1a0-252a43d733ff</guid>
                                    <description><![CDATA[<p>The metaverse seems to be the hottest thing in technology today. From virtual environments to avatars, our lives are being digitized more and more. Is there even a reason to go outside anymore? Robin Thurston, CEO of Outside Inc., built his entire company around this very question. What's even more interesting is that he is using web3 technology to help get people reacquainted with the great outdoors. In this episode, Ron and Chris chat with Robin about: </p>
<ul><li style="font-weight:400;">Why Outside decided to create the Outerverse </li>
<li style="font-weight:400;">How the Outerverse is aimed at getting people outside</li>
<li style="font-weight:400;">What the Outerverse entails (i.e. NFT marketplace, tokens, creator platform)</li>
<li style="font-weight:400;">What this means for the future of outdoor content/outdoor content creators</li>
</ul>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution Uptycs.com Be sure to stop by their booth #435 at RSA 2022</p>
<p> </p>
<p>Guest Bio:</p>
<p>Before joining Outside (previously Pocket Outdoor Media), he ran a consumer genetics company called Helix in Silicon Valley before returning to his home state of Colorado. Prior to Helix, Robin co-founded and built MapMyFitness into one of the world’s largest open fitness tracking platforms. Following the acquisition of MapMyFitness by Under Armour, he joined the innovative sports apparel organization and served as Chief Digital Officer, where he led the overall strategic direction of the company’s Connected Fitness and eCommerce business. </p>
<p>Robin spent the first ten years of his career building a mutual fund classification and ratings platform at Lipper (a Thomson Reuters Company), as well as a risk and compensation platform at both American Century Investments and Wellington Management. He graduated with a MS in Finance from University of Colorado at Denver and lives with his wife and three children in Boulder, Co. He is a lifelong cyclist who started riding and racing in the early 1980’s.</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Robin Thurston on LinkedIn and <a href='https://twitter.com/RobinJThurston'>Twitter</a></p>
<p>Visit Outside Inc <a href='https://www.outsideinc.com/'>website</a> </p>
<p>Visit the <a href='https://www.outside.io/'>Outerverse</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The metaverse seems to be the hottest thing in technology today. From virtual environments to avatars, our lives are being digitized more and more. Is there even a reason to go outside anymore? Robin Thurston, CEO of Outside Inc., built his entire company around this very question. What's even more interesting is that he is using web3 technology to help get people reacquainted with the great outdoors. In this episode, Ron and Chris chat with Robin about: </p>
<ul><li style="font-weight:400;">Why Outside decided to create the Outerverse </li>
<li style="font-weight:400;">How the Outerverse is aimed at getting people outside</li>
<li style="font-weight:400;">What the Outerverse entails (i.e. NFT marketplace, tokens, creator platform)</li>
<li style="font-weight:400;">What this means for the future of outdoor content/outdoor content creators</li>
</ul>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution Uptycs.com Be sure to stop by their booth #435 at RSA 2022</p>
<p> </p>
<p>Guest Bio:</p>
<p>Before joining Outside (previously Pocket Outdoor Media), he ran a consumer genetics company called Helix in Silicon Valley before returning to his home state of Colorado. Prior to Helix, Robin co-founded and built MapMyFitness into one of the world’s largest open fitness tracking platforms. Following the acquisition of MapMyFitness by Under Armour, he joined the innovative sports apparel organization and served as Chief Digital Officer, where he led the overall strategic direction of the company’s Connected Fitness and eCommerce business. </p>
<p>Robin spent the first ten years of his career building a mutual fund classification and ratings platform at Lipper (a Thomson Reuters Company), as well as a risk and compensation platform at both American Century Investments and Wellington Management. He graduated with a MS in Finance from University of Colorado at Denver and lives with his wife and three children in Boulder, Co. He is a lifelong cyclist who started riding and racing in the early 1980’s.</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Robin Thurston on LinkedIn and <a href='https://twitter.com/RobinJThurston'>Twitter</a></p>
<p>Visit Outside Inc <a href='https://www.outsideinc.com/'>website</a> </p>
<p>Visit the <a href='https://www.outside.io/'>Outerverse</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/svxx6v/Robin_Thurston.mp3" length="64392128" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The metaverse seems to be the hottest thing in technology today. From virtual environments to avatars, our lives are being digitized more and more. Is there even a reason to go outside anymore? Robin Thurston, CEO of Outside Inc., built his entire company around this very question. What's even more interesting is that he is using web3 technology to help get people reacquainted with the great outdoors. In this episode, Ron and Chris chat with Robin about: 
Why Outside decided to create the Outerverse 
How the Outerverse is aimed at getting people outside
What the Outerverse entails (i.e. NFT marketplace, tokens, creator platform)
What this means for the future of outdoor content/outdoor content creators
Sponsor Links: 
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution Uptycs.com Be sure to stop by their booth #435 at RSA 2022
 
Guest Bio:
Before joining Outside (previously Pocket Outdoor Media), he ran a consumer genetics company called Helix in Silicon Valley before returning to his home state of Colorado. Prior to Helix, Robin co-founded and built MapMyFitness into one of the world’s largest open fitness tracking platforms. Following the acquisition of MapMyFitness by Under Armour, he joined the innovative sports apparel organization and served as Chief Digital Officer, where he led the overall strategic direction of the company’s Connected Fitness and eCommerce business. 
Robin spent the first ten years of his career building a mutual fund classification and ratings platform at Lipper (a Thomson Reuters Company), as well as a risk and compensation platform at both American Century Investments and Wellington Management. He graduated with a MS in Finance from University of Colorado at Denver and lives with his wife and three children in Boulder, Co. He is a lifelong cyclist who started riding and racing in the early 1980’s.
 
Links:
Stay in touch with Robin Thurston on LinkedIn and Twitter
Visit Outside Inc website 
Visit the Outerverse
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1609</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>215</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Something To Say In Cyber With Jon DiMaggio</title>
        <itunes:title>Something To Say In Cyber With Jon DiMaggio</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/something-to-say-in-cyber-with-jon-dimaggio/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/something-to-say-in-cyber-with-jon-dimaggio/#comments</comments>        <pubDate>Tue, 17 May 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d54d65da-ca20-3319-8b63-eb1c11e804c8</guid>
                                    <description><![CDATA[<p>“If you believe in yourself and you're willing to put in that work, it WILL happen.” - Jon DiMaggio</p>
<p>In this episode, Ron and Chris are joined by author and Chief Security Strategist, Jon DiMaggio, to talk about the power of believing in yourself and following through on your dreams. Jon shares the story behind writing his book, The Art of Cyber Warfare, and how he learned to overcome rejection.</p>
<p> </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution. Check them out at Uptycs.com and be sure to stop by their booth #435 at RSA 2022</p>
<p> </p>
<p>Guest Bio:</p>
<p>Jon DiMaggio is the chief security strategist at Analyst1 and has over 15 years of experience hunting, researching, and writing about advanced cyber threats. As a specialist in enterprise ransomware attacks and nation-state intrusions, such as”Ransom Mafia: Analysis of the World’s first Ransomware Cartel”,“Nation State Ransomware” and a “History of REvil”. He has exposed the criminal cartels behind major ransomware attacks, aided law enforcement agencies in federal indictments of nation-state attacks, and discussed his work with The New York Times, Bloomberg, Fox, CNN, Reuters, and Wired. You can find Jon speaking about his research at conferences such as RSA. Additionally, in 2022, Jon authored the book “The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime” published by No Starch Press.</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Jon DiMaggio on <a href='https://www.linkedin.com/in/jondimaggio/'>LinkedIn</a> and <a href='https://twitter.com/Jon__DiMaggio'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p><em>“If you believe in yourself and you're willing to put in that work, it WILL happen.” - Jon DiMaggio</em></p>
<p>In this episode, Ron and Chris are joined by author and Chief Security Strategist, Jon DiMaggio, to talk about the power of believing in yourself and following through on your dreams. Jon shares the story behind writing his book, The Art of Cyber Warfare, and how he learned to overcome rejection.</p>
<p> </p>
<p>Sponsor Links: </p>
<p>Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!</p>
<p>Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at <a href='http://axonius.com/simone'>axonius.com/simone</a></p>
<p>With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution. Check them out at Uptycs.com and be sure to stop by their booth #435 at RSA 2022</p>
<p> </p>
<p>Guest Bio:</p>
<p>Jon DiMaggio is the chief security strategist at Analyst1 and has over 15 years of experience hunting, researching, and writing about advanced cyber threats. As a specialist in enterprise ransomware attacks and nation-state intrusions, such as”Ransom Mafia: Analysis of the World’s first Ransomware Cartel”,“Nation State Ransomware” and a “History of REvil”. He has exposed the criminal cartels behind major ransomware attacks, aided law enforcement agencies in federal indictments of nation-state attacks, and discussed his work with The New York Times, Bloomberg, Fox, CNN, Reuters, and Wired. You can find Jon speaking about his research at conferences such as RSA. Additionally, in 2022, Jon authored the book “The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime” published by No Starch Press.</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Jon DiMaggio on <a href='https://www.linkedin.com/in/jondimaggio/'>LinkedIn</a> and <a href='https://twitter.com/Jon__DiMaggio'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/89zkgx/Jon_DiMaggio_Rev1.mp3" length="68368448" type="audio/mpeg"/>
        <itunes:summary><![CDATA[“If you believe in yourself and you're willing to put in that work, it WILL happen.” - Jon DiMaggio
In this episode, Ron and Chris are joined by author and Chief Security Strategist, Jon DiMaggio, to talk about the power of believing in yourself and following through on your dreams. Jon shares the story behind writing his book, The Art of Cyber Warfare, and how he learned to overcome rejection.
 
Sponsor Links: 
Thank you to our sponsors Axonius and Uptycs for bringing this episode to life!
Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone
With Uptycs, modern defenders can prioritize, investigate and respond to threats across the entire attack surface—all from a common solution. Check them out at Uptycs.com and be sure to stop by their booth #435 at RSA 2022
 
Guest Bio:
Jon DiMaggio is the chief security strategist at Analyst1 and has over 15 years of experience hunting, researching, and writing about advanced cyber threats. As a specialist in enterprise ransomware attacks and nation-state intrusions, such as”Ransom Mafia: Analysis of the World’s first Ransomware Cartel”,“Nation State Ransomware” and a “History of REvil”. He has exposed the criminal cartels behind major ransomware attacks, aided law enforcement agencies in federal indictments of nation-state attacks, and discussed his work with The New York Times, Bloomberg, Fox, CNN, Reuters, and Wired. You can find Jon speaking about his research at conferences such as RSA. Additionally, in 2022, Jon authored the book “The Art of Cyberwarfare: An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime” published by No Starch Press.
 
Links:
Stay in touch with Jon DiMaggio on LinkedIn and Twitter
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1709</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>214</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Beyond Gold with Simone Biles</title>
        <itunes:title>Beyond Gold with Simone Biles</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/beyond-gold-with-simone-biles/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/beyond-gold-with-simone-biles/#comments</comments>        <pubDate>Wed, 11 May 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ab1200d7-1e08-341e-95ae-9c8eeacd9a20</guid>
                                    <description><![CDATA[<p>Cybersecurity podcast hosts, Chris and Ron, had the pleasure of sitting down with US Olympic gold medalist, Simone Biles, for a very special interview! You might be wondering, “what does cybersecurity and elite-level gymnastics have in common?” - both have a strong focus on controlling complexity.
Complexity comes in many forms — whether that be staying calm in the face of a malicious cyber attack or performing complex moves on the competition floor. While complexity isn’t something you can prevent, having the right team and mindset can make controlling its outcome much easier! In this episode, Ron and Chris chat with Simone about:</p>
<p>- Her recent life changing event</p>
<p>- How Simone controls the complexity in her life</p>
<p>- Why doing your best is always good enough</p>
<p>- and her partnership with Axonius!</p>
<p> </p>
<p>Guest Bio:</p>
<p>Simone Arianne Biles has boundless energy, natural strength and fierce determination, taking those God-given talents to become the greatest gymnast of all time. The 4-foot, 8-inch dynamo is the most decorated American gymnast in history, with 32 medals (19 of them gold) from the World Championship and seven medals (four gold) from the Olympics. She is also the first American woman to win seven national all-around titles and first female gymnast to earn three consecutive World All-Around titles. She is a three-time recipient of the Laureus World Sports Award for Sportswoman of the Year and has received widespread recognition, including TIME 100 Most Influential, Forbes 30 Under 30, Ebony Power 100, People Magazine’s Women Changing the World, USA Today 100 Women of the Century, and two-time Associated Press Female Athlete of the Year, among others.</p>
<p> </p>
<p>Links:</p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'>Axonius</a> for making this episode a reality!</p>
<p>Follow Simone on <a href='https://twitter.com/Simone_Biles'>Twitter</a> and <a href='https://www.instagram.com/simonebiles/'>Instagram</a></p>
<p>Watch Simone content and more at <a href='https://www.axonius.com/plus/controlling-complexity'>Axonius+</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Listen to more interviews like this from  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Cybersecurity podcast hosts, Chris and Ron, had the pleasure of sitting down with US Olympic gold medalist, Simone Biles, for a very special interview! You might be wondering, “what does cybersecurity and elite-level gymnastics have in common?” - both have a strong focus on controlling complexity.<br>
Complexity comes in many forms — whether that be staying calm in the face of a malicious cyber attack or performing complex moves on the competition floor. While complexity isn’t something you can prevent, having the right team and mindset can make controlling its outcome much easier! In this episode, Ron and Chris chat with Simone about:</p>
<p>- Her recent life changing event</p>
<p>- How Simone controls the complexity in her life</p>
<p>- Why doing your best is always good enough</p>
<p>- and her partnership with Axonius!</p>
<p> </p>
<p>Guest Bio:</p>
<p>Simone Arianne Biles has boundless energy, natural strength and fierce determination, taking those God-given talents to become the greatest gymnast of all time. The 4-foot, 8-inch dynamo is the most decorated American gymnast in history, with 32 medals (19 of them gold) from the World Championship and seven medals (four gold) from the Olympics. She is also the first American woman to win seven national all-around titles and first female gymnast to earn three consecutive World All-Around titles. She is a three-time recipient of the Laureus World Sports Award for Sportswoman of the Year and has received widespread recognition, including TIME 100 Most Influential, Forbes 30 Under 30, Ebony Power 100, People Magazine’s Women Changing the World, USA Today 100 Women of the Century, and two-time Associated Press Female Athlete of the Year, among others.</p>
<p> </p>
<p>Links:</p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'>Axonius</a> for making this episode a reality!</p>
<p>Follow Simone on <a href='https://twitter.com/Simone_Biles'>Twitter</a> and <a href='https://www.instagram.com/simonebiles/'>Instagram</a></p>
<p>Watch Simone content and more at <a href='https://www.axonius.com/plus/controlling-complexity'>Axonius+</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Listen to more interviews like this from  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/44k8pm/HVS_Simone_Final_Mix_v3_1_bl3rs.mp3" length="19142016" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Cybersecurity podcast hosts, Chris and Ron, had the pleasure of sitting down with US Olympic gold medalist, Simone Biles, for a very special interview! You might be wondering, “what does cybersecurity and elite-level gymnastics have in common?” - both have a strong focus on controlling complexity.Complexity comes in many forms — whether that be staying calm in the face of a malicious cyber attack or performing complex moves on the competition floor. While complexity isn’t something you can prevent, having the right team and mindset can make controlling its outcome much easier! In this episode, Ron and Chris chat with Simone about:
- Her recent life changing event
- How Simone controls the complexity in her life
- Why doing your best is always good enough
- and her partnership with Axonius!
 
Guest Bio:
Simone Arianne Biles has boundless energy, natural strength and fierce determination, taking those God-given talents to become the greatest gymnast of all time. The 4-foot, 8-inch dynamo is the most decorated American gymnast in history, with 32 medals (19 of them gold) from the World Championship and seven medals (four gold) from the Olympics. She is also the first American woman to win seven national all-around titles and first female gymnast to earn three consecutive World All-Around titles. She is a three-time recipient of the Laureus World Sports Award for Sportswoman of the Year and has received widespread recognition, including TIME 100 Most Influential, Forbes 30 Under 30, Ebony Power 100, People Magazine’s Women Changing the World, USA Today 100 Women of the Century, and two-time Associated Press Female Athlete of the Year, among others.
 
Links:
Thank you to our friends at Axonius for making this episode a reality!
Follow Simone on Twitter and Instagram
Watch Simone content and more at Axonius+
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Listen to more interviews like this from  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1192</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>213</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Harness Your Anxiety in Cyber with Dr. Chloe Carmichael</title>
        <itunes:title>Harness Your Anxiety in Cyber with Dr. Chloe Carmichael</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/harness-your-anxiety-in-cyber-with-dr-chloe-carmichael/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/harness-your-anxiety-in-cyber-with-dr-chloe-carmichael/#comments</comments>        <pubDate>Mon, 09 May 2022 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/22d7f6ea-b575-325a-a3a8-b9eb99845193</guid>
                                    <description><![CDATA[<p>Anxiety and nervous energy is palpable in cybersecurity. If practitioners allow this energy to take control, it can be stifling and paralyzing. But what if we were to use this power to do what it was intended to do? In this episode, Ron and Chris chat with Dr. Chloe Carmichael, author of the Deepak Chopra endorsed book, Nervous Energy: Harness the Power of Your Anxiety. They discuss:</p>
<p>-The purpose of nervous energy</p>
<p>-When this energy enters our lives</p>
<p>-How we can use this energy to our advantage</p>
<p>-and how it can even become a superpower</p>
<p> </p>
<p>Guest Bio</p>
<p>Dr. Chloe Carmichael, Ph.D, is a clinical psychologist, known as Dr. Chloe. She holds a Master’s degree and Ph.D. in clinical psychology from Long Island University and graduated Phi Beta Kappa, summa cum laude, with a Bachelor’s degree and departmental honors in psychology from Columbia University. Her practice in New York City employs multiple therapists to serve high-functioning business executives, people in the arts, and everyday people seeking support with personal or professional goals.</p>
<p>Dr. Chloe is the author of the book Nervous Energy: Harness the Power of  Your Anxiety, endorsed by Deepak Chopra! She is a member in good standing of the American Psychological Association, as well as the National Register of Health Psychologists, an elite organization for psychologists with gold-standard credentials. She is also a consultant at Baker McKenzie, the third largest law firm in the world. She is an Advisory Board member for Women’s Health Magazine (Hearst), and a featured expert for Psychology Today. She enjoys relating with the media, as well as public speaking. She has been featured as an expert on VH1, Inside Edition, and other television; and has been quoted in the New York Times, Forbes, Vanity Fair, Rolling Stone, and other print media.</p>
<p> </p>
<p>Links:</p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode!</p>
<p>Stay in touch with Dr. Chloe Carmichael on <a href='https://www.linkedin.com/in/chloecarmichael'>LinkedIn</a> and <a href='https://twitter.com/drchloe_'>Twitter</a> and by her <a href='https://www.drchloe.com/book/?hsLang=en'>Book</a> here!</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Anxiety and nervous energy is palpable in cybersecurity. If practitioners allow this energy to take control, it can be stifling and paralyzing. But what if we were to use this power to do what it was intended to do? In this episode, Ron and Chris chat with Dr. Chloe Carmichael, author of the Deepak Chopra endorsed book, <em>Nervous Energy: Harness the Power of Your Anxiety</em>. They discuss:</p>
<p>-The purpose of nervous energy</p>
<p>-When this energy enters our lives</p>
<p>-How we can use this energy to our advantage</p>
<p>-and how it can even become a superpower</p>
<p> </p>
<p>Guest Bio</p>
<p>Dr. Chloe Carmichael, Ph.D, is a clinical psychologist, known as Dr. Chloe. She holds a Master’s degree and Ph.D. in clinical psychology from Long Island University and graduated Phi Beta Kappa, summa cum laude, with a Bachelor’s degree and departmental honors in psychology from Columbia University. Her practice in New York City employs multiple therapists to serve high-functioning business executives, people in the arts, and everyday people seeking support with personal or professional goals.</p>
<p>Dr. Chloe is the author of the book Nervous Energy: Harness the Power of  Your Anxiety, endorsed by Deepak Chopra! She is a member in good standing of the American Psychological Association, as well as the National Register of Health Psychologists, an elite organization for psychologists with gold-standard credentials. She is also a consultant at Baker McKenzie, the third largest law firm in the world. She is an Advisory Board member for Women’s Health Magazine (Hearst), and a featured expert for Psychology Today. She enjoys relating with the media, as well as public speaking. She has been featured as an expert on VH1, Inside Edition, and other television; and has been quoted in the New York Times, Forbes, Vanity Fair, Rolling Stone, and other print media.</p>
<p> </p>
<p>Links:</p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode!</p>
<p>Stay in touch with Dr. Chloe Carmichael on <a href='https://www.linkedin.com/in/chloecarmichael'>LinkedIn</a> and <a href='https://twitter.com/drchloe_'>Twitter</a> and by her <a href='https://www.drchloe.com/book/?hsLang=en'>Book</a> here!</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6bz2vb/Dr_Chloe_Charmichael.mp3" length="62362688" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Anxiety and nervous energy is palpable in cybersecurity. If practitioners allow this energy to take control, it can be stifling and paralyzing. But what if we were to use this power to do what it was intended to do? In this episode, Ron and Chris chat with Dr. Chloe Carmichael, author of the Deepak Chopra endorsed book, Nervous Energy: Harness the Power of Your Anxiety. They discuss:
-The purpose of nervous energy
-When this energy enters our lives
-How we can use this energy to our advantage
-and how it can even become a superpower
 
Guest Bio
Dr. Chloe Carmichael, Ph.D, is a clinical psychologist, known as Dr. Chloe. She holds a Master’s degree and Ph.D. in clinical psychology from Long Island University and graduated Phi Beta Kappa, summa cum laude, with a Bachelor’s degree and departmental honors in psychology from Columbia University. Her practice in New York City employs multiple therapists to serve high-functioning business executives, people in the arts, and everyday people seeking support with personal or professional goals.
Dr. Chloe is the author of the book Nervous Energy: Harness the Power of  Your Anxiety, endorsed by Deepak Chopra! She is a member in good standing of the American Psychological Association, as well as the National Register of Health Psychologists, an elite organization for psychologists with gold-standard credentials. She is also a consultant at Baker McKenzie, the third largest law firm in the world. She is an Advisory Board member for Women’s Health Magazine (Hearst), and a featured expert for Psychology Today. She enjoys relating with the media, as well as public speaking. She has been featured as an expert on VH1, Inside Edition, and other television; and has been quoted in the New York Times, Forbes, Vanity Fair, Rolling Stone, and other print media.
 
Links:
Thank you to our friends at Axonius and Uptycs for sponsoring this episode!
Stay in touch with Dr. Chloe Carmichael on LinkedIn and Twitter and by her Book here!
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1559</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>212</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Threat Inside With Shawnee Delaney</title>
        <itunes:title>The Threat Inside With Shawnee Delaney</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-threat-inside-with-shawnee-delaney/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-threat-inside-with-shawnee-delaney/#comments</comments>        <pubDate>Tue, 03 May 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a7390f78-035b-3318-a771-f1d64532d2bb</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris highlight a human problem that affects every company and organization in the world – Insider Threat. Shawnee Delaney, an Insider Threat expert, cybersecurity consultant and CEO of Vaillance Group, joins the guys to provide her expertise on the topic and shares real life examples of treason and espionage. In this episode Shawnee explores:</p>
<ul><li>The intersection of empathy and espionage</li>
<li>Motivations and vulnerabilities</li>
<li>The importance of insider threat programs</li>
<li>Protecting your trade secrets</li>
<li>Investing in your people, and more! </li>
</ul>
<p> </p>
<p>Guest Bio:</p>
<p>Shawnee Delaney is an Insider Threat expert, cybersecurity consultant, and CEO of Vaillance Group - based in Washington, DC. She is a decorated intelligence officer and a licensed private investor who has spent part of her career within the Defense Intelligence Agency as a Clandestine Officer conducting Human Intelligence operations around the world. She has also supported the Department of Homeland Security, defending critical infrastructure and industrial control systems within the U.S. Her combat tours, field experience, and consulting with top Fortune 500 Companies has provided the foundation for the curriculum she offers in her Insider Threat training programs. A sought-after public speaker, Ms. Delaney shares her extensive knowledge of Insider Threats to protect clients’ assets, people, and confidential information and to educate groups about the harm that comes from both malicious and unintentional threats.</p>
<p> </p>
<p>Links:</p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode!</p>
<p>Stay in touch with Shawnee Delaney on <a href='https://www.linkedin.com/in/shawnee-delaney-30935651/'>LinkedIn</a> and <a href='https://twitter.com/shawnee_delaney'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris highlight a human problem that affects every company and organization in the world – Insider Threat. Shawnee Delaney, an Insider Threat expert, cybersecurity consultant and CEO of Vaillance Group, joins the guys to provide her expertise on the topic and shares real life examples of treason and espionage. In this episode Shawnee explores:</p>
<ul><li>The intersection of empathy and espionage</li>
<li>Motivations and vulnerabilities</li>
<li>The importance of insider threat programs</li>
<li>Protecting your trade secrets</li>
<li>Investing in your people, and more! </li>
</ul>
<p> </p>
<p>Guest Bio:</p>
<p>Shawnee Delaney is an Insider Threat expert, cybersecurity consultant, and CEO of Vaillance Group - based in Washington, DC. She is a decorated intelligence officer and a licensed private investor who has spent part of her career within the Defense Intelligence Agency as a Clandestine Officer conducting Human Intelligence operations around the world. She has also supported the Department of Homeland Security, defending critical infrastructure and industrial control systems within the U.S. Her combat tours, field experience, and consulting with top Fortune 500 Companies has provided the foundation for the curriculum she offers in her Insider Threat training programs. A sought-after public speaker, Ms. Delaney shares her extensive knowledge of Insider Threats to protect clients’ assets, people, and confidential information and to educate groups about the harm that comes from both malicious and unintentional threats.</p>
<p> </p>
<p>Links:</p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode!</p>
<p>Stay in touch with Shawnee Delaney on <a href='https://www.linkedin.com/in/shawnee-delaney-30935651/'>LinkedIn</a> and <a href='https://twitter.com/shawnee_delaney'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qtazbn/Shawnee_Delaney.mp3" length="71449088" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris highlight a human problem that affects every company and organization in the world – Insider Threat. Shawnee Delaney, an Insider Threat expert, cybersecurity consultant and CEO of Vaillance Group, joins the guys to provide her expertise on the topic and shares real life examples of treason and espionage. In this episode Shawnee explores:
The intersection of empathy and espionage
Motivations and vulnerabilities
The importance of insider threat programs
Protecting your trade secrets
Investing in your people, and more! 
 
Guest Bio:
Shawnee Delaney is an Insider Threat expert, cybersecurity consultant, and CEO of Vaillance Group - based in Washington, DC. She is a decorated intelligence officer and a licensed private investor who has spent part of her career within the Defense Intelligence Agency as a Clandestine Officer conducting Human Intelligence operations around the world. She has also supported the Department of Homeland Security, defending critical infrastructure and industrial control systems within the U.S. Her combat tours, field experience, and consulting with top Fortune 500 Companies has provided the foundation for the curriculum she offers in her Insider Threat training programs. A sought-after public speaker, Ms. Delaney shares her extensive knowledge of Insider Threats to protect clients’ assets, people, and confidential information and to educate groups about the harm that comes from both malicious and unintentional threats.
 
Links:
Thank you to our friends at Axonius and Uptycs for sponsoring this episode!
Stay in touch with Shawnee Delaney on LinkedIn and Twitter
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1786</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>211</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Cyber Is A Gritty Situation With David Fivecoat</title>
        <itunes:title>Cyber Is A Gritty Situation With David Fivecoat</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/cyber-is-a-gritty-situation-with-david-fivecoat/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/cyber-is-a-gritty-situation-with-david-fivecoat/#comments</comments>        <pubDate>Tue, 26 Apr 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/917ddb9a-20e1-386e-b9aa-7021c9b8b10c</guid>
                                    <description><![CDATA[<p>What is grit? How much or little do YOU have? Can we grow it? </p>
<p>Hosts Ron and Chris are joined by the Executive Coach and Founder of Fivecoat Consulting Group, David Fivecoat, to talk about how grit shows up in our lives and ways that we can cultivate more.</p>
<p>Guest Bio:</p>
<p>After 24 years as a US Army paratrooper, as well as 4 combat tours in Iraq and Afghanistan, Colonel David Fivecoat, US Army, Retired, founded The Fivecoat Consulting Group. He now blogs, speaks, coaches gritty leaders, and helps develop gritty organizations. A native Ohioan, David Fivecoat resides in Columbus, Georgia.</p>
<p> </p>
<p>Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this episode to life!</p>
<p>Axonius, the first company to solve the cybersecurity asset management problem. Give your team's time back by checking them out at <a href='https://www.axonius.com/'>https://www.axonius.com/</a> </p>
<p>PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at <a href='http://plextrac.com/hackervalley'>plextrac.com/hackervalley</a> </p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with David Fivecoat on <a href='https://www.linkedin.com/in/david-fivecoat-b5860b75/'>LinkedIn</a> and <a href='https://mobile.twitter.com/teamtechboy'> </a><a href='http://www.thefivecoatconsultinggroup.com'>His website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What is grit? How much or little do YOU have? Can we grow it? </p>
<p>Hosts Ron and Chris are joined by the Executive Coach and Founder of Fivecoat Consulting Group, David Fivecoat, to talk about how grit shows up in our lives and ways that we can cultivate more.</p>
<p>Guest Bio:</p>
<p>After 24 years as a US Army paratrooper, as well as 4 combat tours in Iraq and Afghanistan, Colonel David Fivecoat, US Army, Retired, founded The Fivecoat Consulting Group. He now blogs, speaks, coaches gritty leaders, and helps develop gritty organizations. A native Ohioan, David Fivecoat resides in Columbus, Georgia.</p>
<p> </p>
<p>Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this episode to life!</p>
<p>Axonius, the first company to solve the cybersecurity asset management problem. Give your team's time back by checking them out at <a href='https://www.axonius.com/'>https://www.axonius.com/</a> </p>
<p>PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at <a href='http://plextrac.com/hackervalley'>plextrac.com/hackervalley</a> </p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with David Fivecoat on <a href='https://www.linkedin.com/in/david-fivecoat-b5860b75/'>LinkedIn</a> and <a href='https://mobile.twitter.com/teamtechboy'> </a><a href='http://www.thefivecoatconsultinggroup.com'>His website</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zpuybt/David_Fivecoat_Revision.mp3" length="73374848" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What is grit? How much or little do YOU have? Can we grow it? 
Hosts Ron and Chris are joined by the Executive Coach and Founder of Fivecoat Consulting Group, David Fivecoat, to talk about how grit shows up in our lives and ways that we can cultivate more.
Guest Bio:
After 24 years as a US Army paratrooper, as well as 4 combat tours in Iraq and Afghanistan, Colonel David Fivecoat, US Army, Retired, founded The Fivecoat Consulting Group. He now blogs, speaks, coaches gritty leaders, and helps develop gritty organizations. A native Ohioan, David Fivecoat resides in Columbus, Georgia.
 
Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this episode to life!
Axonius, the first company to solve the cybersecurity asset management problem. Give your team's time back by checking them out at https://www.axonius.com/ 
PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley 
 
Additional Links:
Stay in touch with David Fivecoat on LinkedIn and  His website
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1834</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>210</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Becoming Team Tech Boy with DeJuan Strickland</title>
        <itunes:title>Becoming Team Tech Boy with DeJuan Strickland</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/becoming-team-tech-boy-with-dejuan-strickland/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/becoming-team-tech-boy-with-dejuan-strickland/#comments</comments>        <pubDate>Tue, 19 Apr 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e42c7fcf-7983-3066-be91-9bb0e4882ca8</guid>
                                    <description><![CDATA[<p>DeJuan Strickland (DJ) is a huge superhero fan, but when he realized there weren’t many superheroes and comic book characters that looked like him, he decided to do something about it! Enter: Tech Boy! DJ joins hosts Ron and Chris to share his unique experiences as an 13 year old author, entrepreneur, and tech enthusiast. </p>
<p> </p>
<p>Guest Bio:</p>
<p>DeJuan Strickland is a 13-old scholar born and raised in St. Louis, Missouri. He enjoys gaming, anime, reading, and indulging in comic books. He is a long-time honor roll student who thoroughly enjoys science and technology. He has recently been appointed as a youth member of STEMSTL's Strategic Advisory Board. Tech Boy is DeJuan's debut title and his mission is to inspire other youth to become tech-savvy entrepreneurs.</p>
<p> </p>
<p>Sponsor Links:</p>
<p>A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with DJ on <a href='https://www.instagram.com/teamtechboy/'>Instagram</a> and<a href='https://mobile.twitter.com/teamtechboy'> Twitter</a> </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>DeJuan Strickland (DJ) is a huge superhero fan, but when he realized there weren’t many superheroes and comic book characters that looked like him, he decided to do something about it! Enter: <em>Tech Boy</em>! DJ joins hosts Ron and Chris to share his unique experiences as an 13 year old author, entrepreneur, and tech enthusiast. </p>
<p> </p>
<p>Guest Bio:</p>
<p>DeJuan Strickland is a 13-old scholar born and raised in St. Louis, Missouri. He enjoys gaming, anime, reading, and indulging in comic books. He is a long-time honor roll student who thoroughly enjoys science and technology. He has recently been appointed as a youth member of STEMSTL's Strategic Advisory Board. Tech Boy is DeJuan's debut title and his mission is to inspire other youth to become tech-savvy entrepreneurs.</p>
<p> </p>
<p>Sponsor Links:</p>
<p>A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with DJ on <a href='https://www.instagram.com/teamtechboy/'>Instagram</a> and<a href='https://mobile.twitter.com/teamtechboy'> Twitter</a> </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gkpdj8/Team_Tech_Boy.mp3" length="45760448" type="audio/mpeg"/>
        <itunes:summary><![CDATA[DeJuan Strickland (DJ) is a huge superhero fan, but when he realized there weren’t many superheroes and comic book characters that looked like him, he decided to do something about it! Enter: Tech Boy! DJ joins hosts Ron and Chris to share his unique experiences as an 13 year old author, entrepreneur, and tech enthusiast. 
 
Guest Bio:
DeJuan Strickland is a 13-old scholar born and raised in St. Louis, Missouri. He enjoys gaming, anime, reading, and indulging in comic books. He is a long-time honor roll student who thoroughly enjoys science and technology. He has recently been appointed as a youth member of STEMSTL's Strategic Advisory Board. Tech Boy is DeJuan's debut title and his mission is to inspire other youth to become tech-savvy entrepreneurs.
 
Sponsor Links:
A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!
 
Links:
Stay in touch with DJ on Instagram and Twitter 
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1144</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>209</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>And the Academy Award Goes To...With Evan Mayfield</title>
        <itunes:title>And the Academy Award Goes To...With Evan Mayfield</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/and-the-academy-award-goes-towith-evan-mayfield/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/and-the-academy-award-goes-towith-evan-mayfield/#comments</comments>        <pubDate>Tue, 12 Apr 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/50d285f5-350f-3b3c-95ac-6180bd56000a</guid>
                                    <description><![CDATA[<p>Evan Mayfield, an award-winning 3D animator and founder of the Kingdom of Dwarves NFT project, joins Ron and Chris to talk about how his love of art allows him to experience life in new and creative ways. In this episode, Evan shares his story behind winning an Academy Award and starting a career in the film industry, what led him into creating NFT art and founding Kingdom of Dwarves NFT project, and the importance of being receptive to feedback in your career. </p>
<p> </p>
<p>Guest Bio:</p>
<p>Evan Mayfield is an Academy Award winning 3D animator/Animation Director in the Film/Commercial/VideoGame/AR/VR field. He is also one of the founders of the Kingdom of Dwarves NFT project.</p>
<p> </p>
<p>Sponsor Links:
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Evan Mayfield on <a href='https://www.linkedin.com/in/evan-mayfield-b13bb37'>LinkedIn</a> ,<a href='https://twitter.com/KingdomDwarves'> Twitter</a> and <a href='http://discord.gg/kingdomofdwarves'>Discord</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Evan Mayfield, an award-winning 3D animator and founder of the Kingdom of Dwarves NFT project, joins Ron and Chris to talk about how his love of art allows him to experience life in new and creative ways. In this episode, Evan shares his story behind winning an Academy Award and starting a career in the film industry, what led him into creating NFT art and founding Kingdom of Dwarves NFT project, and the importance of being receptive to feedback in your career. </p>
<p> </p>
<p>Guest Bio:</p>
<p>Evan Mayfield is an Academy Award winning 3D animator/Animation Director in the Film/Commercial/VideoGame/AR/VR field. He is also one of the founders of the Kingdom of Dwarves NFT project.</p>
<p> </p>
<p>Sponsor Links:<br>
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Evan Mayfield on <a href='https://www.linkedin.com/in/evan-mayfield-b13bb37'>LinkedIn</a> ,<a href='https://twitter.com/KingdomDwarves'> Twitter</a> and <a href='http://discord.gg/kingdomofdwarves'>Discord</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dc833c/Evan_Mayfield_Rev1.mp3" length="88712768" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Evan Mayfield, an award-winning 3D animator and founder of the Kingdom of Dwarves NFT project, joins Ron and Chris to talk about how his love of art allows him to experience life in new and creative ways. In this episode, Evan shares his story behind winning an Academy Award and starting a career in the film industry, what led him into creating NFT art and founding Kingdom of Dwarves NFT project, and the importance of being receptive to feedback in your career. 
 
Guest Bio:
Evan Mayfield is an Academy Award winning 3D animator/Animation Director in the Film/Commercial/VideoGame/AR/VR field. He is also one of the founders of the Kingdom of Dwarves NFT project.
 
Sponsor Links:A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!
 
Links:
Stay in touch with Evan Mayfield on LinkedIn , Twitter and Discord
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2217</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>208</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Road Less Traveled with Isabel Leong</title>
        <itunes:title>The Road Less Traveled with Isabel Leong</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-road-less-traveled-with-isabel-leong/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-road-less-traveled-with-isabel-leong/#comments</comments>        <pubDate>Tue, 05 Apr 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7e0e797d-ee5e-3d0d-af0d-3d0b0f858ed8</guid>
                                    <description><![CDATA[<p>In this new age of remote work, people are able to live and work in ways that we never thought possible. In this episode Ron and Chris are joined by Isabel Leong, a full-time travel blogger and SEO marketing coach. Isabel shares how she turned her hobby into a career that allows her to fulfill her passion for travel and her tips for those attempting to do the same.</p>
<p> </p>
<p>Guest Bio:</p>
<p>Full-time travel blogger and SEO marketing coach roaming the world at whim, Isabel draws energy from being outdoors. An explorer at heart, the world is her playground. She helps aspiring bloggers and brands get the most out of their online presence and financial freedom by ranking on Google faster with SEO and expose millennial travelers to experiences beyond their imaginations.</p>
<p> </p>
<p>Sponsor Links:
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with Isabel Leong on <a href='https://www.linkedin.com/in/isabel-leong-7027687b/'>LinkedIn</a>, <a href='https://www.twitter.com/belardtheworld/'> Twitter</a> and <a href='https://www.instagram.com/belardtheworld/'>Instagram</a>  </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>











Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a>
 
Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a>
 
Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a>
 
Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a>
 










]]></description>
                                                            <content:encoded><![CDATA[<p>In this new age of remote work, people are able to live and work in ways that we never thought possible. In this episode Ron and Chris are joined by Isabel Leong, a full-time travel blogger and SEO marketing coach. Isabel shares how she turned her hobby into a career that allows her to fulfill her passion for travel and her tips for those attempting to do the same.</p>
<p> </p>
<p>Guest Bio:</p>
<p>Full-time travel blogger and SEO marketing coach roaming the world at whim, Isabel draws energy from being outdoors. An explorer at heart, the world is her playground. She helps aspiring bloggers and brands get the most out of their online presence and financial freedom by ranking on Google faster with SEO and expose millennial travelers to experiences beyond their imaginations.</p>
<p> </p>
<p>Sponsor Links:<br>
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with Isabel Leong on <a href='https://www.linkedin.com/in/isabel-leong-7027687b/'>LinkedIn</a>, <a href='https://www.twitter.com/belardtheworld/'> Twitter</a> and <a href='https://www.instagram.com/belardtheworld/'>Instagram</a>  </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>











Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a>
 
Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a>
 
Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a>
 
Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a>
 










]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hhyyum/Isabel_Leong.mp3" length="58127168" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this new age of remote work, people are able to live and work in ways that we never thought possible. In this episode Ron and Chris are joined by Isabel Leong, a full-time travel blogger and SEO marketing coach. Isabel shares how she turned her hobby into a career that allows her to fulfill her passion for travel and her tips for those attempting to do the same.
 
Guest Bio:
Full-time travel blogger and SEO marketing coach roaming the world at whim, Isabel draws energy from being outdoors. An explorer at heart, the world is her playground. She helps aspiring bloggers and brands get the most out of their online presence and financial freedom by ranking on Google faster with SEO and expose millennial travelers to experiences beyond their imaginations.
 
Sponsor Links:A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!
 
Additional Links:
Stay in touch with Isabel Leong on LinkedIn,  Twitter and Instagram  
Connect with Ron Eddings on LinkedIn and Twitter











Connect with Chris Cochran on LinkedIn and Twitter
 
Purchase a HVS t-shirt at our shop
 
Continue the conversation by joining our Discord
 
Check out  Hacker Valley Media and Hacker Valley Studio
 










]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1453</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>207</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>An Unstoppable Mind with David Pearson</title>
        <itunes:title>An Unstoppable Mind with David Pearson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/an-unstoppable-mind-with-david-pearson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/an-unstoppable-mind-with-david-pearson/#comments</comments>        <pubDate>Tue, 29 Mar 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2e2320fc-7b5a-3cf7-828a-f1f89e90e5b4</guid>
                                    <description><![CDATA[<p>In this episode Ron and Chris are joined by the co-founder and CEO of SeclarityIO, David Pearson, to talk about his experience in building a company from the ground up. David shares the challenge of “building something from nothing,” seeking help, and the importance of having a solid support system. David explores the intricacies and inner workings of his mind and his tips on tapping into creativity and innovative thought. </p>
<p> </p>
<p>Guest Bio: </p>
<p>David is the co-founder and CEO of SeclarityIO, the company building NetworkSage. During his career, he has spent time on the red team, blue team, and in deep research. He was formerly the Head of Threat Research at Awake Security. David has security degrees from the Rochester Institute of Technology and Carnegie Mellon, and has spoken and taught workshops at many top security conferences.</p>
<p> </p>
<p>Sponsor Links:
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with David Pearson on <a href='https://linkedin.com/in/davidbpearson/'>LinkedIn</a> and <a href='https://twitter.com/0xDAV1D'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode Ron and Chris are joined by the co-founder and CEO of SeclarityIO, David Pearson, to talk about his experience in building a company from the ground up. David shares the challenge of “building something from nothing,” seeking help, and the importance of having a solid support system. David explores the intricacies and inner workings of his mind and his tips on tapping into creativity and innovative thought. </p>
<p> </p>
<p>Guest Bio: </p>
<p>David is the co-founder and CEO of SeclarityIO, the company building NetworkSage. During his career, he has spent time on the red team, blue team, and in deep research. He was formerly the Head of Threat Research at Awake Security. David has security degrees from the Rochester Institute of Technology and Carnegie Mellon, and has spoken and taught workshops at many top security conferences.</p>
<p> </p>
<p>Sponsor Links:<br>
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with David Pearson on <a href='https://linkedin.com/in/davidbpearson/'>LinkedIn</a> and <a href='https://twitter.com/0xDAV1D'>Twitter</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qmmkyz/David_Pearson.mp3" length="78129728" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode Ron and Chris are joined by the co-founder and CEO of SeclarityIO, David Pearson, to talk about his experience in building a company from the ground up. David shares the challenge of “building something from nothing,” seeking help, and the importance of having a solid support system. David explores the intricacies and inner workings of his mind and his tips on tapping into creativity and innovative thought. 
 
Guest Bio: 
David is the co-founder and CEO of SeclarityIO, the company building NetworkSage. During his career, he has spent time on the red team, blue team, and in deep research. He was formerly the Head of Threat Research at Awake Security. David has security degrees from the Rochester Institute of Technology and Carnegie Mellon, and has spoken and taught workshops at many top security conferences.
 
Sponsor Links:A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!
 
Additional Links:
Stay in touch with David Pearson on LinkedIn and Twitter
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1953</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>206</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Growing A Successful Podcast with Adam Adams</title>
        <itunes:title>Growing A Successful Podcast with Adam Adams</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/growing-a-successful-podcast-with-adam-adams-1647919574/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/growing-a-successful-podcast-with-adam-adams-1647919574/#comments</comments>        <pubDate>Tue, 22 Mar 2022 08:18:55 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/4992fdff-fe69-3284-93c7-772d8670fc93</guid>
                                    <description><![CDATA[<p>Anyone can start a podcast, but what about a successful podcast? What about a podcast that reaches, connects and impacts people for the better? In this episode, Ron and Chris are joined by Adam Adams to talk about what it takes to create a successful podcast. Adam touches on the importance of having quality equipment, a compelling and entertaining message, and great marketing. He explores the reasons why having a broad audience isn’t the best tactic when trying to stand out and why you shouldn’t be afraid to “draw a line in the sand.”</p>
<p> </p>
<p>Guest Bio:</p>
<p>After selling his first podcast and seeing everything that his show did for his business, Adam Adams founded a company to serve podcasters in a whole new way. Knowing successful business owners have already learned to stay in their lane and focus on revenue generating activities Adam founded Grow Your Show, which is the easy button for podcasters. They make having a top rated podcast as easy as pressing “record”.
</p>
<p> </p>
<p>Sponsor Links:
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Adam Adams on <a href='https://www.linkedin.com/in/adam-a-adams/'>LinkedIn</a> and <a href='https://instagram.com/podcastadam?utm_medium=copy_link'>Instagram</a> & check out his <a href='https://podcasts.apple.com/us/podcast/the-podcast-on-podcasting/id1560389468'>podcast</a> and <a href='https://growyourshow.com/'>website</a>  </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Anyone can start a podcast, but what about a successful podcast? What about a podcast that reaches, connects and impacts people for the better? In this episode, Ron and Chris are joined by Adam Adams to talk about what it takes to create a successful podcast. Adam touches on the importance of having quality equipment, a compelling and entertaining message, and great marketing. He explores the reasons why having a broad audience isn’t the best tactic when trying to stand out and why you shouldn’t be afraid to “draw a line in the sand.”</p>
<p> </p>
<p>Guest Bio:</p>
<p>After selling his first podcast and seeing everything that his show did for his business, Adam Adams founded a company to serve podcasters in a whole new way. Knowing successful business owners have already learned to stay in their lane and focus on revenue generating activities Adam founded <em>Grow Your Show,</em> which is the easy button for podcasters. They make having a top rated podcast as easy as pressing “record”.<br>
</p>
<p> </p>
<p>Sponsor Links:<br>
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Links:</p>
<p>Stay in touch with Adam Adams on <a href='https://www.linkedin.com/in/adam-a-adams/'>LinkedIn</a> and <a href='https://instagram.com/podcastadam?utm_medium=copy_link'>Instagram</a> & check out his <a href='https://podcasts.apple.com/us/podcast/the-podcast-on-podcasting/id1560389468'>podcast</a> and <a href='https://growyourshow.com/'>website</a>  </p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rjpqdb/Adam_Adams_1_6koxq.mp3" length="94816448" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Anyone can start a podcast, but what about a successful podcast? What about a podcast that reaches, connects and impacts people for the better? In this episode, Ron and Chris are joined by Adam Adams to talk about what it takes to create a successful podcast. Adam touches on the importance of having quality equipment, a compelling and entertaining message, and great marketing. He explores the reasons why having a broad audience isn’t the best tactic when trying to stand out and why you shouldn’t be afraid to “draw a line in the sand.”
 
Guest Bio:
After selling his first podcast and seeing everything that his show did for his business, Adam Adams founded a company to serve podcasters in a whole new way. Knowing successful business owners have already learned to stay in their lane and focus on revenue generating activities Adam founded Grow Your Show, which is the easy button for podcasters. They make having a top rated podcast as easy as pressing “record”.
 
Sponsor Links:A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!
 
Links:
Stay in touch with Adam Adams on LinkedIn and Instagram & check out his podcast and website  
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2370</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>205</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Risk: Black Swans Versus Gray Rhinos with Michele Wucker</title>
        <itunes:title>Risk: Black Swans Versus Gray Rhinos with Michele Wucker</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/risk-black-swans-versus-gray-rhinos-with-michele-wucker/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/risk-black-swans-versus-gray-rhinos-with-michele-wucker/#comments</comments>        <pubDate>Tue, 15 Mar 2022 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/4c78fee9-7cf4-3b6f-9334-770ee5f36fc8</guid>
                                    <description><![CDATA[<p>Have you ever heard of the term, “Black Swans” or “Gray Rhinos”? Black Swan are events that we never saw coming, while Gray Rhinos are the things we see from a mile away. In this episode, author and strategist Michele Wucker explores the gray rhino and risk fingerprint metaphors and translates big picture trends in ways everyday folks can apply to their lives. 

</p>
<p>Sponsor Links:
A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!</p>
<p>Axonius, the first company to solve the cybersecurity asset management problem. Give your team's time back to work by checking out <a href='https://www.axonius.com/'>axonius.com/</a> </p>
<p>PlexTrac, the proactive cybersecurity management platform, brings red and blue teams together for better collaboration and communication. Check them out at <a href='http://plextrac.com/hackervalley'>plextrac.com/hackervalley</a></p>
<p> </p>
<p>Guest Bio:</p>
<p>Michele Wucker is a strategist and the author of four books including the global bestseller, THE GRAY RHINO: How to Recognize and Act on the Obvious Dangers We Ignore. The metaphor and principles from her book have moved markets, shaped financial policies, and made headlines around the world. It helped to frame the ignored warnings ahead of the COVID-19 pandemic and have even inspired the lyrics of the hit pandemic pop single, “Blue & Grey” by the mega-band BTS. Michele’s 2019 TED Talk has attracted over two million views. 
</p>
<p>Additional Links:</p>
<p>Learn more about Michele’s research <a href='http://thegrayrhino.com'>here</a>.</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a>
</p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a>
</p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a>
</p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a>
</p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Have you ever heard of the term, “Black Swans” or “Gray Rhinos”? Black Swan are events that we never saw coming, while Gray Rhinos are the things we see from a mile away. In this episode, author and strategist Michele Wucker explores the gray rhino and risk fingerprint metaphors and translates big picture trends in ways everyday folks can apply to their lives. <br>
<br>
</p>
<p>Sponsor Links:<br>
A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!</p>
<p>Axonius, the first company to solve the cybersecurity asset management problem. Give your team's time back to work by checking out <a href='https://www.axonius.com/'>axonius.com/</a> </p>
<p>PlexTrac, the proactive cybersecurity management platform, brings red and blue teams together for better collaboration and communication. Check them out at <a href='http://plextrac.com/hackervalley'>plextrac.com/hackervalley</a></p>
<p> </p>
<p>Guest Bio:</p>
<p>Michele Wucker is a strategist and the author of four books including the global bestseller, <em>THE GRAY RHINO: How to Recognize and Act on the Obvious Dangers We Ignore</em>. The metaphor and principles from her book have moved markets, shaped financial policies, and made headlines around the world. It helped to frame the ignored warnings ahead of the COVID-19 pandemic and have even inspired the lyrics of the hit pandemic pop single, “Blue & Grey” by the mega-band BTS. Michele’s 2019 TED Talk has attracted over two million views. <br>
</p>
<p>Additional Links:</p>
<p>Learn more about Michele’s research <a href='http://thegrayrhino.com'>here</a>.</p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a><br>
</p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a><br>
</p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a><br>
</p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a><br>
</p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kp5m7c/Michele_Wucker_Final_Mix_v28oobu.mp3" length="33429120" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Have you ever heard of the term, “Black Swans” or “Gray Rhinos”? Black Swan are events that we never saw coming, while Gray Rhinos are the things we see from a mile away. In this episode, author and strategist Michele Wucker explores the gray rhino and risk fingerprint metaphors and translates big picture trends in ways everyday folks can apply to their lives. 
Sponsor Links:A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!
Axonius, the first company to solve the cybersecurity asset management problem. Give your team's time back to work by checking out axonius.com/ 
PlexTrac, the proactive cybersecurity management platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley
 
Guest Bio:
Michele Wucker is a strategist and the author of four books including the global bestseller, THE GRAY RHINO: How to Recognize and Act on the Obvious Dangers We Ignore. The metaphor and principles from her book have moved markets, shaped financial policies, and made headlines around the world. It helped to frame the ignored warnings ahead of the COVID-19 pandemic and have even inspired the lyrics of the hit pandemic pop single, “Blue & Grey” by the mega-band BTS. Michele’s 2019 TED Talk has attracted over two million views. 
Additional Links:
Learn more about Michele’s research here.
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2085</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>203</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Choosing the Right Words with Terre Short</title>
        <itunes:title>Choosing the Right Words with Terre Short</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/choosing-the-right-words-with-terre-short/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/choosing-the-right-words-with-terre-short/#comments</comments>        <pubDate>Tue, 08 Mar 2022 06:57:46 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b095e20f-8ece-3476-81a9-8f6e4d604733</guid>
                                    <description><![CDATA[<p>We believe you are what you listen to -- including the personal podcast that is playing in your head every day. What is it saying to you? Our guest Terre Short excels at distilling leadership skills into actionable steps and choosing the right words to inspire others and giving ourselves the words we need to move forward.</p>
<p> </p>
<p>Guest Bio:</p>
<p>Terre Short is a human potential developer who has more than 30 years of leadership experience, a Masters in Business Administration/Healthcare Management, and her Professional Coach Certification (PCC). She coaches leaders on tactics to raise engagement and improve retention. She also leans on the content in her book, “The Words We Choose: Your Guide to How and Why Words Matter in helping others become their best selves.”</p>
<p> </p>
<p>Sponsor Links:
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Additional Links:</p>
<p>Book Terre as a <a href='https://www.shortgroup.net/'>Speaker or Coach</a> and purchase <a href='https://www.shortgroup.net/shop'>Terre's book</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We believe you are what you listen to -- including the personal podcast that is playing in your head every day. What is it saying to you? Our guest Terre Short excels at distilling leadership skills into actionable steps and choosing the right words to inspire others and giving ourselves the words we need to move forward.</p>
<p> </p>
<p>Guest Bio:</p>
<p>Terre Short is a human potential developer who has more than 30 years of leadership experience, a Masters in Business Administration/Healthcare Management, and her Professional Coach Certification (PCC). She coaches leaders on tactics to raise engagement and improve retention. She also leans on the content in her book, “The Words We Choose: Your Guide to How and Why Words Matter in helping others become their best selves.”</p>
<p> </p>
<p>Sponsor Links:<br>
A big thank you to our friends at<a href='https://www.uptycs.com/'> </a><a href='https://plextrac.com/hackervalley/'>PlexTrac</a> and<a href='https://www.axonius.com/'> Axonius</a> for sponsoring this episode!</p>
<p> </p>
<p>Additional Links:</p>
<p>Book Terre as a <a href='https://www.shortgroup.net/'>Speaker or Coach</a> and purchase <a href='https://www.shortgroup.net/shop'>Terre's book</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wty8e5/Terre_Short_Rev1al00q.mp3" length="77566208" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We believe you are what you listen to -- including the personal podcast that is playing in your head every day. What is it saying to you? Our guest Terre Short excels at distilling leadership skills into actionable steps and choosing the right words to inspire others and giving ourselves the words we need to move forward.
 
Guest Bio:
Terre Short is a human potential developer who has more than 30 years of leadership experience, a Masters in Business Administration/Healthcare Management, and her Professional Coach Certification (PCC). She coaches leaders on tactics to raise engagement and improve retention. She also leans on the content in her book, “The Words We Choose: Your Guide to How and Why Words Matter in helping others become their best selves.”
 
Sponsor Links:A big thank you to our friends at PlexTrac and Axonius for sponsoring this episode!
 
Additional Links:
Book Terre as a Speaker or Coach and purchase Terre's book
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1939</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>202</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Becoming the Maestro with Rob White</title>
        <itunes:title>Becoming the Maestro with Rob White</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/becoming-the-maestro-with-rob-white/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/becoming-the-maestro-with-rob-white/#comments</comments>        <pubDate>Tue, 01 Mar 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fa57a9a5-05ff-3e43-a9ab-76c6e44c9029</guid>
                                    <description><![CDATA[<p>When Rob White was a child, someone called him a loser -- it wasn't until he confronted his negative talk that he rose to greatness. From humble beginnings to his current status as a real estate developer, restaurateur, world traveler, international best-selling author, Rob has distilled his life experiences into sound, practical advice. Listen carefully to this episode because it's time to bring out YOUR inner maestro.</p>
<p> </p>
<p>This episode is sponsored by our friends at <a href='https://www.uptycs.com/'>Uptycs</a> and <a href='https://www.axonius.com/'>Axonius</a></p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with Rob White on <a href='https://twitter.com/RobWhiteMedia'>Twitter</a> and pick up his book, The Maestro Monologue <a href='http://www.robwhitemedia.com'>here</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>When Rob White was a child, someone called him a loser -- it wasn't until he confronted his negative talk that he rose to greatness. From humble beginnings to his current status as a real estate developer, restaurateur, world traveler, international best-selling author, Rob has distilled his life experiences into sound, practical advice. Listen carefully to this episode because it's time to bring out YOUR inner maestro.</p>
<p> </p>
<p>This episode is sponsored by our friends at <a href='https://www.uptycs.com/'>Uptycs</a> and <a href='https://www.axonius.com/'>Axonius</a></p>
<p> </p>
<p>Additional Links:</p>
<p>Stay in touch with Rob White on <a href='https://twitter.com/RobWhiteMedia'>Twitter</a> and pick up his book, The Maestro Monologue <a href='http://www.robwhitemedia.com'>here</a></p>
<p>Connect with Ron Eddings on <a href='https://www.linkedin.com/in/ronaldeddings/'>LinkedIn</a> and <a href='https://twitter.com/ronaldeddings'>Twitter</a></p>
<p>Connect with Chris Cochran on <a href='https://www.linkedin.com/in/chrishvm/'>LinkedIn</a> and <a href='https://twitter.com/chrishvm'>Twitter</a></p>
<p>Purchase a HVS t-shirt at our <a href='https://store.hackervalley.com/'>shop</a></p>
<p>Continue the conversation by joining our <a href='https://hackervalley.com/discord'>Discord</a></p>
<p>Check out  <a href='https://hackervalley.com/'>Hacker Valley Media</a> and <a href='https://hackervalley.com/show/hackervalley/'>Hacker Valley Studio</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/avfvsf/Rob_White8cv3j.mp3" length="73987328" type="audio/mpeg"/>
        <itunes:summary><![CDATA[When Rob White was a child, someone called him a loser -- it wasn't until he confronted his negative talk that he rose to greatness. From humble beginnings to his current status as a real estate developer, restaurateur, world traveler, international best-selling author, Rob has distilled his life experiences into sound, practical advice. Listen carefully to this episode because it's time to bring out YOUR inner maestro.
 
This episode is sponsored by our friends at Uptycs and Axonius
 
Additional Links:
Stay in touch with Rob White on Twitter and pick up his book, The Maestro Monologue here
Connect with Ron Eddings on LinkedIn and Twitter
Connect with Chris Cochran on LinkedIn and Twitter
Purchase a HVS t-shirt at our shop
Continue the conversation by joining our Discord
Check out  Hacker Valley Media and Hacker Valley Studio
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1849</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>201</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 200</title>
        <itunes:title>Episode 200</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-200/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-200/#comments</comments>        <pubDate>Tue, 22 Feb 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9c6b9a4c-c527-301f-b897-c6f674d43fe9</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris take a stroll down podcast memory lane in celebration of Hacker Valley’s 200th episode. The guys reflect on their rise from humble podcast beginnings, their ever-growing fascination with human-centric stories, making a difference, and what lies ahead for Hacker Valley Media.</p>
<p> </p>
<p>Key Takeaways:</p>
<p>01:29  Celebrating episode 200!</p>
<p>02:47  From humble, homegrown beginnings</p>
<p>03:38  Scaling and growing</p>
<p>06:12  Facing our biggest challenges </p>
<p>08:21  Tapping into our inner child</p>
<p>13:20  Human-centric stories</p>
<p>17:14  Making a difference</p>
<p>18:45  Thanking our team</p>
<p>20:37  Thanking our listeners</p>
<p>21:39  A humbling realization </p>
<p>22:40  What’s to come?</p>
<p>25:00  Growing together   </p>
<p>27:05  Our advice to you </p>
<p>29:03  Stay in touch!</p>
<p> </p>
<p>Sending all of our listeners a big THANK YOU for all of the love, support, and feedback we’ve received over the last 3 years! We could not have done it without you. Cheers to the next 3 years!  - Ron and Chris</p>
<p> </p>
<p>Links:</p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris take a stroll down podcast memory lane in celebration of Hacker Valley’s 200th episode. The guys reflect on their rise from humble podcast beginnings, their ever-growing fascination with human-centric stories, making a difference, and what lies ahead for Hacker Valley Media.</p>
<p> </p>
<p>Key Takeaways:</p>
<p>01:29  Celebrating episode 200!</p>
<p>02:47  From humble, homegrown beginnings</p>
<p>03:38  Scaling and growing</p>
<p>06:12  Facing our biggest challenges </p>
<p>08:21  Tapping into our inner child</p>
<p>13:20  Human-centric stories</p>
<p>17:14  Making a difference</p>
<p>18:45  Thanking our team</p>
<p>20:37  Thanking our listeners</p>
<p>21:39  A humbling realization </p>
<p>22:40  What’s to come?</p>
<p>25:00  Growing together   </p>
<p>27:05  Our advice to you </p>
<p>29:03  Stay in touch!</p>
<p> </p>
<p>Sending all of our listeners a big THANK YOU for all of the love, support, and feedback we’ve received over the last 3 years! We could not have done it without you. Cheers to the next 3 years!  - Ron and Chris</p>
<p> </p>
<p>Links:</p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3y5jui/Episode_200.mp3" length="72524288" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris take a stroll down podcast memory lane in celebration of Hacker Valley’s 200th episode. The guys reflect on their rise from humble podcast beginnings, their ever-growing fascination with human-centric stories, making a difference, and what lies ahead for Hacker Valley Media.
 
Key Takeaways:
01:29  Celebrating episode 200!
02:47  From humble, homegrown beginnings
03:38  Scaling and growing
06:12  Facing our biggest challenges 
08:21  Tapping into our inner child
13:20  Human-centric stories
17:14  Making a difference
18:45  Thanking our team
20:37  Thanking our listeners
21:39  A humbling realization 
22:40  What’s to come?
25:00  Growing together   
27:05  Our advice to you 
29:03  Stay in touch!
 
Sending all of our listeners a big THANK YOU for all of the love, support, and feedback we’ve received over the last 3 years! We could not have done it without you. Cheers to the next 3 years!  - Ron and Chris
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by our friends at Uptycs and Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1813</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>200</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 199 - Sharing The Mic with Camille Stewart</title>
        <itunes:title>Episode 199 - Sharing The Mic with Camille Stewart</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-199-sharing-the-mic-with-camille-stewart/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-199-sharing-the-mic-with-camille-stewart/#comments</comments>        <pubDate>Tue, 15 Feb 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/68cd4cbd-7130-3bb5-983e-5f9057b7f505</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris are joined by Camille Stewart, the Global Head of Product Security Strategy at Google and Co-Founder of Share The Mic. The trio have an honest conversation about advocacy and representation in cybersecurity, the story behind Camille’s Share The Mic social movement, how we can begin to move in the right direction, and how culture shapes the way we interact with technology. Lastly, Chris talks about Hacker Valley’s stance on representation – from award nominations to our greatest loss in listenership history.  </p>
<p> </p>
<p>Key Takeaways:</p>
<p>02:47  Bio</p>
<p>05:43  Advocacy - it’s in my DNA</p>
<p>07:16  Giving a voice to the underrepresented</p>
<p>08:54  “Share The Mic” </p>
<p>12:28  The state of diversity in cybersecurity</p>
<p>14:28  Achieving a better tomorrow</p>
<p>18:94  How do we bridge the opportunities gap?</p>
<p>20:13  The intersection of culture and technology</p>
<p>22:45  Who is Camille Stewart?</p>
<p>26:00  The dark side of speaking up</p>
<p>28:53  This is a mission critical issue</p>
<p>30:12  Stay in touch with Camille!</p>
<p>

</p>
<p>Links:</p>
<p>Stay in touch with Camille Stewart on <a href='https://twitter.com/CamilleEsq'>Twitter</a> |<a href='https://www.linkedin.com/in/camillestewartesq/'> LinkedIn</a> |<a href='https://www.instagram.com/camilleesq/'>Instagram</a></p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris are joined by Camille Stewart, the Global Head of Product Security Strategy at Google and Co-Founder of Share The Mic. The trio have an honest conversation about advocacy and representation in cybersecurity, the story behind Camille’s Share The Mic social movement, how we can begin to move in the right direction, and how culture shapes the way we interact with technology. Lastly, Chris talks about Hacker Valley’s stance on representation – from award nominations to our greatest loss in listenership history.  </p>
<p> </p>
<p>Key Takeaways:</p>
<p>02:47  Bio</p>
<p>05:43  Advocacy - it’s in my DNA</p>
<p>07:16  Giving a voice to the underrepresented</p>
<p>08:54  “Share The Mic” </p>
<p>12:28  The state of diversity in cybersecurity</p>
<p>14:28  Achieving a better tomorrow</p>
<p>18:94  How do we bridge the opportunities gap?</p>
<p>20:13  The intersection of culture and technology</p>
<p>22:45  Who is Camille Stewart?</p>
<p>26:00  The dark side of speaking up</p>
<p>28:53  This is a mission critical issue</p>
<p>30:12  Stay in touch with Camille!</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Stay in touch with Camille Stewart on <a href='https://twitter.com/CamilleEsq'>Twitter</a> |<a href='https://www.linkedin.com/in/camillestewartesq/'> LinkedIn</a> |<a href='https://www.instagram.com/camilleesq/'>Instagram</a></p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/udry73/Camille_Stewart_1.mp3" length="74411648" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris are joined by Camille Stewart, the Global Head of Product Security Strategy at Google and Co-Founder of Share The Mic. The trio have an honest conversation about advocacy and representation in cybersecurity, the story behind Camille’s Share The Mic social movement, how we can begin to move in the right direction, and how culture shapes the way we interact with technology. Lastly, Chris talks about Hacker Valley’s stance on representation – from award nominations to our greatest loss in listenership history.  
 
Key Takeaways:
02:47  Bio
05:43  Advocacy - it’s in my DNA
07:16  Giving a voice to the underrepresented
08:54  “Share The Mic” 
12:28  The state of diversity in cybersecurity
14:28  Achieving a better tomorrow
18:94  How do we bridge the opportunities gap?
20:13  The intersection of culture and technology
22:45  Who is Camille Stewart?
26:00  The dark side of speaking up
28:53  This is a mission critical issue
30:12  Stay in touch with Camille!

Links:
Stay in touch with Camille Stewart on Twitter | LinkedIn |Instagram
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by our friends at Uptycs and Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1860</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>199</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 198 - Scaling Your Efforts with Veronica Kirin</title>
        <itunes:title>Episode 198 - Scaling Your Efforts with Veronica Kirin</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-198-scaling-your-efforts-with-veronica-kirin/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-198-scaling-your-efforts-with-veronica-kirin/#comments</comments>        <pubDate>Tue, 08 Feb 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c22fe943-a9b0-32f7-9e8c-408cc3b2db66</guid>
                                    <description><![CDATA[<p>Ron and Chris sit down with anthropologist, author, entrepreneur and coach, Veronica Kirin, to learn how she distilled her seventy hour work week down to ten. Veronica shares her knowledge on helping small businesses scale, why and which automation tools are a scaling must-have, hiring best practices, and the power of goal mapping. Lastly, Veronica shares her seventy year business plan method which helps folks actualize their long-term vision.  </p>
<p> </p>
<p>Key takeaways:</p>
<p>02:53  Bio</p>
<p>04:39  Anthropology and business - bridging the gap </p>
<p>07:37  What is scaling and how do we do it right?</p>
<p>11:20  Tools to help you scale - Ron’s take</p>
<p>13:55  Veronica’s 3 Pillars of Business Scaling</p>
<p>16:33  Hiring woes</p>
<p>17:18  Hiring best practices - trip wires </p>
<p>20:38  How are current events changing business?</p>
<p>23:21  Actualizing your legacy </p>
<p>26:52  Creating goal maps</p>
<p>30:12  Get connected   </p>
<p>31:30  Reach out for help</p>
<p>33:16  Stay in touch with Veronica!</p>
<p> </p>
<p>Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/19137603/admin/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a> | <a href='http://hackervalley.com/'>Website</a></p>
<p>Veronica Kirin: <a href='https://www.facebook.com/VeronicaKirin/'>Facebook</a> | <a href='http://linkedin.com/in/vmkirin'>LinkedIn</a> | <a href='http://twitter.com/vmkirin'>Twitter </a>| <a href='http://instagram.com/vmkirin'>Instagram</a> </p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Thank you to our friends at  <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ron and Chris sit down with anthropologist, author, entrepreneur and coach, Veronica Kirin, to learn how she distilled her seventy hour work week down to ten. Veronica shares her knowledge on helping small businesses scale, why and which automation tools are a scaling must-have, hiring best practices, and the power of goal mapping. Lastly, Veronica shares her seventy year business plan method which helps folks actualize their long-term vision.  </p>
<p> </p>
<p>Key takeaways:</p>
<p>02:53  Bio</p>
<p>04:39  Anthropology and business - bridging the gap </p>
<p>07:37  What is scaling and how do we do it right?</p>
<p>11:20  Tools to help you scale - Ron’s take</p>
<p>13:55  Veronica’s 3 Pillars of Business Scaling</p>
<p>16:33  Hiring woes</p>
<p>17:18  Hiring best practices - trip wires </p>
<p>20:38  How are current events changing business?</p>
<p>23:21  Actualizing your legacy </p>
<p>26:52  Creating goal maps</p>
<p>30:12  Get connected   </p>
<p>31:30  Reach out for help</p>
<p>33:16  Stay in touch with Veronica!</p>
<p> </p>
<p>Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/19137603/admin/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a> | <a href='http://hackervalley.com/'>Website</a></p>
<p>Veronica Kirin: <a href='https://www.facebook.com/VeronicaKirin/'>Facebook</a> | <a href='http://linkedin.com/in/vmkirin'>LinkedIn</a> | <a href='http://twitter.com/vmkirin'>Twitter </a>| <a href='http://instagram.com/vmkirin'>Instagram</a> </p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Thank you to our friends at  <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dt7fsf/Veronica_Kirin_1_brvlr.mp3" length="83480768" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ron and Chris sit down with anthropologist, author, entrepreneur and coach, Veronica Kirin, to learn how she distilled her seventy hour work week down to ten. Veronica shares her knowledge on helping small businesses scale, why and which automation tools are a scaling must-have, hiring best practices, and the power of goal mapping. Lastly, Veronica shares her seventy year business plan method which helps folks actualize their long-term vision.  
 
Key takeaways:
02:53  Bio
04:39  Anthropology and business - bridging the gap 
07:37  What is scaling and how do we do it right?
11:20  Tools to help you scale - Ron’s take
13:55  Veronica’s 3 Pillars of Business Scaling
16:33  Hiring woes
17:18  Hiring best practices - trip wires 
20:38  How are current events changing business?
23:21  Actualizing your legacy 
26:52  Creating goal maps
30:12  Get connected   
31:30  Reach out for help
33:16  Stay in touch with Veronica!
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Website
Veronica Kirin: Facebook | LinkedIn | Twitter | Instagram 
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Thank you to our friends at  Axonius and Uptycs for sponsoring this episode.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2087</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>198</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 197 - Leading Your Tribe with Simone Knego</title>
        <itunes:title>Episode 197 - Leading Your Tribe with Simone Knego</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-197-leading-your-tribe-with-simone-knego/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-197-leading-your-tribe-with-simone-knego/#comments</comments>        <pubDate>Tue, 01 Feb 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2eac909f-318c-3ad5-bec8-725bc9fa2165</guid>
                                    <description><![CDATA[<p>In this week’s episode, Ron and Chris are joined by speaker, entrepreneur, mother of six and the best-selling author of The Extraordinary UnOrdinary You, Simone Knego. The trio explore the highs and lows of parenting, while attempting to manage it all – and then some! Simone shares how believing in herself was the secret sauce behind writing a book and climbing Mount Kilimanjaro, why patience truly is a virtue, and how a positive mindset can help get you through even the toughest of days. Lastly, soon-to-be-married Ron Eddings, gets advice on marriage and building a family. </p>
<p>
Key takeaways:</p>
<p>02:33  Bio</p>
<p>04:01  Staying humble</p>
<p>05:11  Positive role modeling </p>
<p>07:43  Raising a multi cultural family</p>
<p>09:10  Trying to manage it all</p>
<p>10:57  The book - sharing her story</p>
<p>13:35  Believing in yourself</p>
<p>15:29  Patience is a virtue</p>
<p>18:47  Mindset and daily affirmations</p>
<p>22:21  Social media and “mom guilt”</p>
<p>24:21  Advice for the soon-to-be married, Ron</p>
<p>26:50  Self-care and honoring your family</p>
<p>28:46  Stay in touch with Simone!</p>
<p> </p>
<p>Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/19137603/admin/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a> | <a href='http://hackervalley.com/'>Website</a></p>
<p>Simone Knego: <a href='https://www.linkedin.com/in/simone-knego-7965701a3/'>LinkedIn</a> | <a href='https://simoneknego.com'>Website</a> | <a href='https://www.facebook.com/UnOrdinaryYou'>Facebook</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Thank you to our friends at  <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this week’s episode, Ron and Chris are joined by speaker, entrepreneur, mother of six and the best-selling author of The Extraordinary UnOrdinary You, Simone Knego. The trio explore the highs and lows of parenting, while attempting to manage it all – and then some! Simone shares how believing in herself was the secret sauce behind writing a book and climbing Mount Kilimanjaro, why patience truly is a virtue, and how a positive mindset can help get you through even the toughest of days. Lastly, soon-to-be-married Ron Eddings, gets advice on marriage and building a family. </p>
<p><br>
Key takeaways:</p>
<p>02:33  Bio</p>
<p>04:01  Staying humble</p>
<p>05:11  Positive role modeling </p>
<p>07:43  Raising a multi cultural family</p>
<p>09:10  Trying to manage it all</p>
<p>10:57  The book - sharing her story</p>
<p>13:35  Believing in yourself</p>
<p>15:29  Patience is a virtue</p>
<p>18:47  Mindset and daily affirmations</p>
<p>22:21  Social media and “mom guilt”</p>
<p>24:21  Advice for the soon-to-be married, Ron</p>
<p>26:50  Self-care and honoring your family</p>
<p>28:46  Stay in touch with Simone!</p>
<p> </p>
<p>Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/19137603/admin/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleymedia/'>Instagram</a> | <a href='http://hackervalley.com/'>Website</a></p>
<p>Simone Knego: <a href='https://www.linkedin.com/in/simone-knego-7965701a3/'>LinkedIn</a> | <a href='https://simoneknego.com'>Website</a> | <a href='https://www.facebook.com/UnOrdinaryYou'>Facebook</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Thank you to our friends at  <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a> for sponsoring this episode.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/74ibei/Simone_Knego.mp3" length="71646848" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this week’s episode, Ron and Chris are joined by speaker, entrepreneur, mother of six and the best-selling author of The Extraordinary UnOrdinary You, Simone Knego. The trio explore the highs and lows of parenting, while attempting to manage it all – and then some! Simone shares how believing in herself was the secret sauce behind writing a book and climbing Mount Kilimanjaro, why patience truly is a virtue, and how a positive mindset can help get you through even the toughest of days. Lastly, soon-to-be-married Ron Eddings, gets advice on marriage and building a family. 
Key takeaways:
02:33  Bio
04:01  Staying humble
05:11  Positive role modeling 
07:43  Raising a multi cultural family
09:10  Trying to manage it all
10:57  The book - sharing her story
13:35  Believing in yourself
15:29  Patience is a virtue
18:47  Mindset and daily affirmations
22:21  Social media and “mom guilt”
24:21  Advice for the soon-to-be married, Ron
26:50  Self-care and honoring your family
28:46  Stay in touch with Simone!
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Website
Simone Knego: LinkedIn | Website | Facebook
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Thank you to our friends at  Axonius and Uptycs for sponsoring this episode.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1791</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>197</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 196 - Cybersecurity Advocates with Julie Haney</title>
        <itunes:title>Episode 196 - Cybersecurity Advocates with Julie Haney</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-196-cybersecurity-advocates-with-julie-haney/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-196-cybersecurity-advocates-with-julie-haney/#comments</comments>        <pubDate>Tue, 25 Jan 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ee5beb53-09b8-3f8b-b5d5-0e78be0dc3d5</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris are joined by Julie Haney – a computer scientist and Usable Security Researcher at NIST, to talk about the human within the technologist. The trio sit down and have a powerful discussion on ways in which cybersecurity practitioners can bring their best work to the table, the importance of empathy within the workplace, and how to empower ourselves and the security community at large. </p>
<p> </p>
<p>Key Takeaways:</p>
<p>02:55  Bio</p>
<p>06:46  Why research?</p>
<p>08:55  Bringing your best work to the table</p>
<p>11:28  Surprising research</p>
<p>12:46  What’s your superpower?</p>
<p>16:10  Empathy in practice</p>
<p>19:27  B.E.S.T.O.W.</p>
<p>22:22  Normalizing CS Advocacy</p>
<p>25:07  What’s missing in cybersecurity?</p>
<p>27:12  Being more intentional</p>
<p> </p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Julie Haney:<a href='https://www.linkedin.com/in/julie-haney-037449119/'> LinkedIn</a> |<a href='https://www.nist.gov/blogs/cybersecurity-insights'> Website</a> |<a href='https://twitter.com/jmhaney8'> Twitter</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'> Axonius</a> and<a href='https://www.uptycs.com/'> Uptycs</a> for sponsoring this episode.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris are joined by Julie Haney – a computer scientist and Usable Security Researcher at NIST, to talk about the human within the technologist. The trio sit down and have a powerful discussion on ways in which cybersecurity practitioners can bring their best work to the table, the importance of empathy within the workplace, and how to empower ourselves and the security community at large. </p>
<p> </p>
<p>Key Takeaways:</p>
<p>02:55  Bio</p>
<p>06:46  Why research?</p>
<p>08:55  Bringing your best work to the table</p>
<p>11:28  Surprising research</p>
<p>12:46  What’s your superpower?</p>
<p>16:10  Empathy in practice</p>
<p>19:27  B.E.S.T.O.W.</p>
<p>22:22  Normalizing CS Advocacy</p>
<p>25:07  What’s missing in cybersecurity?</p>
<p>27:12  Being more intentional</p>
<p> </p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Julie Haney:<a href='https://www.linkedin.com/in/julie-haney-037449119/'> LinkedIn</a> |<a href='https://www.nist.gov/blogs/cybersecurity-insights'> Website</a> |<a href='https://twitter.com/jmhaney8'> Twitter</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Thank you to our friends at <a href='https://www.axonius.com/'> Axonius</a> and<a href='https://www.uptycs.com/'> Uptycs</a> for sponsoring this episode.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hamx2n/Julie_Haneya6e1y.mp3" length="71754368" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris are joined by Julie Haney – a computer scientist and Usable Security Researcher at NIST, to talk about the human within the technologist. The trio sit down and have a powerful discussion on ways in which cybersecurity practitioners can bring their best work to the table, the importance of empathy within the workplace, and how to empower ourselves and the security community at large. 
 
Key Takeaways:
02:55  Bio
06:46  Why research?
08:55  Bringing your best work to the table
11:28  Surprising research
12:46  What’s your superpower?
16:10  Empathy in practice
19:27  B.E.S.T.O.W.
22:22  Normalizing CS Advocacy
25:07  What’s missing in cybersecurity?
27:12  Being more intentional
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Julie Haney: LinkedIn | Website | Twitter
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Thank you to our friends at  Axonius and Uptycs for sponsoring this episode.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1793</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>196</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 195 - Shades Of Yes with David Chislett</title>
        <itunes:title>Episode 195 - Shades Of Yes with David Chislett</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-195-shades-of-yes-with-david-chislett/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-195-shades-of-yes-with-david-chislett/#comments</comments>        <pubDate>Tue, 18 Jan 2022 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ee2f19bb-76f2-3797-9955-44fca68aa254</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris are joined by author, poet, musician, artist and entrepreneur, David Chislett. David dives deep into the beauty and power of creativity and the creative process. The trio explore reasons we become less creative over time, how technologists can begin tapping into their creativity and why we should start replacing “but” with “and.” </p>
<p> </p>
<p>Key Takeaways:</p>
<p>02:37  Bio</p>
<p>03:42  Origin as a creative</p>
<p>05:40  Losing creativity over time </p>
<p>10:23  A daily commitment to creativity</p>
<p>12:05  Structure in creativity </p>
<p>15:10  The hero’s journey</p>
<p>23:34  Innovation vs. Creativity</p>
<p>25:38  Defining creativity</p>
<p>28:59  Get in touch</p>
<p> </p>
<p>Links:</p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>David Chislett:<a href='https://davidchislett.com/'> Website</a> |<a href='https://www.linkedin.com/in/davidchislettcreativity/'> LinkedIn</a> |<a href='https://www.youtube.com/DavidChislett'> YouTube</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris are joined by author, poet, musician, artist and entrepreneur, David Chislett. David dives deep into the beauty and power of creativity and the creative process. The trio explore reasons we become less creative over time, how technologists can begin tapping into their creativity and why we should start replacing “but” with “and.” </p>
<p> </p>
<p>Key Takeaways:</p>
<p>02:37  Bio</p>
<p>03:42  Origin as a creative</p>
<p>05:40  Losing creativity over time </p>
<p>10:23  A daily commitment to creativity</p>
<p>12:05  Structure in creativity </p>
<p>15:10  The hero’s journey</p>
<p>23:34  Innovation vs. Creativity</p>
<p>25:38  Defining creativity</p>
<p>28:59  Get in touch</p>
<p> </p>
<p>Links:</p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>David Chislett:<a href='https://davidchislett.com/'> Website</a> |<a href='https://www.linkedin.com/in/davidchislettcreativity/'> LinkedIn</a> |<a href='https://www.youtube.com/DavidChislett'> YouTube</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2kcwvb/David_Chislett82wfh.mp3" length="74282048" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris are joined by author, poet, musician, artist and entrepreneur, David Chislett. David dives deep into the beauty and power of creativity and the creative process. The trio explore reasons we become less creative over time, how technologists can begin tapping into their creativity and why we should start replacing “but” with “and.” 
 
Key Takeaways:
02:37  Bio
03:42  Origin as a creative
05:40  Losing creativity over time 
10:23  A daily commitment to creativity
12:05  Structure in creativity 
15:10  The hero’s journey
23:34  Innovation vs. Creativity
25:38  Defining creativity
28:59  Get in touch
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
David Chislett: Website | LinkedIn | YouTube
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by our friends at Uptycs and Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1857</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>195</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 194 - Priming the Mind for Happiness with Zahra Karsan</title>
        <itunes:title>Episode 194 - Priming the Mind for Happiness with Zahra Karsan</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-194-priming-the-mind-for-happiness-with-zhara-karsan/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-194-priming-the-mind-for-happiness-with-zhara-karsan/#comments</comments>        <pubDate>Tue, 11 Jan 2022 14:09:53 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3cb182c6-8e3d-3616-ae91-8841df9dd8aa</guid>
                                    <description><![CDATA[<p>In this episode of Hacker Valley Studio, Ron and Chris are joined by the author of 6 Weeks to Happy, success coach extraordinaire and CEO of GetZend, Zahra Karsan. The trio examine happiness and why it is so difficult to define and what role does personal freedom play in the matter. Zahra speaks on retraining your brain for success, learning the tools to thrive and recognizing your fears in order to make change. Furthermore, the group discusses energy and ego depletion and how it affects will power and overall performance. </p>
<p> </p>
<p>Key Takeaways:</p>
<p>03:03  Bio</p>
<p>04:19  What is happiness?</p>
<p>10:52  Seeking freedom</p>
<p>14:10  Will accomplishing goals make us happy?</p>
<p>17:29  Regaining control over our lives</p>
<p>22:20  Understanding how to change mindsets</p>
<p>28:42  Will power and ego depletion</p>
<p>33:42  Advice for an action plan</p>
<p>36:18  Get in touch!</p>
<p> </p>
<p>Links:</p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Zahra Karsan:<a href='https://www.linkedin.com/in/zahrakarsan/'> LinkedIn</a> |<a href='https://getzend.com/'> GetZend</a> |<a href='https://twitter.com/getzend'> Twitter</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Hacker Valley Studio, Ron and Chris are joined by the author of 6 Weeks to Happy, success coach extraordinaire and CEO of GetZend, Zahra Karsan. The trio examine happiness and why it is so difficult to define and what role does personal freedom play in the matter. Zahra speaks on retraining your brain for success, learning the tools to thrive and recognizing your fears in order to make change. Furthermore, the group discusses energy and ego depletion and how it affects will power and overall performance. </p>
<p> </p>
<p>Key Takeaways:</p>
<p>03:03  Bio</p>
<p>04:19  What is happiness?</p>
<p>10:52  Seeking freedom</p>
<p>14:10  Will accomplishing goals make us happy?</p>
<p>17:29  Regaining control over our lives</p>
<p>22:20  Understanding how to change mindsets</p>
<p>28:42  Will power and ego depletion</p>
<p>33:42  Advice for an action plan</p>
<p>36:18  Get in touch!</p>
<p> </p>
<p>Links:</p>
<p>Hacker Valley Studio:<a href='http://store.hackervalley.com/'> Swag</a> |<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a> |<a href='https://twitter.com/thehackervalley'> Twitter</a> |<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a> | Email<a href='http://hackervalley.com/'> Ron & Chris</a> |<a href='https://hackervalley.com/'> Website</a></p>
<p>Zahra Karsan:<a href='https://www.linkedin.com/in/zahrakarsan/'> LinkedIn</a> |<a href='https://getzend.com/'> GetZend</a> |<a href='https://twitter.com/getzend'> Twitter</a></p>
<p>Support Hacker Valley Studio on<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>This episode is sponsored by our friends at<a href='https://www.uptycs.com/'> Uptycs</a> and<a href='https://www.axonius.com/'> Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6imw3p/Zahra_Karsan7mwhm.mp3" length="90779648" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley Studio, Ron and Chris are joined by the author of 6 Weeks to Happy, success coach extraordinaire and CEO of GetZend, Zahra Karsan. The trio examine happiness and why it is so difficult to define and what role does personal freedom play in the matter. Zahra speaks on retraining your brain for success, learning the tools to thrive and recognizing your fears in order to make change. Furthermore, the group discusses energy and ego depletion and how it affects will power and overall performance. 
 
Key Takeaways:
03:03  Bio
04:19  What is happiness?
10:52  Seeking freedom
14:10  Will accomplishing goals make us happy?
17:29  Regaining control over our lives
22:20  Understanding how to change mindsets
28:42  Will power and ego depletion
33:42  Advice for an action plan
36:18  Get in touch!
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Zahra Karsan: LinkedIn | GetZend | Twitter
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by our friends at Uptycs and Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2269</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>194</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 193 - Love is the Name of the Game with Tyrone E. Wilson</title>
        <itunes:title>Episode 193 - Love is the Name of the Game with Tyrone E. Wilson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-193-love-is-the-name-of-the-game-with-tyrone-e-wilson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-193-love-is-the-name-of-the-game-with-tyrone-e-wilson/#comments</comments>        <pubDate>Tue, 21 Dec 2021 19:23:05 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b0e5282e-8e16-3dbc-8659-f5cb1f1b92c0</guid>
                                    <description><![CDATA[<p class="p1">Happy Holidays from Hacker Valley Media!</p>
<p class="p1">Tyrone E. Wilson is a passionate information security professional with 24 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6. Wilson is also the organizer of The D.C. Cyber Security Professionals. Join Chris, Ron and Tyrone as they help uncover the truth about being your true self. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">02:38 Bio</p>
<p class="p1">07:34 The “E” story</p>
<p class="p1">09:16 Reality TV star?!</p>
<p class="p1">15:30 Opportunities from being more open in public</p>
<p class="p1">18:25 Doing more to be better | taking control of the moment</p>
<p class="p1">22:00 Getting around personal resistance</p>
<p class="p1">25:21 Lessons learned building communities & being yourself</p>
<p class="p1">27:00 “I understand.”</p>
<p class="p1">29:42 Get in touch</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">Tyrone E. Wilson: <a href='https://www.instagram.com/tywilson21/?hl=en'>Instagram</a> | <a href='https://twitter.com/tywilson21'>Twitter</a> | <a href='https://www.linkedin.com/in/tyroneewilson/'>LinkedIn</a> | <a href='https://www.cover6solutions.com/about/'>Website</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by our friends at <a href='https://www.crowdstrike.com/'>Crowdstrike</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Happy Holidays from Hacker Valley Media!</p>
<p class="p1">Tyrone E. Wilson is a passionate information security professional with 24 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6. Wilson is also the organizer of The D.C. Cyber Security Professionals. Join Chris, Ron and Tyrone as they help uncover the truth about being your true self. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">02:38 Bio</p>
<p class="p1">07:34 The “E” story</p>
<p class="p1">09:16 Reality TV star?!</p>
<p class="p1">15:30 Opportunities from being more open in public</p>
<p class="p1">18:25 Doing more to be better | taking control of the moment</p>
<p class="p1">22:00 Getting around personal resistance</p>
<p class="p1">25:21 Lessons learned building communities & being yourself</p>
<p class="p1">27:00 “I understand.”</p>
<p class="p1">29:42 Get in touch</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">Tyrone E. Wilson: <a href='https://www.instagram.com/tywilson21/?hl=en'>Instagram</a> | <a href='https://twitter.com/tywilson21'>Twitter</a> | <a href='https://www.linkedin.com/in/tyroneewilson/'>LinkedIn</a> | <a href='https://www.cover6solutions.com/about/'>Website</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by our friends at <a href='https://www.crowdstrike.com/'>Crowdstrike</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3psiag/Tyrone_E_Wilsonb2na1.mp3" length="75248516" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Happy Holidays from Hacker Valley Media!
Tyrone E. Wilson is a passionate information security professional with 24 years of experience in information technology and has a mission to improve as many lives as possible through education in cybersecurity. Currently, Wilson is the Founder and CEO of Cover6 Solutions, LLC; which teaches companies and professionals various aspects of information security, penetration testing, and IPv6. Wilson is also the organizer of The D.C. Cyber Security Professionals. Join Chris, Ron and Tyrone as they help uncover the truth about being your true self. 
 
Key Takeaways:
02:38 Bio
07:34 The “E” story
09:16 Reality TV star?!
15:30 Opportunities from being more open in public
18:25 Doing more to be better | taking control of the moment
22:00 Getting around personal resistance
25:21 Lessons learned building communities & being yourself
27:00 “I understand.”
29:42 Get in touch
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Tyrone E. Wilson: Instagram | Twitter | LinkedIn | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by our friends at Crowdstrike]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1881</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>193</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 192 - Wisdom and Celebrity with Clint Arthur</title>
        <itunes:title>Episode 192 - Wisdom and Celebrity with Clint Arthur</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-192-wisdom-and-celebrity-with-clint-arthur/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-192-wisdom-and-celebrity-with-clint-arthur/#comments</comments>        <pubDate>Tue, 14 Dec 2021 09:58:14 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f85247d1-8e86-3953-bceb-3d4ebda92614</guid>
                                    <description><![CDATA[<p class="p1">Today Chris and Ron are joined by Clint Arthur. Clint is an actor, public speaker and mentor to many. He has had the pleasure of meeting some of the most influential people in the world, and has decided to use this to help people all over the world discover their meaning and drive them to self-fulfillment and success. Tune in for experiences, stories and advice from one of the most well-traveled, well-written people they’ve ever met!</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">02:59 Bio and beginnings</p>
<p class="p1">06:07 No more Hollywood</p>
<p class="p1">09:37 20 books?!</p>
<p class="p1">12:57 Finding value, giving value and feeling valued</p>
<p class="p1">17:32 John Travolta said fly high. What does that really mean?</p>
<p class="p1">20:40 Matchstick secrets</p>
<p class="p1">22:54 Impactful moments</p>
<p class="p1">33:47 Get in touch</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Clint Arthur: <a href='https://www.clintarthur.tv/'>Website</a> | <a href='https://www.clintarthur.tv/books-products'>Book</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is presented to you by our good friends at <a href='https://www.crowdstrike.com/?utm_campaign=brand&utm_content=&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=CjwKCAiAqIKNBhAIEiwAu_ZLDisy29dsii7281RSbZVPqWqZPErjYAui89xXxIANVURcaWFbi-K03RoCgMgQAvD_BwE'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Today Chris and Ron are joined by Clint Arthur. Clint is an actor, public speaker and mentor to many. He has had the pleasure of meeting some of the most influential people in the world, and has decided to use this to help people all over the world discover their meaning and drive them to self-fulfillment and success. Tune in for experiences, stories and advice from one of the most well-traveled, well-written people they’ve ever met!</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">02:59 Bio and beginnings</p>
<p class="p1">06:07 No more Hollywood</p>
<p class="p1">09:37 20 books?!</p>
<p class="p1">12:57 Finding value, giving value and feeling valued</p>
<p class="p1">17:32 John Travolta said fly high. What does that really mean?</p>
<p class="p1">20:40 Matchstick secrets</p>
<p class="p1">22:54 Impactful moments</p>
<p class="p1">33:47 Get in touch</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Clint Arthur: <a href='https://www.clintarthur.tv/'>Website</a> | <a href='https://www.clintarthur.tv/books-products'>Book</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is presented to you by our good friends at <a href='https://www.crowdstrike.com/?utm_campaign=brand&utm_content=&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=CjwKCAiAqIKNBhAIEiwAu_ZLDisy29dsii7281RSbZVPqWqZPErjYAui89xXxIANVURcaWFbi-K03RoCgMgQAvD_BwE'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mqn5q4/Clint_Arthur75nb0.mp3" length="82658828" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Today Chris and Ron are joined by Clint Arthur. Clint is an actor, public speaker and mentor to many. He has had the pleasure of meeting some of the most influential people in the world, and has decided to use this to help people all over the world discover their meaning and drive them to self-fulfillment and success. Tune in for experiences, stories and advice from one of the most well-traveled, well-written people they’ve ever met!
 
Key Takeaways:
 
02:59 Bio and beginnings
06:07 No more Hollywood
09:37 20 books?!
12:57 Finding value, giving value and feeling valued
17:32 John Travolta said fly high. What does that really mean?
20:40 Matchstick secrets
22:54 Impactful moments
33:47 Get in touch
 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Clint Arthur: Website | Book
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is presented to you by our good friends at CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2066</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>192</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 191 - Listen as I Fall Out of This Window with Tyler Foley</title>
        <itunes:title>Episode 191 - Listen as I Fall Out of This Window with Tyler Foley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-191-listen-as-i-fall-out-of-this-window-with-tyler-foley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-191-listen-as-i-fall-out-of-this-window-with-tyler-foley/#comments</comments>        <pubDate>Tue, 07 Dec 2021 05:04:01 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2be28c31-1278-3723-82d4-6539576422b0</guid>
                                    <description><![CDATA[<p class="p1">Sean Tyler Foley is an accomplished film and stage performer and has been acting in film and television since he was 6 years old. He has appeared in productions including Freddy Vs Jason, Door to Door, Carrie, and the musical Ragtime. Tyler is passionate about helping others confidently take the stage and impact an audience with their stories. He is currently the Managing Director of Total Buy-In and author of the #1 best-selling book The Power to Speak Naked. Join Chris, Ron and Tyler for a schooling in presenting yourself and engaging with others.</p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">03:06 Bio</p>
<p class="p1">04:55 The journey to now; acting to public speaking</p>
<p class="p1">11:07 Making safety training engaging</p>
<p class="p1">14:38 Re-kindling the story for the listener</p>
<p class="p1">18:22 Engaging remotely</p>
<p class="p1">22:27 The driest safety subject – fall protection</p>
<p class="p1">24:49 Nobody likes getting should on</p>
<p class="p1">25:40 Tyler’s book – The Power to Speak Naked</p>
<p class="p1">28:24 Getting your story out</p>
<p class="p1">32:06 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Tyler Foley: <a href='https://www.totalbuyin.com/'>Total Buy In</a> | <a href='https://www.amazon.com/Power-Speak-Naked-Communicate-Effectively/dp/1631954458'>Book</a> | <a href='https://www.seantylerfoley.com/'>Website</a> | <a href='https://www.linkedin.com/in/seantylerfoley/detail/recent-activity/posts/'>LinkedIn</a> | <a href='https://www.imdb.com/name/nm1021473/'>IMDb</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is presented to you by our good friends at <a href='https://www.crowdstrike.com/?utm_campaign=brand&utm_content=&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=CjwKCAiAqIKNBhAIEiwAu_ZLDisy29dsii7281RSbZVPqWqZPErjYAui89xXxIANVURcaWFbi-K03RoCgMgQAvD_BwE'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Sean Tyler Foley is an accomplished film and stage performer and has been acting in film and television since he was 6 years old. He has appeared in productions including Freddy Vs Jason, Door to Door, Carrie, and the musical Ragtime. Tyler is passionate about helping others confidently take the stage and impact an audience with their stories. He is currently the Managing Director of Total Buy-In and author of the #1 best-selling book The Power to Speak Naked. Join Chris, Ron and Tyler for a schooling in presenting yourself and engaging with others.</p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">03:06 Bio</p>
<p class="p1">04:55 The journey to now; acting to public speaking</p>
<p class="p1">11:07 Making safety training engaging</p>
<p class="p1">14:38 Re-kindling the story for the listener</p>
<p class="p1">18:22 Engaging remotely</p>
<p class="p1">22:27 The driest safety subject – fall protection</p>
<p class="p1">24:49 Nobody likes getting should on</p>
<p class="p1">25:40 Tyler’s book – The Power to Speak Naked</p>
<p class="p1">28:24 Getting your story out</p>
<p class="p1">32:06 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Tyler Foley: <a href='https://www.totalbuyin.com/'>Total Buy In</a> | <a href='https://www.amazon.com/Power-Speak-Naked-Communicate-Effectively/dp/1631954458'>Book</a> | <a href='https://www.seantylerfoley.com/'>Website</a> | <a href='https://www.linkedin.com/in/seantylerfoley/detail/recent-activity/posts/'>LinkedIn</a> | <a href='https://www.imdb.com/name/nm1021473/'>IMDb</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is presented to you by our good friends at <a href='https://www.crowdstrike.com/?utm_campaign=brand&utm_content=&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=CjwKCAiAqIKNBhAIEiwAu_ZLDisy29dsii7281RSbZVPqWqZPErjYAui89xXxIANVURcaWFbi-K03RoCgMgQAvD_BwE'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wwthy6/Tyler_Foley8ngom.mp3" length="83124452" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Sean Tyler Foley is an accomplished film and stage performer and has been acting in film and television since he was 6 years old. He has appeared in productions including Freddy Vs Jason, Door to Door, Carrie, and the musical Ragtime. Tyler is passionate about helping others confidently take the stage and impact an audience with their stories. He is currently the Managing Director of Total Buy-In and author of the #1 best-selling book The Power to Speak Naked. Join Chris, Ron and Tyler for a schooling in presenting yourself and engaging with others.
Key Takeaways:
 
03:06 Bio
04:55 The journey to now; acting to public speaking
11:07 Making safety training engaging
14:38 Re-kindling the story for the listener
18:22 Engaging remotely
22:27 The driest safety subject – fall protection
24:49 Nobody likes getting should on
25:40 Tyler’s book – The Power to Speak Naked
28:24 Getting your story out
32:06 Get in touch
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Tyler Foley: Total Buy In | Book | Website | LinkedIn | IMDb
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is presented to you by our good friends at CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2078</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>191</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 190 - Maintaining a Fuel for Life with Nate Palmer</title>
        <itunes:title>Episode 190 - Maintaining a Fuel for Life with Nate Palmer</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-190-maintaining-a-fuel-for-life-with-nate-palmer/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-190-maintaining-a-fuel-for-life-with-nate-palmer/#comments</comments>        <pubDate>Tue, 30 Nov 2021 09:13:40 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6f671b3c-2504-3860-992f-262fdfb913a8</guid>
                                    <description><![CDATA[<p class="qowt-stl-Normal x-scope qowt-word-para-0">Nate Palmer is a fitness and nutrition expert, coach, speaker, and writer who believes that being in incredible shape gives a massive advantage in business, focus, and relationships. He also happens to be a dad, husband, and the #1 bestselling author of The Million Dollar Body Method and Passport Fitness. Nate helps business owners and entrepreneurs improve their physique, finances, and family time using fitness and nutrition as force multipliers. Join Chris, Ron and Nate to change the way you approach your mind, body and soul in this episode of Hacker Valley Studio.</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0"> </p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">Key Takeaways:</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">03:12 Bio</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">06:34 Controlling your diet and exercise</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">08:30 Maintaining energy / Chris’ journey in weight management</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">10:25 Maintaining a fuel for life</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">13:47 Tactics for exercise and nutrition</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">16:58 Nutrition and fitness for the mind</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">22:10 Nutrition and fitness for the soul</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">26:14 Architecting your day</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">30:00 Win the morning</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">31:15 Get in touch with Nate</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0"> </p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">Links:</p>
<p class="x-scope qowt-word-para-1">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="qowt-stl-Normal x-scope qowt-word-para-1">Nate Palmer <a href='https://www.amazon.com/Million-Dollar-Body-Method-Entrepreneurs/dp/1736370200'>Book</a> | <a href='https://www.linkedin.com/in/n8training/'>LinkedIn</a> | <a href='https://twitter.com/n8training?lang=en'>Twitter</a> | <a href='https://n8trainingsystems.com/'>Website</a></p>
<p class="x-scope qowt-word-para-1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="x-scope qowt-word-para-1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="qowt-stl-Normal x-scope qowt-word-para-2">This episode is presented to you by our good friends at <a href='https://www.crowdstrike.com/?utm_campaign=brand&utm_content=&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=CjwKCAiAqIKNBhAIEiwAu_ZLDisy29dsii7281RSbZVPqWqZPErjYAui89xXxIANVURcaWFbi-K03RoCgMgQAvD_BwE'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="qowt-stl-Normal x-scope qowt-word-para-0">Nate Palmer is a fitness and nutrition expert, coach, speaker, and writer who believes that being in incredible shape gives a massive advantage in business, focus, and relationships. He also happens to be a dad, husband, and the #1 bestselling author of The Million Dollar Body Method and Passport Fitness. Nate helps business owners and entrepreneurs improve their physique, finances, and family time using fitness and nutrition as force multipliers. Join Chris, Ron and Nate to change the way you approach your mind, body and soul in this episode of Hacker Valley Studio.</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0"> </p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">Key Takeaways:</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">03:12 Bio</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">06:34 Controlling your diet and exercise</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">08:30 Maintaining energy / Chris’ journey in weight management</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">10:25 Maintaining a fuel for life</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">13:47 Tactics for exercise and nutrition</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">16:58 Nutrition and fitness for the mind</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">22:10 Nutrition and fitness for the soul</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">26:14 Architecting your day</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">30:00 Win the morning</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">31:15 Get in touch with Nate</p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0"> </p>
<p class="qowt-stl-Normal x-scope qowt-word-para-0">Links:</p>
<p class="x-scope qowt-word-para-1">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="qowt-stl-Normal x-scope qowt-word-para-1">Nate Palmer <a href='https://www.amazon.com/Million-Dollar-Body-Method-Entrepreneurs/dp/1736370200'>Book</a> | <a href='https://www.linkedin.com/in/n8training/'>LinkedIn</a> | <a href='https://twitter.com/n8training?lang=en'>Twitter</a> | <a href='https://n8trainingsystems.com/'>Website</a></p>
<p class="x-scope qowt-word-para-1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="x-scope qowt-word-para-1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="qowt-stl-Normal x-scope qowt-word-para-2">This episode is presented to you by our good friends at <a href='https://www.crowdstrike.com/?utm_campaign=brand&utm_content=&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=CjwKCAiAqIKNBhAIEiwAu_ZLDisy29dsii7281RSbZVPqWqZPErjYAui89xXxIANVURcaWFbi-K03RoCgMgQAvD_BwE'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cwq6pv/Nate_Palmerb47qo.mp3" length="77304152" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Nate Palmer is a fitness and nutrition expert, coach, speaker, and writer who believes that being in incredible shape gives a massive advantage in business, focus, and relationships. He also happens to be a dad, husband, and the #1 bestselling author of The Million Dollar Body Method and Passport Fitness. Nate helps business owners and entrepreneurs improve their physique, finances, and family time using fitness and nutrition as force multipliers. Join Chris, Ron and Nate to change the way you approach your mind, body and soul in this episode of Hacker Valley Studio.
 
Key Takeaways:
03:12 Bio
06:34 Controlling your diet and exercise
08:30 Maintaining energy / Chris’ journey in weight management
10:25 Maintaining a fuel for life
13:47 Tactics for exercise and nutrition
16:58 Nutrition and fitness for the mind
22:10 Nutrition and fitness for the soul
26:14 Architecting your day
30:00 Win the morning
31:15 Get in touch with Nate
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Nate Palmer Book | LinkedIn | Twitter | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is presented to you by our good friends at CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1932</itunes:duration>
                <itunes:episode>190</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 189 - Head in the Cloud with Maurice Grose Jr.</title>
        <itunes:title>Episode 189 - Head in the Cloud with Maurice Grose Jr.</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-189-head-in-the-cloud-with-maurice-grose-jr/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-189-head-in-the-cloud-with-maurice-grose-jr/#comments</comments>        <pubDate>Tue, 23 Nov 2021 08:36:03 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6e96eaf6-c083-348e-b650-421a9efd4ce2</guid>
                                    <description><![CDATA[<p class="p1">Maurice Grose Jr. is an experienced Security Engineer with a background in military RF exploitation and detection, Unix/Linux administration and threat mitigation, and hardware/software integration engineering. Join Chris, Ron and Maurice to hear how a career after the military blossomed into a learning, engaging time of constant challenge and inspiration. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">03:31 Bio</p>
<p class="p1">07:29 What does legacy mean?</p>
<p class="p1">09:48 The appeal of cyber</p>
<p class="p1">12:10 Where do you draw inspiration from?</p>
<p class="p1">14:07 Does legacy experience help with cloud systems today?</p>
<p class="p1">17:42 A takeaway from Maurice’s military career</p>
<p class="p1">21:35 Advice for future leaders, getting kids involved</p>
<p class="p1">26:19 Future prediction in technology</p>
<p class="p1">27:59 Advice for anyone looking to go for the next step</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Maurice Grose Jr: <a href='https://www.linkedin.com/in/herbert-maurice-grose-jr-13515061/?trk=public_profile_browsemap_profile-result-card_result-card_full-click&originalSubdomain=jp'>LinkedIn</a> | <a href='https://twitter.com/thecybershogun'>Twitter</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsor by our friends at <a href='https://www.crowdstrike.com/'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Maurice Grose Jr. is an experienced Security Engineer with a background in military RF exploitation and detection, Unix/Linux administration and threat mitigation, and hardware/software integration engineering. Join Chris, Ron and Maurice to hear how a career after the military blossomed into a learning, engaging time of constant challenge and inspiration. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">03:31 Bio</p>
<p class="p1">07:29 What does legacy mean?</p>
<p class="p1">09:48 The appeal of cyber</p>
<p class="p1">12:10 Where do you draw inspiration from?</p>
<p class="p1">14:07 Does legacy experience help with cloud systems today?</p>
<p class="p1">17:42 A takeaway from Maurice’s military career</p>
<p class="p1">21:35 Advice for future leaders, getting kids involved</p>
<p class="p1">26:19 Future prediction in technology</p>
<p class="p1">27:59 Advice for anyone looking to go for the next step</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Maurice Grose Jr: <a href='https://www.linkedin.com/in/herbert-maurice-grose-jr-13515061/?trk=public_profile_browsemap_profile-result-card_result-card_full-click&originalSubdomain=jp'>LinkedIn</a> | <a href='https://twitter.com/thecybershogun'>Twitter</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsor by our friends at <a href='https://www.crowdstrike.com/'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ej6ygw/Maurice_Grose_Jraomiw.mp3" length="71271920" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Maurice Grose Jr. is an experienced Security Engineer with a background in military RF exploitation and detection, Unix/Linux administration and threat mitigation, and hardware/software integration engineering. Join Chris, Ron and Maurice to hear how a career after the military blossomed into a learning, engaging time of constant challenge and inspiration. 
 
Key Takeaways:
03:31 Bio
07:29 What does legacy mean?
09:48 The appeal of cyber
12:10 Where do you draw inspiration from?
14:07 Does legacy experience help with cloud systems today?
17:42 A takeaway from Maurice’s military career
21:35 Advice for future leaders, getting kids involved
26:19 Future prediction in technology
27:59 Advice for anyone looking to go for the next step
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Maurice Grose Jr: LinkedIn | Twitter 
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsor by our friends at CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1781</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>189</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 188 - Making Friends, Spies, and Traitors with James Lawler</title>
        <itunes:title>Episode 188 - Making Friends, Spies, and Traitors with James Lawler</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-188-making-friends-spies-and-traitors-with-james-lawler/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-188-making-friends-spies-and-traitors-with-james-lawler/#comments</comments>        <pubDate>Tue, 16 Nov 2021 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f4b4dfcc-c2b2-3ad2-b7dd-6b3fef4f2be2</guid>
                                    <description><![CDATA[<p class="p1">James Lawler serves as a national security consultant and is the Senior Partner at MDO Group, which provides Human Intelligence training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues.  Mr. Lawler is a noted speaker on the Insider Threat in government and industry. Prior to this, Mr. Lawler served for 25 years as a CIA operations officer in various international posts and as Chief of the Counterproliferation Division's Special Activities Unit.  Join Chris, Ron and James for a riveting audio journey through stories and experiences from the inside of the C.I.A.</p>
<p class="p2"> </p>
<p class="p3">Key Takeaways:</p>
<p class="p3">03:07 Bio</p>
<p class="p3">04:10 Finding a job after school – the CIA comes to campus</p>
<p class="p3">05:40 Clandestine Service</p>
<p class="p3">09:55 Can you start in two weeks?</p>
<p class="p3">12:40 A sociopath within lanes (laws)</p>
<p class="p3">14:00 Betraying company over country</p>
<p class="p3">17:37 Intensifying friendship development</p>
<p class="p3">19:54 Can you betray your country for $1k?</p>
<p class="p3">20:52 Why do people turn down a pitch?</p>
<p class="p3">27:53 Receiving overwhelming classified information</p>
<p class="p3">36:10 Book</p>
<p class="p3">40:05 Take away from Mr. Lawler</p>
<p class="p2"> </p>
<p class="p3">Links</p>
<p class="p4">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">James Lawler: <a href='https://www.barnesandnoble.com/w/living-lies-james-lawler/1140040320'>Book</a> | <a href='https://www.linkedin.com/in/james-lawler-3bb7347/'>Linkedin</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">This episode is sponsor by our friends at <a href='https://www.crowdstrike.com/'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">James Lawler serves as a national security consultant and is the Senior Partner at MDO Group, which provides Human Intelligence training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues.  Mr. Lawler is a noted speaker on the Insider Threat in government and industry. Prior to this, Mr. Lawler served for 25 years as a CIA operations officer in various international posts and as Chief of the Counterproliferation Division's Special Activities Unit.  Join Chris, Ron and James for a riveting audio journey through stories and experiences from the inside of the C.I.A.</p>
<p class="p2"> </p>
<p class="p3">Key Takeaways:</p>
<p class="p3">03:07 Bio</p>
<p class="p3">04:10 Finding a job after school – the CIA comes to campus</p>
<p class="p3">05:40 Clandestine Service</p>
<p class="p3">09:55 Can you start in two weeks?</p>
<p class="p3">12:40 A sociopath within lanes (laws)</p>
<p class="p3">14:00 Betraying company over country</p>
<p class="p3">17:37 Intensifying friendship development</p>
<p class="p3">19:54 Can you betray your country for $1k?</p>
<p class="p3">20:52 Why do people turn down a pitch?</p>
<p class="p3">27:53 Receiving overwhelming classified information</p>
<p class="p3">36:10 Book</p>
<p class="p3">40:05 Take away from Mr. Lawler</p>
<p class="p2"> </p>
<p class="p3">Links</p>
<p class="p4">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">James Lawler: <a href='https://www.barnesandnoble.com/w/living-lies-james-lawler/1140040320'>Book</a> | <a href='https://www.linkedin.com/in/james-lawler-3bb7347/'>Linkedin</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">This episode is sponsor by our friends at <a href='https://www.crowdstrike.com/'>CrowdStrike</a>. Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bszn9w/James_Lawleraqg4f.mp3" length="111590156" type="audio/mpeg"/>
        <itunes:summary><![CDATA[James Lawler serves as a national security consultant and is the Senior Partner at MDO Group, which provides Human Intelligence training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues.  Mr. Lawler is a noted speaker on the Insider Threat in government and industry. Prior to this, Mr. Lawler served for 25 years as a CIA operations officer in various international posts and as Chief of the Counterproliferation Division's Special Activities Unit.  Join Chris, Ron and James for a riveting audio journey through stories and experiences from the inside of the C.I.A.
 
Key Takeaways:
03:07 Bio
04:10 Finding a job after school – the CIA comes to campus
05:40 Clandestine Service
09:55 Can you start in two weeks?
12:40 A sociopath within lanes (laws)
14:00 Betraying company over country
17:37 Intensifying friendship development
19:54 Can you betray your country for $1k?
20:52 Why do people turn down a pitch?
27:53 Receiving overwhelming classified information
36:10 Book
40:05 Take away from Mr. Lawler
 
Links
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
James Lawler: Book | Linkedin
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsor by our friends at CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2789</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>188</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 187 - Keep Your &amp;#%! Authentic with Samara Williams</title>
        <itunes:title>Episode 187 - Keep Your &amp;#%! Authentic with Samara Williams</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-187-keep-your-authentic-with-samara-williams/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-187-keep-your-authentic-with-samara-williams/#comments</comments>        <pubDate>Fri, 12 Nov 2021 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/56cc64ae-412a-3c40-b5b1-c22e0da5b193</guid>
                                    <description><![CDATA[<p class="p1">Samara Williams is a Manager of Threat Operations at Cardinal Health, focused on proactive action and defense-in-depth improvement. She specializes in threat intelligence, vulnerability management, technical risk communications as well as program design and development. Chris, Ron and Samara go deep into what it takes to be your authentic self, standing strong for what you believe and being aggressive in your thoughts and actions.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">03:21 Bio</p>
<p class="p1">10:00 Ted talk: short, sweet and powerful</p>
<p class="p1">17:51 Knowing your superpower – Samara's? Authenticity</p>
<p class="p1">21:05 Being aggressive and using mentors & allies</p>
<p class="p1">25:26 Mentoring to help the future generation thrive</p>
<p class="p1">28:33 Advice for the person scared to be authentic</p>
<p class="p1">32:09 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Samara Williams: <a href='https://www.linkedin.com/in/samara-r-williams-%25F0%259F%2594%25B8%25EF%25B8%258F-9aa24247/'>LInkedIn</a> | <a href='https://www.youtube.com/watch?v=VUFqJJM4wcA'>Ted Talk</a> | <a href='https://twitter.com/SamaraaaRW'>Twitter</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by our friends at <a href='https://www.crowdstrike.com/'>CrowdStrike.</a> Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Samara Williams is a Manager of Threat Operations at Cardinal Health, focused on proactive action and defense-in-depth improvement. She specializes in threat intelligence, vulnerability management, technical risk communications as well as program design and development. Chris, Ron and Samara go deep into what it takes to be your authentic self, standing strong for what you believe and being aggressive in your thoughts and actions.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">03:21 Bio</p>
<p class="p1">10:00 Ted talk: short, sweet and powerful</p>
<p class="p1">17:51 Knowing your superpower – Samara's? Authenticity</p>
<p class="p1">21:05 Being aggressive and using mentors & allies</p>
<p class="p1">25:26 Mentoring to help the future generation thrive</p>
<p class="p1">28:33 Advice for the person scared to be authentic</p>
<p class="p1">32:09 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Samara Williams: <a href='https://www.linkedin.com/in/samara-r-williams-%25F0%259F%2594%25B8%25EF%25B8%258F-9aa24247/'>LInkedIn</a> | <a href='https://www.youtube.com/watch?v=VUFqJJM4wcA'>Ted Talk</a> | <a href='https://twitter.com/SamaraaaRW'>Twitter</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by our friends at <a href='https://www.crowdstrike.com/'>CrowdStrike.</a> Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/igk248/Samara_Williamsat518.mp3" length="80043608" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Samara Williams is a Manager of Threat Operations at Cardinal Health, focused on proactive action and defense-in-depth improvement. She specializes in threat intelligence, vulnerability management, technical risk communications as well as program design and development. Chris, Ron and Samara go deep into what it takes to be your authentic self, standing strong for what you believe and being aggressive in your thoughts and actions.
 
Key Takeaways:
03:21 Bio
10:00 Ted talk: short, sweet and powerful
17:51 Knowing your superpower – Samara's? Authenticity
21:05 Being aggressive and using mentors & allies
25:26 Mentoring to help the future generation thrive
28:33 Advice for the person scared to be authentic
32:09 Get in touch
 
Links:
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Samara Williams: LInkedIn | Ted Talk | Twitter
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by our friends at CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2001</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>187</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>We Are Here Finale: A Case Study of DEI at CrowdStrike</title>
        <itunes:title>We Are Here Finale: A Case Study of DEI at CrowdStrike</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/we-are-here-finale-a-case-study-of-dei/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/we-are-here-finale-a-case-study-of-dei/#comments</comments>        <pubDate>Thu, 11 Nov 2021 16:19:16 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/631c55bf-7815-3d8d-9d84-d09e1cea90e4</guid>
                                    <description><![CDATA[<p class="p1">In the finale of We Are Here, Chris and Ron are joined by Emily Van Norden, branding and DE&I leader, and Nikki Thornton, Chief of Staff, both at CrowdStrike. The group talks about Diversity, equity and inclusion in this jam-packed episode. Emily and Nikki peel a layer off of the CrowdStrike brand to unveil a plethora of tips, tricks, and advice from their experience with people and standing up the DE&I function company-wide. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">01:56 Bio – Nikki</p>
<p class="p1">02:48 Bio – Emily</p>
<p class="p1">04:58 The chronology of CrowdStrike</p>
<p class="p1">10:12 Standing up the DE&I program</p>
<p class="p1">15:44 From adversity comes opportunity</p>
<p class="p1">20:21 Executives promoting DE&I</p>
<p class="p1">23:23 The deeper meaning of DE&I and why it matters at CrowdStrike</p>
<p class="p1">34:25 Advice for new professionals; making allies</p>
<p class="p1">37:55 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Emily Van Norden: <a href='https://www.linkedin.com/in/emilyvannorden/'>LinkedIn</a> | <a href='https://www.crowdstrike.com/blog/author/emily-van-norden/'>Website</a></p>
<p class="p1">Nikki Thornton: <a href='https://www.linkedin.com/in/nikkithornton/'>LinkedIn</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike.</a> Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In the finale of We Are Here, Chris and Ron are joined by Emily Van Norden, branding and DE&I leader, and Nikki Thornton, Chief of Staff, both at CrowdStrike. The group talks about Diversity, equity and inclusion in this jam-packed episode. Emily and Nikki peel a layer off of the CrowdStrike brand to unveil a plethora of tips, tricks, and advice from their experience with people and standing up the DE&I function company-wide. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">01:56 Bio – Nikki</p>
<p class="p1">02:48 Bio – Emily</p>
<p class="p1">04:58 The chronology of CrowdStrike</p>
<p class="p1">10:12 Standing up the DE&I program</p>
<p class="p1">15:44 From adversity comes opportunity</p>
<p class="p1">20:21 Executives promoting DE&I</p>
<p class="p1">23:23 The deeper meaning of DE&I and why it matters at CrowdStrike</p>
<p class="p1">34:25 Advice for new professionals; making allies</p>
<p class="p1">37:55 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Emily Van Norden: <a href='https://www.linkedin.com/in/emilyvannorden/'>LinkedIn</a> | <a href='https://www.crowdstrike.com/blog/author/emily-van-norden/'>Website</a></p>
<p class="p1">Nikki Thornton: <a href='https://www.linkedin.com/in/nikkithornton/'>LinkedIn</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike.</a> Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/sid5sg/Emily_Nikkiaqu0m.mp3" length="94694060" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In the finale of We Are Here, Chris and Ron are joined by Emily Van Norden, branding and DE&I leader, and Nikki Thornton, Chief of Staff, both at CrowdStrike. The group talks about Diversity, equity and inclusion in this jam-packed episode. Emily and Nikki peel a layer off of the CrowdStrike brand to unveil a plethora of tips, tricks, and advice from their experience with people and standing up the DE&I function company-wide. 
 
Key Takeaways:
 
01:56 Bio – Nikki
02:48 Bio – Emily
04:58 The chronology of CrowdStrike
10:12 Standing up the DE&I program
15:44 From adversity comes opportunity
20:21 Executives promoting DE&I
23:23 The deeper meaning of DE&I and why it matters at CrowdStrike
34:25 Advice for new professionals; making allies
37:55 Get in touch
 
Links:
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Emily Van Norden: LinkedIn | Website
Nikki Thornton: LinkedIn 
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
We Are Here is proudly presented by CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2367</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>186</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>We Are Here Part 3: Allyship and Representation</title>
        <itunes:title>We Are Here Part 3: Allyship and Representation</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/we-are-here-part-3-allyship-and-representation/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/we-are-here-part-3-allyship-and-representation/#comments</comments>        <pubDate>Wed, 10 Nov 2021 05:21:23 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/56236bbc-5936-315a-b0dc-559b5f1c7598</guid>
                                    <description><![CDATA[<p class="p1">On this episode of We Are Here, Ron and Chris join Dave Zawdie and Nina Padavil, two members of the team believe, CrowdStrike’s employee resource group for black professionals. The group dives deep into representation and allyship and how we can use the past to change the future for the good of the industry and its people. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">01:54: Nina – Bio</p>
<p class="p1">03:36 David – Bio</p>
<p class="p1">05:25 Role models and influencers</p>
<p class="p1">11:24 How can the majority help the minority in the future?</p>
<p class="p1">14:33 Mentoring and impacting the future</p>
<p class="p1">17:38 Setbacks and advice for a discouraged cyber security professional</p>
<p class="p1">20:26 Committing to being an ally to another</p>
<p class="p1">22:52 The future of DE&I and how we contribute </p>
<p class="p1">25:14 Get in touch</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Nina Padavil: <a href='https://www.linkedin.com/in/ninapadavil/'>LinkedIn</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike. </a>Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">On this episode of We Are Here, Ron and Chris join Dave Zawdie and Nina Padavil, two members of the team believe, CrowdStrike’s employee resource group for black professionals. The group dives deep into representation and allyship and how we can use the past to change the future for the good of the industry and its people. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">01:54: Nina – Bio</p>
<p class="p1">03:36 David – Bio</p>
<p class="p1">05:25 Role models and influencers</p>
<p class="p1">11:24 How can the majority help the minority in the future?</p>
<p class="p1">14:33 Mentoring and impacting the future</p>
<p class="p1">17:38 Setbacks and advice for a discouraged cyber security professional</p>
<p class="p1">20:26 Committing to being an ally to another</p>
<p class="p1">22:52 The future of DE&I and how we contribute </p>
<p class="p1">25:14 Get in touch</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Nina Padavil: <a href='https://www.linkedin.com/in/ninapadavil/'>LinkedIn</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike. </a>Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8hmjwb/Nina_Davearhjl.mp3" length="63727976" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On this episode of We Are Here, Ron and Chris join Dave Zawdie and Nina Padavil, two members of the team believe, CrowdStrike’s employee resource group for black professionals. The group dives deep into representation and allyship and how we can use the past to change the future for the good of the industry and its people. 
 
Key Takeaways:
01:54: Nina – Bio
03:36 David – Bio
05:25 Role models and influencers
11:24 How can the majority help the minority in the future?
14:33 Mentoring and impacting the future
17:38 Setbacks and advice for a discouraged cyber security professional
20:26 Committing to being an ally to another
22:52 The future of DE&I and how we contribute 
25:14 Get in touch
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Nina Padavil: LinkedIn 
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
We Are Here is proudly presented by CrowdStrike. Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1593</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>185</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>We Are Here Part 2: A Tech Titans Roundtable</title>
        <itunes:title>We Are Here Part 2: A Tech Titans Roundtable</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/we-are-here-part-2-a-tech-titans-roundtable/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/we-are-here-part-2-a-tech-titans-roundtable/#comments</comments>        <pubDate>Tue, 09 Nov 2021 05:51:48 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/bf3b5f58-0aae-320f-b92e-209ac7b0cc94</guid>
                                    <description><![CDATA[<p class="p1">In this whopper of an episode, Chris and Ron join the panel again to discuss diversity, equity and inclusion. The panel includes Marianne Budnik, CMO at CrowdStrike, Shawn Henry, CSO at CrowdStrike, powerhouse educator and influencer Olivia Herriford, and MK Palmore, Director with the CISO division at Google. Stay tuned for a masterclass in DE&I, how they differ and how we can keep pushing the ball forward. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">01:53 Bio- Marianne Budnik</p>
<p class="p1">02:34 Bio- MK Palmore</p>
<p class="p1">03:36 Bio- Olivia Herriford</p>
<p class="p1">04:53 Bio- Shawn Henry</p>
<p class="p1">06:20 The panel discusses their first interest in diversity</p>
<p class="p1">21:36 Equity & Inclusion- how is it different, and what are some ways to incorporate them?</p>
<p class="p1">32:25 Finding influence from all types of people</p>
<p class="p1">37:12 Planning for DE&I</p>
<p class="p1">41:23 Advice to the people who strive to make a difference</p>
<p class="p1">59:20 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Marianne Budnik: <a href='https://www.crowdstrike.com/about-crowdstrike/executive-team/marianne-budnik/'>Website</a> | <a href='https://www.linkedin.com/in/marianne-budnik-92a5471/'>LinkedIn</a></p>
<p class="p1">Shawn Henry: <a href='https://www.crowdstrike.com/about-crowdstrike/executive-team/shawn-henry/'>Website</a> | <a href='https://www.linkedin.com/in/shawn-henry-372bb74b/'>LinkedIn</a></p>
<p class="p1">Olivia Herriford: <a href='https://www.waldenu.edu/why-walden/faculty/olivia-herriford'>Website</a> | <a href='https://www.linkedin.com/in/oliviaherriford/'>LinkedIn</a></p>
<p class="p1">MK Palmore:  <a href='https://twitter.com/mk_palmore?lang=en'>Twitter</a> | <a href='https://www.linkedin.com/in/mkpalmore/'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike.</a> Join the Crowdstrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this whopper of an episode, Chris and Ron join the panel again to discuss diversity, equity and inclusion. The panel includes Marianne Budnik, CMO at CrowdStrike, Shawn Henry, CSO at CrowdStrike, powerhouse educator and influencer Olivia Herriford, and MK Palmore, Director with the CISO division at Google. Stay tuned for a masterclass in DE&I, how they differ and how we can keep pushing the ball forward. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">01:53 Bio- Marianne Budnik</p>
<p class="p1">02:34 Bio- MK Palmore</p>
<p class="p1">03:36 Bio- Olivia Herriford</p>
<p class="p1">04:53 Bio- Shawn Henry</p>
<p class="p1">06:20 The panel discusses their first interest in diversity</p>
<p class="p1">21:36 Equity & Inclusion- how is it different, and what are some ways to incorporate them?</p>
<p class="p1">32:25 Finding influence from all types of people</p>
<p class="p1">37:12 Planning for DE&I</p>
<p class="p1">41:23 Advice to the people who strive to make a difference</p>
<p class="p1">59:20 Get in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p1">Marianne Budnik: <a href='https://www.crowdstrike.com/about-crowdstrike/executive-team/marianne-budnik/'>Website</a> | <a href='https://www.linkedin.com/in/marianne-budnik-92a5471/'>LinkedIn</a></p>
<p class="p1">Shawn Henry: <a href='https://www.crowdstrike.com/about-crowdstrike/executive-team/shawn-henry/'>Website</a> | <a href='https://www.linkedin.com/in/shawn-henry-372bb74b/'>LinkedIn</a></p>
<p class="p1">Olivia Herriford: <a href='https://www.waldenu.edu/why-walden/faculty/olivia-herriford'>Website</a> | <a href='https://www.linkedin.com/in/oliviaherriford/'>LinkedIn</a></p>
<p class="p1">MK Palmore:  <a href='https://twitter.com/mk_palmore?lang=en'>Twitter</a> | <a href='https://www.linkedin.com/in/mkpalmore/'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike.</a> Join the Crowdstrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ngb3b5/WAH_-_Panel6vjmu.mp3" length="128350532" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this whopper of an episode, Chris and Ron join the panel again to discuss diversity, equity and inclusion. The panel includes Marianne Budnik, CMO at CrowdStrike, Shawn Henry, CSO at CrowdStrike, powerhouse educator and influencer Olivia Herriford, and MK Palmore, Director with the CISO division at Google. Stay tuned for a masterclass in DE&I, how they differ and how we can keep pushing the ball forward. 
 
Key Takeaways:
01:53 Bio- Marianne Budnik
02:34 Bio- MK Palmore
03:36 Bio- Olivia Herriford
04:53 Bio- Shawn Henry
06:20 The panel discusses their first interest in diversity
21:36 Equity & Inclusion- how is it different, and what are some ways to incorporate them?
32:25 Finding influence from all types of people
37:12 Planning for DE&I
41:23 Advice to the people who strive to make a difference
59:20 Get in touch
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Marianne Budnik: Website | LinkedIn
Shawn Henry: Website | LinkedIn
Olivia Herriford: Website | LinkedIn
MK Palmore:  Twitter | LinkedIn
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
We Are Here is proudly presented by CrowdStrike. Join the Crowdstrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3208</itunes:duration>
                <itunes:episode>184</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>We Are Here Season 2 Premiere with Minda Harts</title>
        <itunes:title>We Are Here Season 2 Premiere with Minda Harts</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/we-are-here-season-2-premiere-with-minda-harts/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/we-are-here-season-2-premiere-with-minda-harts/#comments</comments>        <pubDate>Mon, 08 Nov 2021 05:29:40 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/03199883-e8f2-3c54-b42f-6b3d4cbb4d27</guid>
                                    <description><![CDATA[<p class="p1">Minda Harts is an Adjunct Assistant Professor of Public Service of NYU’s Robert F. Wagner Graduate School of Public Service and the founder of The Memo LLC, a career development company for women of color. On top of her impressive work resume, she is the award-winning and best-selling author of The Memo: What Women of Color Need To Know To Secure A Seat At The Table. Join Ron, Chris and Minda as they navigate through some of the toughest issues troubling our workplaces today.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">01:58 Bio</p>
<p class="p1">03:08 The last straw</p>
<p class="p1">05:53 Minda’s journey in writing & reflecting</p>
<p class="p1">07:50 Staying humble and making a real difference</p>
<p class="p1">10:25 Workplace trauma- What is it?</p>
<p class="p1">14:32 Advice for businesses opening back up</p>
<p class="p1">17:26 Being authentic at work</p>
<p class="p1">19:40 The new book – Right Within</p>
<p class="p1">25:46 Reminding people they have a voice</p>
<p class="p1">28:24 Get in touch with Minda</p>
<p class="p3"> </p>
<p class="p4">Links:</p>
<p class="p3"> </p>
<p class="p5">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p5">Minda Harts: <a href='https://www.mindaharts.com/rightwithin'>Website</a> | <a href='https://www.linkedin.com/in/mindaharts/'>LinkedIn</a> | <a href='https://twitter.com/MindaHarts'>Twitter</a> Buy her new book Right Within <a href='https://www.amazon.com/dp/1541619625/ref=cm_sw_em_r_mt_dp_JX9Y3SVQ8QF7WRAR4GA2'>here</a>!</p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike.</a></p>
<p class="p4">Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Minda Harts is an Adjunct Assistant Professor of Public Service of NYU’s Robert F. Wagner Graduate School of Public Service and the founder of The Memo LLC, a career development company for women of color. On top of her impressive work resume, she is the award-winning and best-selling author of <em>The Memo: What Women of Color Need To Know To Secure A Seat At The Table. </em>Join Ron, Chris and Minda as they navigate through some of the toughest issues troubling our workplaces today.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">01:58 Bio</p>
<p class="p1">03:08 The last straw</p>
<p class="p1">05:53 Minda’s journey in writing & reflecting</p>
<p class="p1">07:50 Staying humble and making a real difference</p>
<p class="p1">10:25 Workplace trauma- What is it?</p>
<p class="p1">14:32 Advice for businesses opening back up</p>
<p class="p1">17:26 Being authentic at work</p>
<p class="p1">19:40 The new book – Right Within</p>
<p class="p1">25:46 Reminding people they have a voice</p>
<p class="p1">28:24 Get in touch with Minda</p>
<p class="p3"> </p>
<p class="p4">Links:</p>
<p class="p3"> </p>
<p class="p5">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p5">Minda Harts: <a href='https://www.mindaharts.com/rightwithin'>Website</a> | <a href='https://www.linkedin.com/in/mindaharts/'>LinkedIn</a> | <a href='https://twitter.com/MindaHarts'>Twitter</a> Buy her new book Right Within <a href='https://www.amazon.com/dp/1541619625/ref=cm_sw_em_r_mt_dp_JX9Y3SVQ8QF7WRAR4GA2'>here</a>!</p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">We Are Here is proudly presented by <a href='https://www.crowdstrike.com/'>CrowdStrike.</a></p>
<p class="p4">Join the CrowdStrike team <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/587ng9/Minda_Hart.mp3" length="69597344" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Minda Harts is an Adjunct Assistant Professor of Public Service of NYU’s Robert F. Wagner Graduate School of Public Service and the founder of The Memo LLC, a career development company for women of color. On top of her impressive work resume, she is the award-winning and best-selling author of The Memo: What Women of Color Need To Know To Secure A Seat At The Table. Join Ron, Chris and Minda as they navigate through some of the toughest issues troubling our workplaces today.
 
Key Takeaways:
 
01:58 Bio
03:08 The last straw
05:53 Minda’s journey in writing & reflecting
07:50 Staying humble and making a real difference
10:25 Workplace trauma- What is it?
14:32 Advice for businesses opening back up
17:26 Being authentic at work
19:40 The new book – Right Within
25:46 Reminding people they have a voice
28:24 Get in touch with Minda
 
Links:
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Minda Harts: Website | LinkedIn | Twitter Buy her new book Right Within here!
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
We Are Here is proudly presented by CrowdStrike.
Join the CrowdStrike team here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1739</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>183</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red is Back! Episode 1 Sample</title>
        <itunes:title>Hacker Valley Red is Back! Episode 1 Sample</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-is-back-episode-1-sample/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-is-back-episode-1-sample/#comments</comments>        <pubDate>Thu, 04 Nov 2021 08:37:27 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1dce3b86-1ce1-32a3-8694-8c8681a64edc</guid>
                                    <description><![CDATA[<p class="p1">Follow the new channel here: https://hackervalley.com/show/hacker-valley-red/</p>
<p class="p1"> </p>
<p class="p1">Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. He created the world’s first social engineering framework, as well as hosted the first social engineering-based podcast. Chris is an adjunct professor of Social Engineering for an NSA Cyber School of excellence at University of Arizona. Chris is also a well-known author, having written five books on social engineering. Chris’ new book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You”, released January 5, 2021. Join both Chris’ and Ron for an episode of self-analyzation, empathy and understanding.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p1">02:52 Bio</p>
<p class="p1">06:20 Exploring the title of Chris’ book</p>
<p class="p1">08:40 What’s the difference between manipulation and influence?</p>
<p class="p1">10:36 A contract in a book. Why?</p>
<p class="p1">14:33 What books describe Chris?</p>
<p class="p1"> 21:48 The importance of Empathy</p>
<p class="p1">26:48 The science </p>
<p class="p1">30:57 Chris’ conference: The Human Behavior Conference</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">Chris Hadnagy: <a href='http://www.twitter.com/humanhacker'>Twitter</a> | LinkedIn | <a href='https://www.facebook.com/socialengineerinc'>Facebook</a> | <a href='https://www.amazon.com/Human-Hacking-Friends-Influence-People/dp/0063001780/ref=asc_df_0063001780/?tag=hyprod-20&linkCode=df0&hvadid=459617407428&hvpos=&hvnetw=g&hvrand=8139338183443623314&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9010612&hvtargid=pla-941169711331&psc=1'>Book</a> | <a href='https://www.hbes.com/'>Conference</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by <a href='https://www.axonius.com/press-releases/axonius-named-caasm-vendor-2021-gartner-hype-cycle'>Axonius Hype Cycle</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Follow the new channel here: https://hackervalley.com/show/hacker-valley-red/</p>
<p class="p1"> </p>
<p class="p1">Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. He created the world’s first social engineering framework, as well as hosted the first social engineering-based podcast. Chris is an adjunct professor of Social Engineering for an NSA Cyber School of excellence at University of Arizona. Chris is also a well-known author, having written five books on social engineering. Chris’ new book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You”, released January 5, 2021. Join both Chris’ and Ron for an episode of self-analyzation, empathy and understanding.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p1">02:52 Bio</p>
<p class="p1">06:20 Exploring the title of Chris’ book</p>
<p class="p1">08:40 What’s the difference between manipulation and influence?</p>
<p class="p1">10:36 A contract in a book. Why?</p>
<p class="p1">14:33 What books describe Chris?</p>
<p class="p1"> 21:48 The importance of Empathy</p>
<p class="p1">26:48 The science </p>
<p class="p1">30:57 Chris’ conference: The Human Behavior Conference</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">Chris Hadnagy: <a href='http://www.twitter.com/humanhacker'>Twitter</a> | LinkedIn | <a href='https://www.facebook.com/socialengineerinc'>Facebook</a> | <a href='https://www.amazon.com/Human-Hacking-Friends-Influence-People/dp/0063001780/ref=asc_df_0063001780/?tag=hyprod-20&linkCode=df0&hvadid=459617407428&hvpos=&hvnetw=g&hvrand=8139338183443623314&hvpone=&hvptwo=&hvqmt=&hvdev=c&hvdvcmdl=&hvlocint=&hvlocphy=9010612&hvtargid=pla-941169711331&psc=1'>Book</a> | <a href='https://www.hbes.com/'>Conference</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by <a href='https://www.axonius.com/press-releases/axonius-named-caasm-vendor-2021-gartner-hype-cycle'>Axonius Hype Cycle</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2w3rzq/HVR_E1_For_HVS66v4y.mp3" length="37852935" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Follow the new channel here: https://hackervalley.com/show/hacker-valley-red/
 
Christopher Hadnagy is the founder and CEO of Social-Engineer, LLC. He created the world’s first social engineering framework, as well as hosted the first social engineering-based podcast. Chris is an adjunct professor of Social Engineering for an NSA Cyber School of excellence at University of Arizona. Chris is also a well-known author, having written five books on social engineering. Chris’ new book, “Human Hacking: Win Friends, Influence People and Leave Them Better Off for Having Met You”, released January 5, 2021. Join both Chris’ and Ron for an episode of self-analyzation, empathy and understanding.
 
Key Takeaways
02:52 Bio
06:20 Exploring the title of Chris’ book
08:40 What’s the difference between manipulation and influence?
10:36 A contract in a book. Why?
14:33 What books describe Chris?
 21:48 The importance of Empathy
26:48 The science 
30:57 Chris’ conference: The Human Behavior Conference
 
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Chris Hadnagy: Twitter | LinkedIn | Facebook | Book | Conference
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Axonius Hype Cycle
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2361</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>182</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 181 - The Calling of Cyber with Jerich Beason</title>
        <itunes:title>Episode 181 - The Calling of Cyber with Jerich Beason</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-181-the-calling-of-cyber-with-jerich-beason/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-181-the-calling-of-cyber-with-jerich-beason/#comments</comments>        <pubDate>Tue, 02 Nov 2021 07:01:48 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/cad96686-1ee9-3454-b356-5a7b9504d49d</guid>
                                    <description><![CDATA[<p class="p1">Jerich Beason, SVP & CISO at Epiq, joins Chris and Ron to talk passion, purpose and how that plays a part in cyber. Jerich sits on panels, speaks at conferences and events & contributes to white papers and security articles. He also serves as a Board advisor to security startups. Jerich is currently the host of Epiq’s podcast, Cyberside Chats which has the mission of increasing knowledge and awareness of cybersecurity within the legal industry.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">02:50 Bio</p>
<p class="p1">03:48 Choosing an education in cyber</p>
<p class="p1">05:00 Origin story – why cyber?</p>
<p class="p1">09:58 Jerich touches on why some cyber veterans are discouraging newcomers</p>
<p class="p1">12:26 Inspiring the future generation</p>
<p class="p1">15:20 Talking passion & calling</p>
<p class="p1">17:17 A day in the life of Jerich</p>
<p class="p1">20:10 Avoiding burnout & fulfilling purpose</p>
<p class="p1">23:15 Zero-Trust</p>
<p class="p1">26:34 The future in security program building</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">Jerich Beason: <a href='https://www.linkedin.com/in/jerich-beason-874b908/'>LinkedIn</a> | <a href='https://www.epiqglobal.com/en-us/thinking/podcast'>Podcast</a> | <a href='https://twitter.com/blanketsec?lang=en'>Twitter</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This Episode is sponsored by <a href='https://go.crowdstrike.com/brand-wssycg-video-try-falcon.html?utm_campaign=brand&utm_content=us&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=Cj0KCQiA15yNBhDTARIsAGnwe0UfYBqj0VQMeqQpJ8bqgRhwaRJONbDpjraHy25EKO2WU2BUrE6pvVMaAqIREALw_wcB'>CrowdStrike</a>. Find a home with CrowdStrike <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Jerich Beason, SVP & CISO at Epiq, joins Chris and Ron to talk passion, purpose and how that plays a part in cyber. Jerich sits on panels, speaks at conferences and events & contributes to white papers and security articles. He also serves as a Board advisor to security startups. Jerich is currently the host of Epiq’s podcast, Cyberside Chats which has the mission of increasing knowledge and awareness of cybersecurity within the legal industry.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">02:50 Bio</p>
<p class="p1">03:48 Choosing an education in cyber</p>
<p class="p1">05:00 Origin story – why cyber?</p>
<p class="p1">09:58 Jerich touches on why some cyber veterans are discouraging newcomers</p>
<p class="p1">12:26 Inspiring the future generation</p>
<p class="p1">15:20 Talking passion & calling</p>
<p class="p1">17:17 A day in the life of Jerich</p>
<p class="p1">20:10 Avoiding burnout & fulfilling purpose</p>
<p class="p1">23:15 Zero-Trust</p>
<p class="p1">26:34 The future in security program building</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a> </p>
<p class="p3">Jerich Beason: <a href='https://www.linkedin.com/in/jerich-beason-874b908/'>LinkedIn</a> | <a href='https://www.epiqglobal.com/en-us/thinking/podcast'>Podcast</a> | <a href='https://twitter.com/blanketsec?lang=en'>Twitter</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This Episode is sponsored by <a href='https://go.crowdstrike.com/brand-wssycg-video-try-falcon.html?utm_campaign=brand&utm_content=us&utm_medium=sem&utm_source=goog&utm_term=crowdstrike&gclid=Cj0KCQiA15yNBhDTARIsAGnwe0UfYBqj0VQMeqQpJ8bqgRhwaRJONbDpjraHy25EKO2WU2BUrE6pvVMaAqIREALw_wcB'>CrowdStrike</a>. Find a home with CrowdStrike <a href='https://www.crowdstrike.com/careers/'>here</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/q3c3xp/11-1_Jerich_Beason9ntwo.mp3" length="76130696" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Jerich Beason, SVP & CISO at Epiq, joins Chris and Ron to talk passion, purpose and how that plays a part in cyber. Jerich sits on panels, speaks at conferences and events & contributes to white papers and security articles. He also serves as a Board advisor to security startups. Jerich is currently the host of Epiq’s podcast, Cyberside Chats which has the mission of increasing knowledge and awareness of cybersecurity within the legal industry.
 
Key Takeaways:
 
02:50 Bio
03:48 Choosing an education in cyber
05:00 Origin story – why cyber?
09:58 Jerich touches on why some cyber veterans are discouraging newcomers
12:26 Inspiring the future generation
15:20 Talking passion & calling
17:17 A day in the life of Jerich
20:10 Avoiding burnout & fulfilling purpose
23:15 Zero-Trust
26:34 The future in security program building
 
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website 
Jerich Beason: LinkedIn | Podcast | Twitter
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This Episode is sponsored by CrowdStrike. Find a home with CrowdStrike here.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1903</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>181</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>The Pod Pack feat. Allan Alford, Dave Bittner, Graham Cluley and Jack Rhysider</title>
        <itunes:title>The Pod Pack feat. Allan Alford, Dave Bittner, Graham Cluley and Jack Rhysider</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/the-pod-pack-feat-allan-alford-dave-bittner-graham-cluley-and-jack-rhysider/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/the-pod-pack-feat-allan-alford-dave-bittner-graham-cluley-and-jack-rhysider/#comments</comments>        <pubDate>Wed, 27 Oct 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/13a0b574-ef8e-3b18-861a-68f292621b04</guid>
                                    <description><![CDATA[<p>This week, we’re switching it up. We’ve invited a few friends and collogues to the studio to talk business. On the mics with Chris and Ron we have Dave Bittner from The CyberWire, Graham Cluley from Smashing Security, Jack Rhysider from Darknet Diaries, and our brother-in-arms, Allan Alford from The Cyber Ranch podcast. Want to see behind the scenes? This episode has you covered. Do you want to start a podcast? This is a master class. Get answers to questions that haunt all aspiring podcasters: What is good content and how do you keep coming up with it? What drives podcasters and why do they fail? Hear from seasoned veterans in this round table of podcasting wizardry.</p>
<p>In addition to this content, Hacker Valley has opted to donate cash to the non-profit of the guests’ choice. Please follow the links below to support these charities.</p>
<p>Key Takeaways:</p>
<p>03:12 Dave – Intro and podcasting history</p>
<p>04:54 Graham – Intro & podcasting history</p>
<p>07:08 Jack – Intro & podcasting history</p>
<p>09:31 Common misconceptions about podcasting</p>
<p>14:96 The most and least favorite part of podcasting</p>
<p>20:44 What does the word ‘podcast’ actually mean?</p>
<p>22:05 Horror stories and lessons learned</p>
<p>31:50 Allan Alford joins the show – Intro & podcasting history</p>
<p>32:50 What inspires you to podcast? What influences you?</p>
<p>37:19 Why being authentic is the only way</p>
<p>44:10 Questions from podcasters to podcasters</p>
<p>50:57 Realistic expectations & the drive</p>
<p>52:12 Stay in touch, and donate to charity!</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Dave Bittner: <a href='https://www.linkedin.com/in/dave-bittner-27231a4/'>LinkedIn</a> | <a href='https://twitter.com/bittner?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://thecyberwire.com/'>The Cyberwire</a> | Donate to <a href='https://www.rotary.org/en/donate'>The Rotary Foundation</a></p>
<p>Graham Cluley: <a href='https://grahamcluley.com/'>Website</a> | <a href='https://www.linkedin.com/in/grahamcluley/?originalSubdomain=uk'>LinkedIn</a> | <a href='https://twitter.com/gcluley?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://www.smashingsecurity.com/'>Smashing Security</a> | Donate to <a href='https://www.mencap.org.uk/'>Mencap</a></p>
<p>Jack Rhysider: <a href='https://twitter.com/JackRhysider?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://www.linkedin.com/in/jack-rhysider-02922a167/'>LinkedIn</a> | <a href='https://darknetdiaries.com/'>Darknet Diaries</a> | Donate to <a href='https://www.eff.org/'>EFF</a></p>
<p>Allan Alford: <a href='https://linkedin.com/in/allanalford'>LinkedIn</a> | <a href='https://twitter.com/AllanAlfordinTX'>Twitter</a> | <a href='https://hackervalley.com/show/cyberranch/'>Cyber Ranch</a> | Donate to <a href='https://www.blackgirlscode.com/'>Black Girls Code</a></p>
<p>Huge thank you to our friends and sponsors <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>This week, we’re switching it up. We’ve invited a few friends and collogues to the studio to talk business. On the mics with Chris and Ron we have Dave Bittner from The CyberWire, Graham Cluley from Smashing Security, Jack Rhysider from Darknet Diaries, and our brother-in-arms, Allan Alford from The Cyber Ranch podcast. Want to see behind the scenes? This episode has you covered. Do you want to start a podcast? This is a master class. Get answers to questions that haunt all aspiring podcasters: What is good content and how do you keep coming up with it? What drives podcasters and why do they fail? Hear from seasoned veterans in this round table of podcasting wizardry.</p>
<p>In addition to this content, Hacker Valley has opted to donate cash to the non-profit of the guests’ choice. Please follow the links below to support these charities.</p>
<p>Key Takeaways:</p>
<p>03:12 Dave – Intro and podcasting history</p>
<p>04:54 Graham – Intro & podcasting history</p>
<p>07:08 Jack – Intro & podcasting history</p>
<p>09:31 Common misconceptions about podcasting</p>
<p>14:96 The most and least favorite part of podcasting</p>
<p>20:44 What does the word ‘podcast’ actually mean?</p>
<p>22:05 Horror stories and lessons learned</p>
<p>31:50 Allan Alford joins the show – Intro & podcasting history</p>
<p>32:50 What inspires you to podcast? What influences you?</p>
<p>37:19 Why being authentic is the only way</p>
<p>44:10 Questions from podcasters to podcasters</p>
<p>50:57 Realistic expectations & the drive</p>
<p>52:12 Stay in touch, and donate to charity!</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Dave Bittner: <a href='https://www.linkedin.com/in/dave-bittner-27231a4/'>LinkedIn</a> | <a href='https://twitter.com/bittner?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://thecyberwire.com/'>The Cyberwire</a> | Donate to <a href='https://www.rotary.org/en/donate'>The Rotary Foundation</a></p>
<p>Graham Cluley: <a href='https://grahamcluley.com/'>Website</a> | <a href='https://www.linkedin.com/in/grahamcluley/?originalSubdomain=uk'>LinkedIn</a> | <a href='https://twitter.com/gcluley?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://www.smashingsecurity.com/'>Smashing Security</a> | Donate to <a href='https://www.mencap.org.uk/'>Mencap</a></p>
<p>Jack Rhysider: <a href='https://twitter.com/JackRhysider?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://www.linkedin.com/in/jack-rhysider-02922a167/'>LinkedIn</a> | <a href='https://darknetdiaries.com/'>Darknet Diaries</a> | Donate to <a href='https://www.eff.org/'>EFF</a></p>
<p>Allan Alford: <a href='https://linkedin.com/in/allanalford'>LinkedIn</a> | <a href='https://twitter.com/AllanAlfordinTX'>Twitter</a> | <a href='https://hackervalley.com/show/cyberranch/'>Cyber Ranch</a> | Donate to <a href='https://www.blackgirlscode.com/'>Black Girls Code</a></p>
<p>Huge thank you to our friends and sponsors <a href='https://www.axonius.com/'>Axonius</a> and <a href='https://www.uptycs.com/'>Uptycs</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/uuzkw5/Podpack_-_Final7w10z.mp3" length="134703272" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This week, we’re switching it up. We’ve invited a few friends and collogues to the studio to talk business. On the mics with Chris and Ron we have Dave Bittner from The CyberWire, Graham Cluley from Smashing Security, Jack Rhysider from Darknet Diaries, and our brother-in-arms, Allan Alford from The Cyber Ranch podcast. Want to see behind the scenes? This episode has you covered. Do you want to start a podcast? This is a master class. Get answers to questions that haunt all aspiring podcasters: What is good content and how do you keep coming up with it? What drives podcasters and why do they fail? Hear from seasoned veterans in this round table of podcasting wizardry.
In addition to this content, Hacker Valley has opted to donate cash to the non-profit of the guests’ choice. Please follow the links below to support these charities.
Key Takeaways:
03:12 Dave – Intro and podcasting history
04:54 Graham – Intro & podcasting history
07:08 Jack – Intro & podcasting history
09:31 Common misconceptions about podcasting
14:96 The most and least favorite part of podcasting
20:44 What does the word ‘podcast’ actually mean?
22:05 Horror stories and lessons learned
31:50 Allan Alford joins the show – Intro & podcasting history
32:50 What inspires you to podcast? What influences you?
37:19 Why being authentic is the only way
44:10 Questions from podcasters to podcasters
50:57 Realistic expectations & the drive
52:12 Stay in touch, and donate to charity!
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Dave Bittner: LinkedIn | Twitter | The Cyberwire | Donate to The Rotary Foundation
Graham Cluley: Website | LinkedIn | Twitter | Smashing Security | Donate to Mencap
Jack Rhysider: Twitter | LinkedIn | Darknet Diaries | Donate to EFF
Allan Alford: LinkedIn | Twitter | Cyber Ranch | Donate to Black Girls Code
Huge thank you to our friends and sponsors Axonius and Uptycs.
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3367</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>180</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 179 - Management VS Leadership in Cyber Major General (Retired) Brett T. Williams</title>
        <itunes:title>Episode 179 - Management VS Leadership in Cyber Major General (Retired) Brett T. Williams</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-179-management-vs-leadership-in-cyber-major-general-retired-brett-t-williams/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-179-management-vs-leadership-in-cyber-major-general-retired-brett-t-williams/#comments</comments>        <pubDate>Tue, 26 Oct 2021 07:27:31 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ad510085-ece4-3350-8fb7-2bea49ddbebc</guid>
                                    <description><![CDATA[<p class="p1">Major General (Retired) Brett T. Williams is a co-founder of IronNet Cybersecurity. IronNet delivers the power of collective cybersecurity to defend companies, sectors and Nations. He served nearly 33 years in the U.S. Air Force and his last assignment was Director of Operations, U.S. Cyber Command. General Williams is a highly experienced fighter pilot with more than 100 combat missions in the F-15C. Join Chris, Ron and Brett for a jam-packed episode of leadership and purpose.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">03:05 Bio</p>
<p class="p1">05:48 Brett’s military origin story</p>
<p class="p1">07:33 Transitioning from fighter pilot to cybersecurity practitioner.</p>
<p class="p1">14:55 Understanding strengths through experience</p>
<p class="p1">20:10 Advancement through leadership</p>
<p class="p1">22:23 Being a leader - mission vision & resources </p>
<p class="p1">25:44 What keeps driving you to be better?</p>
<p class="p1">31:20 Advice for aspiring and active leaders</p>
<p class="p1">35:14 Get in touch with Brett</p>
<p class="p2"> </p>
<p class="p3">Links:</p>
<p class="p4">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Brett Williams: <a href='https://www.linkedin.com/in/et183394/'>LinkedIn</a> | <a href='https://thecyberspeaker.com/'>Website</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Major General (Retired) Brett T. Williams is a co-founder of IronNet Cybersecurity. IronNet delivers the power of collective cybersecurity to defend companies, sectors and Nations. He served nearly 33 years in the U.S. Air Force and his last assignment was Director of Operations, U.S. Cyber Command. General Williams is a highly experienced fighter pilot with more than 100 combat missions in the F-15C. Join Chris, Ron and Brett for a jam-packed episode of leadership and purpose.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">03:05 Bio</p>
<p class="p1">05:48 Brett’s military origin story</p>
<p class="p1">07:33 Transitioning from fighter pilot to cybersecurity practitioner.</p>
<p class="p1">14:55 Understanding strengths through experience</p>
<p class="p1">20:10 Advancement through leadership</p>
<p class="p1">22:23 Being a leader - mission vision & resources </p>
<p class="p1">25:44 What keeps driving you to be better?</p>
<p class="p1">31:20 Advice for aspiring and active leaders</p>
<p class="p1">35:14 Get in touch with Brett</p>
<p class="p2"> </p>
<p class="p3">Links:</p>
<p class="p4">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Brett Williams: <a href='https://www.linkedin.com/in/et183394/'>LinkedIn</a> | <a href='https://thecyberspeaker.com/'>Website</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p3">This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4469t4/Brett_Williams82jxz.mp3" length="86687624" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Major General (Retired) Brett T. Williams is a co-founder of IronNet Cybersecurity. IronNet delivers the power of collective cybersecurity to defend companies, sectors and Nations. He served nearly 33 years in the U.S. Air Force and his last assignment was Director of Operations, U.S. Cyber Command. General Williams is a highly experienced fighter pilot with more than 100 combat missions in the F-15C. Join Chris, Ron and Brett for a jam-packed episode of leadership and purpose.
 
Key Takeaways:
03:05 Bio
05:48 Brett’s military origin story
07:33 Transitioning from fighter pilot to cybersecurity practitioner.
14:55 Understanding strengths through experience
20:10 Advancement through leadership
22:23 Being a leader - mission vision & resources 
25:44 What keeps driving you to be better?
31:20 Advice for aspiring and active leaders
35:14 Get in touch with Brett
 
Links:
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Brett Williams: LinkedIn | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Living Security]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2167</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>179</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Metaversable: Exploring the metaverse thru NFTs, NFT Art, and Cryptocurrency</title>
        <itunes:title>Metaversable: Exploring the metaverse thru NFTs, NFT Art, and Cryptocurrency</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/metaversable-exploring-the-metaverse-thru-nfts-nft-art-and-cryptocurrency/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/metaversable-exploring-the-metaverse-thru-nfts-nft-art-and-cryptocurrency/#comments</comments>        <pubDate>Fri, 22 Oct 2021 14:29:50 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/94e8ed91-2e1b-3bb0-b148-df5e1a977739</guid>
                                    <description><![CDATA[<p>We have a new show!</p>
<p>In episode one, Ron and Chris explore NFTs and digital art with Jason also known as 0xBanana.</p>
<p>
1:18: What is the Metaverse?
2:04: Tumbling down the Metaverse “rabbit hole.”
3:00: What are Non-fungible Tokens (NFTs) all about?
5:55: Is this just a fad? What’s the future of NFTs?
7:44: What future technologies/art are on the horizon?
9:30: What makes NFTs so exclusive/valuable?
11:34: How do art royalties work?
12:16: How do you verify authenticity for art, media, etc?
14:20: What is Solana and how does it relate to NFTs?
15:31: What is the NFT and Solana community like? 
16:55: How can we break into the Solana space?
18:33: What is the significance of a “drop?”
20:19: Flipping art 
21:52: NFT art drop best practices 
24:25: How does one become an artist in the space? 
26:01: Life changing realization</p>
<p>Follow this show on your favorite platform here: https://hackervalley.com/show/metaversable/</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We have a new show!</p>
<p>In episode one, Ron and Chris explore NFTs and digital art with Jason also known as 0xBanana.</p>
<p><br>
1:18: What is the Metaverse?<br>
2:04: Tumbling down the Metaverse “rabbit hole.”<br>
3:00: What are Non-fungible Tokens (NFTs) all about?<br>
5:55: Is this just a fad? What’s the future of NFTs?<br>
7:44: What future technologies/art are on the horizon?<br>
9:30: What makes NFTs so exclusive/valuable?<br>
11:34: How do art royalties work?<br>
12:16: How do you verify authenticity for art, media, etc?<br>
14:20: What is Solana and how does it relate to NFTs?<br>
15:31: What is the NFT and Solana community like? <br>
16:55: How can we break into the Solana space?<br>
18:33: What is the significance of a “drop?”<br>
20:19: Flipping art <br>
21:52: NFT art drop best practices <br>
24:25: How does one become an artist in the space? <br>
26:01: Life changing realization</p>
<p>Follow this show on your favorite platform here: https://hackervalley.com/show/metaversable/</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wes44c/Metaversable_on_the_Hacker_Valley_Platform7cxt6.mp3" length="27762565" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We have a new show!
In episode one, Ron and Chris explore NFTs and digital art with Jason also known as 0xBanana.
1:18: What is the Metaverse?2:04: Tumbling down the Metaverse “rabbit hole.”3:00: What are Non-fungible Tokens (NFTs) all about?5:55: Is this just a fad? What’s the future of NFTs?7:44: What future technologies/art are on the horizon?9:30: What makes NFTs so exclusive/valuable?11:34: How do art royalties work?12:16: How do you verify authenticity for art, media, etc?14:20: What is Solana and how does it relate to NFTs?15:31: What is the NFT and Solana community like? 16:55: How can we break into the Solana space?18:33: What is the significance of a “drop?”20:19: Flipping art 21:52: NFT art drop best practices 24:25: How does one become an artist in the space? 26:01: Life changing realization
Follow this show on your favorite platform here: https://hackervalley.com/show/metaversable/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1731</itunes:duration>
                <itunes:episode>178</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 177 - Winning in a Human-Centric Cyber Market with Nathan Burke</title>
        <itunes:title>Episode 177 - Winning in a Human-Centric Cyber Market with Nathan Burke</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-177-winning-in-a-human-centric-cyber-market-with-nathan-burke/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-177-winning-in-a-human-centric-cyber-market-with-nathan-burke/#comments</comments>        <pubDate>Thu, 21 Oct 2021 06:33:31 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/509f4c4c-37a7-39ea-af90-0d399b5366c1</guid>
                                    <description><![CDATA[<p class="p1">Welcome to this live episode of Hacker Valley Studio! Nathan Burke, CMO at Axonius, is a general in the fight to humanize cybersecurity through practical, engaging content and solid foundations. Join Ron, Chris and Nathan as they sit together for a masterclass in startups and technological advancements. In addition to an episode full of golden nuggets, learn how Chris and Ron became a part of Axonius and why they all make a great team. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">2:49 Bio</p>
<p class="p1">9:48 Unexpected victories</p>
<p class="p1">15:07 Successful tendencies for a successful startup</p>
<p class="p1">19:04 Axonius + HVS – Why? </p>
<p class="p1">25:41 Keeping the momentum in technological advancement</p>
<p class="p1">30:21 Bleeding orange: A tattoo. A bet.</p>
<p class="p1">32:45 Advice for a budding marketing professional</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Nathan Burke: <a href='https://www.linkedin.com/in/nathanwburke/'>LinkedIn</a> | <a href='https://www.linkedin.com/in/nathanwburke/'>Blog</a> | <a href='https://twitter.com/nathanwburke?lang=en'>Twitter</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by <a href='https://www.axonius.com/press-releases/axonius-named-caasm-vendor-2021-gartner-hype-cycle'>Axonius Hype Cycle</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Welcome to this live episode of Hacker Valley Studio! Nathan Burke, CMO at Axonius, is a general in the fight to humanize cybersecurity through practical, engaging content and solid foundations. Join Ron, Chris and Nathan as they sit together for a masterclass in startups and technological advancements. In addition to an episode full of golden nuggets, learn how Chris and Ron became a part of Axonius and why they all make a great team. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">2:49 Bio</p>
<p class="p1">9:48 Unexpected victories</p>
<p class="p1">15:07 Successful tendencies for a successful startup</p>
<p class="p1">19:04 Axonius + HVS – Why? </p>
<p class="p1">25:41 Keeping the momentum in technological advancement</p>
<p class="p1">30:21 Bleeding orange: A tattoo. A bet.</p>
<p class="p1">32:45 Advice for a budding marketing professional</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Nathan Burke: <a href='https://www.linkedin.com/in/nathanwburke/'>LinkedIn</a> | <a href='https://www.linkedin.com/in/nathanwburke/'>Blog</a> | <a href='https://twitter.com/nathanwburke?lang=en'>Twitter</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by <a href='https://www.axonius.com/press-releases/axonius-named-caasm-vendor-2021-gartner-hype-cycle'>Axonius Hype Cycle</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5sakxm/Nate_Burke_Remasteredb4bjo.mp3" length="34569216" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Welcome to this live episode of Hacker Valley Studio! Nathan Burke, CMO at Axonius, is a general in the fight to humanize cybersecurity through practical, engaging content and solid foundations. Join Ron, Chris and Nathan as they sit together for a masterclass in startups and technological advancements. In addition to an episode full of golden nuggets, learn how Chris and Ron became a part of Axonius and why they all make a great team. 
 
Key Takeaways:
2:49 Bio
9:48 Unexpected victories
15:07 Successful tendencies for a successful startup
19:04 Axonius + HVS – Why? 
25:41 Keeping the momentum in technological advancement
30:21 Bleeding orange: A tattoo. A bet.
32:45 Advice for a budding marketing professional
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Nathan Burke: LinkedIn | Blog | Twitter
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Axonius Hype Cycle]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2156</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>177</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 176 -Technical Education with Dr. SK Moreland and Terri Oropeza</title>
        <itunes:title>Episode 176 -Technical Education with Dr. SK Moreland and Terri Oropeza</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-176-technical-education-with-dr-sk-moreland-and-terri-oropeza/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-176-technical-education-with-dr-sk-moreland-and-terri-oropeza/#comments</comments>        <pubDate>Tue, 19 Oct 2021 08:26:44 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7d2ccab9-926a-3687-bcd8-991f426a6fa3</guid>
                                    <description><![CDATA[<p class="p1">We’ve switched it up again to bring you 2 guests this week on this double header masterclass in education. Chris and Ron are joined up by Terri Oropeza and Shakera Moreland, two natural teachers in their field. Shakera, also known as the HIM concierge, has used her past to shape how she teaches future professionals. Terri explains how to grow to understand your authentic self in learning and teaching while encouraging young people to never mind the stereotypes and get into cyber. With the opinions and strategies laid out by these two educators, you can be sure that you won’t leave this episode taking away nothing. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">Shakera Moreland</p>
<p class="p1">03:31 Bio</p>
<p class="p1">05:56 What is H.I.M.?</p>
<p class="p1">10:03 Connecting with others to guide and mentor</p>
<p class="p1">11:58 Marrying your super-power with your purpose</p>
<p class="p1">13:10 Shakera’s journey into podcasting</p>
<p class="p1">16:01 What need does Shakera’s business solve?</p>
<p class="p1">17:34 What’s the goal of the podcast, and why?</p>
<p class="p2"> </p>
<p class="p1">Terri Orepeza</p>
<p class="p1">20:20 Intro</p>
<p class="p1">21:03 Bio</p>
<p class="p1">25:43 Influences from teachers in the past</p>
<p class="p1">27:05 What Terri is teaching today</p>
<p class="p1">28:58 What can be changed in technical education?</p>
<p class="p1">31:48 Empowering students to find their calling in the field</p>
<p class="p1">33:32 Why is it important to get involved in organizations?</p>
<p class="p1">37:20 Advice for a newcomer</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p4">Shakera Moreland: <a href='https://www.linkedin.com/in/thehimconcierge/'>LinkedIn</a> | <a href='https://open.spotify.com/show/1XRgGRCoydcAuUbjfX59VY'>Podcast</a>  Terri Orepeza: <a href='https://www.linkedin.com/in/toropeza/'>LinkedIn</a> | <a href='https://twitter.com/toropeza?lang=en'>Twitter</a> </p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">We’ve switched it up again to bring you 2 guests this week on this double header masterclass in education. Chris and Ron are joined up by Terri Oropeza and Shakera Moreland, two natural teachers in their field. Shakera, also known as the HIM concierge, has used her past to shape how she teaches future professionals. Terri explains how to grow to understand your authentic self in learning and teaching while encouraging young people to never mind the stereotypes and get into cyber. With the opinions and strategies laid out by these two educators, you can be sure that you won’t leave this episode taking away nothing. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1"><em>Shakera Moreland</em></p>
<p class="p1">03:31 Bio</p>
<p class="p1">05:56 What is H.I.M.?</p>
<p class="p1">10:03 Connecting with others to guide and mentor</p>
<p class="p1">11:58 Marrying your super-power with your purpose</p>
<p class="p1">13:10 Shakera’s journey into podcasting</p>
<p class="p1">16:01 What need does Shakera’s business solve?</p>
<p class="p1">17:34 What’s the goal of the podcast, and why?</p>
<p class="p2"> </p>
<p class="p1"><em>Terri Orepeza</em></p>
<p class="p1">20:20 Intro</p>
<p class="p1">21:03 Bio</p>
<p class="p1">25:43 Influences from teachers in the past</p>
<p class="p1">27:05 What Terri is teaching today</p>
<p class="p1">28:58 What can be changed in technical education?</p>
<p class="p1">31:48 Empowering students to find their calling in the field</p>
<p class="p1">33:32 Why is it important to get involved in organizations?</p>
<p class="p1">37:20 Advice for a newcomer</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p4">Shakera Moreland: <a href='https://www.linkedin.com/in/thehimconcierge/'>LinkedIn</a> | <a href='https://open.spotify.com/show/1XRgGRCoydcAuUbjfX59VY'>Podcast</a>  Terri Orepeza: <a href='https://www.linkedin.com/in/toropeza/'>LinkedIn</a> | <a href='https://twitter.com/toropeza?lang=en'>Twitter</a> </p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cxnawi/Double_Header9zp04.mp3" length="97283180" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We’ve switched it up again to bring you 2 guests this week on this double header masterclass in education. Chris and Ron are joined up by Terri Oropeza and Shakera Moreland, two natural teachers in their field. Shakera, also known as the HIM concierge, has used her past to shape how she teaches future professionals. Terri explains how to grow to understand your authentic self in learning and teaching while encouraging young people to never mind the stereotypes and get into cyber. With the opinions and strategies laid out by these two educators, you can be sure that you won’t leave this episode taking away nothing. 
 
Key Takeaways:
 
Shakera Moreland
03:31 Bio
05:56 What is H.I.M.?
10:03 Connecting with others to guide and mentor
11:58 Marrying your super-power with your purpose
13:10 Shakera’s journey into podcasting
16:01 What need does Shakera’s business solve?
17:34 What’s the goal of the podcast, and why?
 
Terri Orepeza
20:20 Intro
21:03 Bio
25:43 Influences from teachers in the past
27:05 What Terri is teaching today
28:58 What can be changed in technical education?
31:48 Empowering students to find their calling in the field
33:32 Why is it important to get involved in organizations?
37:20 Advice for a newcomer
 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Shakera Moreland: LinkedIn | Podcast  Terri Orepeza: LinkedIn | Twitter 
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Living Security]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2432</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>176</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 175 - Deep into the Attacking Mindset with Maxie Reynolds</title>
        <itunes:title>Episode 175 - Deep into the Attacking Mindset with Maxie Reynolds</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-175-deep-into-the-attacking-mindset-with-maxie-reynolds/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-175-deep-into-the-attacking-mindset-with-maxie-reynolds/#comments</comments>        <pubDate>Mon, 11 Oct 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ade73691-cceb-3fb3-a04c-5bc9b6cd4cbd</guid>
                                    <description><![CDATA[<p>Maxie Reynolds is the author of The Art of Attack, subsea engineer and R.O.V. Pilot with an interesting perspective on offense. She is an expert in understanding the mindset of an attacker and using that to mold a communicative, responsive group of blue and red professionals in the constantly-evolving cyber security playground. Join Chris, Ron and Maxie as they dive into why shifting your mindset could be the determinant for understanding an attacker's motives and next moves.</p>
<p>Key Takeaways:</p>
<p>03:15 Bio</p>
<p>07:30 Same attacker mindset, just a different application</p>
<p>09:36 The mindset of an attacker; molding and shifting perspective</p>
<p>11:10 Encouraging curiosity - diving deep in Maxie’s past</p>
<p>14:22 Challenges with writing a book</p>
<p>17:50 Future predictions in cyber security</p>
<p>23:23 Why underwater?</p>
<p>26:38 The importance of observation and how to do it well</p>
<p>29:25 Defense should know about offense</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Maxie Reynolds: <a href='https://theamsbook.com/'>Book</a> | <a href='https://twitter.com/MaxieReynolds?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://www.instagram.com/maxie.reynolds/?hl=en'>Instagram</a> | <a href='https://www.linkedin.com/in/maxiereynolds'>Linkedin</a> | <a href='https://theamsbook.com/podcast'>Podcast</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Maxie Reynolds is the author of The Art of Attack, subsea engineer and R.O.V. Pilot with an interesting perspective on offense. She is an expert in understanding the mindset of an attacker and using that to mold a communicative, responsive group of blue and red professionals in the constantly-evolving cyber security playground. Join Chris, Ron and Maxie as they dive into why shifting your mindset could be the determinant for understanding an attacker's motives and next moves.</p>
<p>Key Takeaways:</p>
<p>03:15 Bio</p>
<p>07:30 Same attacker mindset, just a different application</p>
<p>09:36 The mindset of an attacker; molding and shifting perspective</p>
<p>11:10 Encouraging curiosity - diving deep in Maxie’s past</p>
<p>14:22 Challenges with writing a book</p>
<p>17:50 Future predictions in cyber security</p>
<p>23:23 Why underwater?</p>
<p>26:38 The importance of observation and how to do it well</p>
<p>29:25 Defense should know about offense</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Maxie Reynolds: <a href='https://theamsbook.com/'>Book</a> | <a href='https://twitter.com/MaxieReynolds?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor'>Twitter</a> | <a href='https://www.instagram.com/maxie.reynolds/?hl=en'>Instagram</a> | <a href='https://www.linkedin.com/in/maxiereynolds'>Linkedin</a> | <a href='https://theamsbook.com/podcast'>Podcast</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7zg6jy/Maxie_Reynoldsv276x4v.mp3" length="28914916" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Maxie Reynolds is the author of The Art of Attack, subsea engineer and R.O.V. Pilot with an interesting perspective on offense. She is an expert in understanding the mindset of an attacker and using that to mold a communicative, responsive group of blue and red professionals in the constantly-evolving cyber security playground. Join Chris, Ron and Maxie as they dive into why shifting your mindset could be the determinant for understanding an attacker's motives and next moves.
Key Takeaways:
03:15 Bio
07:30 Same attacker mindset, just a different application
09:36 The mindset of an attacker; molding and shifting perspective
11:10 Encouraging curiosity - diving deep in Maxie’s past
14:22 Challenges with writing a book
17:50 Future predictions in cyber security
23:23 Why underwater?
26:38 The importance of observation and how to do it well
29:25 Defense should know about offense
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Maxie Reynolds: Book | Twitter | Instagram | Linkedin | Podcast
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Living Security]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1807</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>175</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 174 - Don‘t Do It For The Grammys with Tre Nagella</title>
        <itunes:title>Episode 174 - Don‘t Do It For The Grammys with Tre Nagella</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-174-don-t-do-it-for-the-grammys-with-tre-nagella/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-174-don-t-do-it-for-the-grammys-with-tre-nagella/#comments</comments>        <pubDate>Thu, 07 Oct 2021 08:49:50 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/edb0d4fb-0a88-3d47-9fa0-d1f9964cd7ba</guid>
                                    <description><![CDATA[<p>Tre Nagella is a 3x grammy award-winning studio engineer, record mixer and music producer. With decades of experience in music, he started his studio in Dallas, Texas and has flourished as a craftsperson and leader. Serving clients like Kirk Franklin, Christina Aguilera, and contributing to several blockbusters, such as “The Hate You Give” and “Hidden Figures”, Tre knows a thing or two about what it takes to become a skilled craftsperson. Listen as Tre, Chris and Ron present a masterclass in all things art.</p>
<p>Key Takeaways:</p>
<p>02:47 Bio</p>
<p>04:20 The choice inn music- what was the reason? How did you do it?</p>
<p>07:35 Patience, humility and learning</p>
<p>08:30 Finding your own flow and following no rules</p>
<p>10:54 Lady Gaga, Snoop Dogg…..Kanye?!</p>
<p>14:00 Security & Music; Keeping up with the times</p>
<p>16:52 Passion + discipline = success</p>
<p>19:54 You don’t have to motivate passionate people</p>
<p>21:40 Get in touch with Tre!</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Tre Nagella : <a href='https://www.trenagella.com/'>Website</a> | <a href='https://www.instagram.com/tredanger/?hl=en'>Instagram</a> Luminous Sound: <a href='https://luminoussound.com/about/'>Website</a> | <a href='https://www.instagram.com/luminoussound/'>Instagram</a> | <a href='https://www.facebook.com/Luminous-Sound-118076174889761/'>Facebook</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>This episode is sponsored by <a href='http://www.axonius.com'>Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Tre Nagella is a 3x grammy award-winning studio engineer, record mixer and music producer. With decades of experience in music, he started his studio in Dallas, Texas and has flourished as a craftsperson and leader. Serving clients like Kirk Franklin, Christina Aguilera, and contributing to several blockbusters, such as “The Hate You Give” and “Hidden Figures”, Tre knows a thing or two about what it takes to become a skilled craftsperson. Listen as Tre, Chris and Ron present a masterclass in all things art.</p>
<p>Key Takeaways:</p>
<p>02:47 Bio</p>
<p>04:20 The choice inn music- what was the reason? How did you do it?</p>
<p>07:35 Patience, humility and learning</p>
<p>08:30 Finding your own flow and following no rules</p>
<p>10:54 Lady Gaga, Snoop Dogg…..Kanye?!</p>
<p>14:00 Security & Music; Keeping up with the times</p>
<p>16:52 Passion + discipline = success</p>
<p>19:54 You don’t have to motivate passionate people</p>
<p>21:40 Get in touch with Tre!</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Tre Nagella : <a href='https://www.trenagella.com/'>Website</a> | <a href='https://www.instagram.com/tredanger/?hl=en'>Instagram</a> Luminous Sound: <a href='https://luminoussound.com/about/'>Website</a> | <a href='https://www.instagram.com/luminoussound/'>Instagram</a> | <a href='https://www.facebook.com/Luminous-Sound-118076174889761/'>Facebook</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>This episode is sponsored by <a href='http://www.axonius.com'>Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xrpjk6/Tre_Nagalla815rb.mp3" length="53988500" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Tre Nagella is a 3x grammy award-winning studio engineer, record mixer and music producer. With decades of experience in music, he started his studio in Dallas, Texas and has flourished as a craftsperson and leader. Serving clients like Kirk Franklin, Christina Aguilera, and contributing to several blockbusters, such as “The Hate You Give” and “Hidden Figures”, Tre knows a thing or two about what it takes to become a skilled craftsperson. Listen as Tre, Chris and Ron present a masterclass in all things art.
Key Takeaways:
02:47 Bio
04:20 The choice inn music- what was the reason? How did you do it?
07:35 Patience, humility and learning
08:30 Finding your own flow and following no rules
10:54 Lady Gaga, Snoop Dogg…..Kanye?!
14:00 Security & Music; Keeping up with the times
16:52 Passion + discipline = success
19:54 You don’t have to motivate passionate people
21:40 Get in touch with Tre!
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Tre Nagella : Website | Instagram Luminous Sound: Website | Instagram | Facebook
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1349</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>174</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 173 - Laughing your Cyber Off with Ian Murphy</title>
        <itunes:title>Episode 173 - Laughing your Cyber Off with Ian Murphy</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-173-laughing-your-cyber-off-with-ian-murphy/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-173-laughing-your-cyber-off-with-ian-murphy/#comments</comments>        <pubDate>Tue, 05 Oct 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9a520834-6bae-3cf4-87dd-1e16993bb9fd</guid>
                                    <description><![CDATA[<p class="p1">This week, join Ron and Chris as they sit down for a raw conversation with Ian Murphy. Ian is a game-changing pioneer in cyber training resourcing, adding spice to a dull, outdated training market. His company, CyberOff, is the “antidote for dull cyber training.” The three dive deep into topics like comedy, creating and sourcing content, being vulnerable and the reason for it all.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">02:44 This is Rock n’ Roll</p>
<p class="p1"> 03:04 Bio</p>
<p class="p1">4:00 Content- where does it originate?</p>
<p class="p1">06:43 What is it like to be an entrepreneur in cyber?</p>
<p class="p1">08:20 Where does Ian draw the line?</p>
<p class="p1">11:55 What makes comedy? Chris and Ian deliberate</p>
<p class="p1">15:36 Working on vulnerability</p>
<p class="p1">17:23 Ian’s approach- Where did we go wrong in teaching?</p>
<p class="p1">20:31 The end goal</p>
<p class="p1">23:35 The most “popular” form </p>
<p class="p1">28:09 Ian’s inspiration</p>
<p class="p2"> </p>
<p class="p3"> </p>
<p class="p4">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p4">Ian Murphy: <a href='https://www.linkedin.com/in/ianmurphy/?originalSubdomain=uk'>LinkedIn</a> | <a href='https://twitter.com/cyberianuk?lang=en'>Twitter</a> | <a href='mailto:ian@cyberoff.co.uk'>Email</a> | <a href='https://www.cyberoff.co.uk/'>Website</a></p>
<p class="p5">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p5">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p5">This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This week, join Ron and Chris as they sit down for a raw conversation with Ian Murphy. Ian is a game-changing pioneer in cyber training resourcing, adding spice to a dull, outdated training market. His company, CyberOff, is the “antidote for dull cyber training.” The three dive deep into topics like comedy, creating and sourcing content, being vulnerable and the reason for it all.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">02:44 This is Rock n’ Roll</p>
<p class="p1"> 03:04 Bio</p>
<p class="p1">4:00 Content- where does it originate?</p>
<p class="p1">06:43 What is it like to be an entrepreneur in cyber?</p>
<p class="p1">08:20 Where does Ian draw the line?</p>
<p class="p1">11:55 What makes comedy? Chris and Ian deliberate</p>
<p class="p1">15:36 Working on vulnerability</p>
<p class="p1">17:23 Ian’s approach- Where did we go wrong in teaching?</p>
<p class="p1">20:31 The end goal</p>
<p class="p1">23:35 The most “popular” form </p>
<p class="p1">28:09 Ian’s inspiration</p>
<p class="p2"> </p>
<p class="p3"> </p>
<p class="p4">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p4">Ian Murphy: <a href='https://www.linkedin.com/in/ianmurphy/?originalSubdomain=uk'>LinkedIn</a> | <a href='https://twitter.com/cyberianuk?lang=en'>Twitter</a> | <a href='mailto:ian@cyberoff.co.uk'>Email</a> | <a href='https://www.cyberoff.co.uk/'>Website</a></p>
<p class="p5">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p5">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p5">This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3thgbr/Ian_Murphyarnnl.mp3" length="84527588" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This week, join Ron and Chris as they sit down for a raw conversation with Ian Murphy. Ian is a game-changing pioneer in cyber training resourcing, adding spice to a dull, outdated training market. His company, CyberOff, is the “antidote for dull cyber training.” The three dive deep into topics like comedy, creating and sourcing content, being vulnerable and the reason for it all.
 
Key Takeaways:
 
02:44 This is Rock n’ Roll
 03:04 Bio
4:00 Content- where does it originate?
06:43 What is it like to be an entrepreneur in cyber?
08:20 Where does Ian draw the line?
11:55 What makes comedy? Chris and Ian deliberate
15:36 Working on vulnerability
17:23 Ian’s approach- Where did we go wrong in teaching?
20:31 The end goal
23:35 The most “popular” form 
28:09 Ian’s inspiration
 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Ian Murphy: LinkedIn | Twitter | Email | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Living Security]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2113</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>173</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>QuickQ: What the Heck is Going on with Ransomware?</title>
        <itunes:title>QuickQ: What the Heck is Going on with Ransomware?</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/quickqwhat-the-heck-is-going-on-with-ransomware/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/quickqwhat-the-heck-is-going-on-with-ransomware/#comments</comments>        <pubDate>Thu, 30 Sep 2021 08:56:47 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6b22ecbf-d23e-3a78-9b35-a0dbca10ec3a</guid>
                                    <description><![CDATA[<p class="p1">The average ransomware cost is $312,493. <a href='https://www.varonis.com/blog/ransomware-statistics-2021/'>That number has increased 171% compared 2019.</a> Why does it still work? What we have to do to stop it? How, in 2021, can a criminal organization have a customer service division? Yes, that’s right, customer service. Join Ron and Chris for this ransomware discussion. </p>
<p class="p2"> </p>
<p class="p1">Note: After additional research we discovered that an investigation determined that the woman that lost her life, did not die due to the ransomware and would have perished regardless of the attack. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">00:57 What is ransomware?</p>
<p class="p1">02:39 Who gets attacked?</p>
<p class="p1">04:53 Criminal service with customer service</p>
<p class="p1">07:43 The history of Ransomware</p>
<p class="p1">11:45 Immutable</p>
<p class="p1">14:40 Use 2-factor authentication!</p>
<p class="p1">16:32 Chris’ take on the future of ransomware</p>
<p class="p1">19:20 Ron’s future predictions</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='https://www.axonius.com/'>Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">The average ransomware cost is $312,493. <a href='https://www.varonis.com/blog/ransomware-statistics-2021/'>That number has increased 171% compared 2019.</a> Why does it still work? What we have to do to stop it? How, in 2021, can a criminal organization have a customer service division? Yes, that’s right, customer service. Join Ron and Chris for this ransomware discussion. </p>
<p class="p2"> </p>
<p class="p1">Note: After additional research we discovered that an investigation determined that the woman that lost her life, did not die due to the ransomware and would have perished regardless of the attack. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">00:57 What is ransomware?</p>
<p class="p1">02:39 Who gets attacked?</p>
<p class="p1">04:53 Criminal service with customer service</p>
<p class="p1">07:43 The history of Ransomware</p>
<p class="p1">11:45 Immutable</p>
<p class="p1">14:40 Use 2-factor authentication!</p>
<p class="p1">16:32 Chris’ take on the future of ransomware</p>
<p class="p1">19:20 Ron’s future predictions</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='https://www.axonius.com/'>Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jpuece/R_C_What_is_Ransomware6dd6b.mp3" length="52432940" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The average ransomware cost is $312,493. That number has increased 171% compared 2019. Why does it still work? What we have to do to stop it? How, in 2021, can a criminal organization have a customer service division? Yes, that’s right, customer service. Join Ron and Chris for this ransomware discussion. 
 
Note: After additional research we discovered that an investigation determined that the woman that lost her life, did not die due to the ransomware and would have perished regardless of the attack. 
 
Key Takeaways:
00:57 What is ransomware?
02:39 Who gets attacked?
04:53 Criminal service with customer service
07:43 The history of Ransomware
11:45 Immutable
14:40 Use 2-factor authentication!
16:32 Chris’ take on the future of ransomware
19:20 Ron’s future predictions
 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1310</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>172</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 171 - Resilient Mindset with Chris Hughes</title>
        <itunes:title>Episode 171 - Resilient Mindset with Chris Hughes</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-172-resilient-mindset-with-chris-hughes/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-172-resilient-mindset-with-chris-hughes/#comments</comments>        <pubDate>Tue, 28 Sep 2021 09:15:29 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/fe9a1c45-e9a3-34bc-8fc8-f59fe1329bc7</guid>
                                    <description><![CDATA[<p>Chris Hughes is the CISO and Co-Founder of Aquia and has nearly 20 years of Cyber/IT experience. He's an Air Force veteran as well as former Government civil service employee with the U.S. Navy and FedRAMP. Chris also teaches in two M.S. Cyber Programs at Capitol Technology University and UMGC. Chris is passionate about Cloud Security and is active with the Cloud Security Alliance and Cloud Native Computing Foundation and he also hosts a podcast called "Resilient Cyber".</p>
<p>Key Takeaways:</p>
<p>02:52 Bio</p>
<p>04:24 What motivates Chris?</p>
<p>06:03 Time management</p>
<p>07:24 Failing up – lessons learned</p>
<p>09:09 Habits and mindset</p>
<p>10:59 Chris’ podcast – Resilient Cyber</p>
<p>13:09 Branding & persona – using your vulnerability</p>
<p>15:07 Using your network</p>
<p>19:06 Stop waiting and start working harder</p>
<p>20:40 Maintaining authenticity</p>
<p>22:22 Input vs. Output</p>
<p>25:13 Talking Legacy</p>
<p>28:12 Being resilient</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Chris Hughes: <a href='https://www.linkedin.com/in/chris-h-97680442/'>Linkedin</a> | <a href='https://podcasts.apple.com/us/podcast/resilient-cyber/id1555928024'>Podcast</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Chris Hughes is the CISO and Co-Founder of Aquia and has nearly 20 years of Cyber/IT experience. He's an Air Force veteran as well as former Government civil service employee with the U.S. Navy and FedRAMP. Chris also teaches in two M.S. Cyber Programs at Capitol Technology University and UMGC. Chris is passionate about Cloud Security and is active with the Cloud Security Alliance and Cloud Native Computing Foundation and he also hosts a podcast called "Resilient Cyber".</p>
<p>Key Takeaways:</p>
<p>02:52 Bio</p>
<p>04:24 What motivates Chris?</p>
<p>06:03 Time management</p>
<p>07:24 Failing up – lessons learned</p>
<p>09:09 Habits and mindset</p>
<p>10:59 Chris’ podcast – Resilient Cyber</p>
<p>13:09 Branding & persona – using your vulnerability</p>
<p>15:07 Using your network</p>
<p>19:06 Stop waiting and start working harder</p>
<p>20:40 Maintaining authenticity</p>
<p>22:22 Input vs. Output</p>
<p>25:13 Talking Legacy</p>
<p>28:12 Being resilient</p>
<p>Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p>Chris Hughes: <a href='https://www.linkedin.com/in/chris-h-97680442/'>Linkedin</a> | <a href='https://podcasts.apple.com/us/podcast/resilient-cyber/id1555928024'>Podcast</a></p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>This episode is sponsored by <a href='https://www.livingsecurity.com/'>Living Security</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mj337h/Chris_Hughes8v0b9.mp3" length="72692804" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Chris Hughes is the CISO and Co-Founder of Aquia and has nearly 20 years of Cyber/IT experience. He's an Air Force veteran as well as former Government civil service employee with the U.S. Navy and FedRAMP. Chris also teaches in two M.S. Cyber Programs at Capitol Technology University and UMGC. Chris is passionate about Cloud Security and is active with the Cloud Security Alliance and Cloud Native Computing Foundation and he also hosts a podcast called "Resilient Cyber".
Key Takeaways:
02:52 Bio
04:24 What motivates Chris?
06:03 Time management
07:24 Failing up – lessons learned
09:09 Habits and mindset
10:59 Chris’ podcast – Resilient Cyber
13:09 Branding & persona – using your vulnerability
15:07 Using your network
19:06 Stop waiting and start working harder
20:40 Maintaining authenticity
22:22 Input vs. Output
25:13 Talking Legacy
28:12 Being resilient
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Chris Hughes: Linkedin | Podcast
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Living Security]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1817</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>171</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 170 - The Beauty of Cybersecurity with Grace Chi</title>
        <itunes:title>Episode 170 - The Beauty of Cybersecurity with Grace Chi</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-170-the-beauty-of-cybersecurity-with-grace-chi/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-170-the-beauty-of-cybersecurity-with-grace-chi/#comments</comments>        <pubDate>Tue, 21 Sep 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d4f241fe-4465-30ff-80da-0bf9f38b9921</guid>
                                    <description><![CDATA[<p class="p1">Grace is Cofounder and COO of Pulsedive, a US-based threat intelligence startup. At Pulsedive, Grace works closely with defensive security (and in particular, cyber threat intelligence) teams to support the development of integrated intelligence capabilities and programs. Join Chris, Ron and Grace as they discuss transitioning into cyber, finding the right community to support your personality, and the beauty and purpose behind it all – as a creative in cybersecurity.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">01:46 Bio</p>
<p class="p1">02:46 Creativity & cyber</p>
<p class="p1">07:34 How does modeling help Grace’s career in cybersecurity? </p>
<p class="p1">09:37 The beauty in cybersecurity</p>
<p class="p1">14:38 Making the transition with no experience</p>
<p class="p1">17:27 What’s the greater purpose? How do you mesh your personality into your career?</p>
<p class="p1">20:51 Grace’s ideas for continuing to level the playing field regarding transitioning into cyber</p>
<p class="p1">23:19 Humanity in cybersecurity</p>
<p class="p1">28:32 Understanding how to find the beauty in cyber</p>
<p class="p1">31:42 Get in touch with Grace Chi</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Grace Chi: <a href='https://www.linkedin.com/in/graceschi/'>LinkedIn</a> | <a href='https://twitter.com/euphoricfall?lang=en'>Twitter </a></p>
<p class="p3">Pulsedive: <a href='https://twitter.com/pulsedive?lang=en'>Twitter</a> | <a href='https://www.linkedin.com/company/pulsedive/'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='http://livingsecurity.com/'>livingsecurity.com</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Grace is Cofounder and COO of Pulsedive, a US-based threat intelligence startup. At Pulsedive, Grace works closely with defensive security (and in particular, cyber threat intelligence) teams to support the development of integrated intelligence capabilities and programs. Join Chris, Ron and Grace as they discuss transitioning into cyber, finding the right community to support your personality, and the beauty and purpose behind it all – as a creative in cybersecurity.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">01:46 Bio</p>
<p class="p1">02:46 Creativity & cyber</p>
<p class="p1">07:34 How does modeling help Grace’s career in cybersecurity? </p>
<p class="p1">09:37 The beauty in cybersecurity</p>
<p class="p1">14:38 Making the transition with no experience</p>
<p class="p1">17:27 What’s the greater purpose? How do you mesh your personality into your career?</p>
<p class="p1">20:51 Grace’s ideas for continuing to level the playing field regarding transitioning into cyber</p>
<p class="p1">23:19 Humanity in cybersecurity</p>
<p class="p1">28:32 Understanding <em>how</em> to find the beauty in cyber</p>
<p class="p1">31:42 Get in touch with Grace Chi</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Grace Chi: <a href='https://www.linkedin.com/in/graceschi/'>LinkedIn</a> | <a href='https://twitter.com/euphoricfall?lang=en'>Twitter </a></p>
<p class="p3">Pulsedive: <a href='https://twitter.com/pulsedive?lang=en'>Twitter</a> | <a href='https://www.linkedin.com/company/pulsedive/'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='http://livingsecurity.com/'>livingsecurity.com</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qmmb2i/Grace_Chibvgzf.mp3" length="80837048" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Grace is Cofounder and COO of Pulsedive, a US-based threat intelligence startup. At Pulsedive, Grace works closely with defensive security (and in particular, cyber threat intelligence) teams to support the development of integrated intelligence capabilities and programs. Join Chris, Ron and Grace as they discuss transitioning into cyber, finding the right community to support your personality, and the beauty and purpose behind it all – as a creative in cybersecurity.
 
Key Takeaways:
01:46 Bio
02:46 Creativity & cyber
07:34 How does modeling help Grace’s career in cybersecurity? 
09:37 The beauty in cybersecurity
14:38 Making the transition with no experience
17:27 What’s the greater purpose? How do you mesh your personality into your career?
20:51 Grace’s ideas for continuing to level the playing field regarding transitioning into cyber
23:19 Humanity in cybersecurity
28:32 Understanding how to find the beauty in cyber
31:42 Get in touch with Grace Chi
 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Grace Chi: LinkedIn | Twitter 
Pulsedive: Twitter | LinkedIn
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by livingsecurity.com]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2020</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>170</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 169 - Art, Science, and Nanotechnology with Dr. Bahijja Raimi-Abraham</title>
        <itunes:title>Episode 169 - Art, Science, and Nanotechnology with Dr. Bahijja Raimi-Abraham</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-169-art-science-and-nanotechnology-with-dr-bahijja-raimi-abraham/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-169-art-science-and-nanotechnology-with-dr-bahijja-raimi-abraham/#comments</comments>        <pubDate>Tue, 14 Sep 2021 05:44:43 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/97187eb9-b4ad-327c-b4c7-eb033dadbfe8</guid>
                                    <description><![CDATA[<p class="p1">Among other things, Dr. Bahijja Raimi-Abraham is an award-winning researcher, lecturer and trailblazer in the world of nanotechnology. She also hosts a podcast called Monday Science, keeping listeners updated on the latest in tech, science, health and their relationship. She joins hosts Ron and Chris for a jam packed episode, where they cover nanotechnology, biohacking, the vast world of academia and much more. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">02:30 Bio</p>
<p class="p1">04:52 The origin story: combining science and art</p>
<p class="p1">09:40 Nanotechnology: what’s the latest, and where is the science headed?</p>
<p class="p1">16:00 Biohacking?</p>
<p class="p1">18:00 How does nanotechnology communicate?</p>
<p class="p1">23:34 The path to Academia: how do you find yours?</p>
<p class="p1">29:45 A message to the multi-talanted; knowing yourself, your strengths and Identifying the need</p>
<p class="p1">33:30 Get in touch with Bahijja Raimi-Abraham</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Bahijja Raimi-Abraham: <a href='https://twitter.com/drbahijjaraimia?lang=en'>Twitter</a> | <a href='https://www.linkedin.com/in/bahijjaraimiabraham/'>LInkedin</a> | <a href='https://www.theraimiabrahamgroup.com/'>Website</a> | <a href='https://www.mondaysciencepodcast.com/'>Podcast</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='http://livingsecurity.com/'>livingsecurity.com</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Among other things, Dr. Bahijja Raimi-Abraham is an award-winning researcher, lecturer and trailblazer in the world of nanotechnology. She also hosts a podcast called Monday Science, keeping listeners updated on the latest in tech, science, health and their relationship. She joins hosts Ron and Chris for a jam packed episode, where they cover nanotechnology, biohacking, the vast world of academia and much more. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">02:30 Bio</p>
<p class="p1">04:52 The origin story: combining science and art</p>
<p class="p1">09:40 Nanotechnology: what’s the latest, and where is the science headed?</p>
<p class="p1">16:00 Biohacking?</p>
<p class="p1">18:00 How does nanotechnology communicate?</p>
<p class="p1">23:34 The path to Academia: how do you find yours?</p>
<p class="p1">29:45 A message to the multi-talanted; knowing yourself, your strengths and Identifying the need</p>
<p class="p1">33:30 Get in touch with Bahijja Raimi-Abraham</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Bahijja Raimi-Abraham: <a href='https://twitter.com/drbahijjaraimia?lang=en'>Twitter</a> | <a href='https://www.linkedin.com/in/bahijjaraimiabraham/'>LInkedin</a> | <a href='https://www.theraimiabrahamgroup.com/'>Website</a> | <a href='https://www.mondaysciencepodcast.com/'>Podcast</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='http://livingsecurity.com/'>livingsecurity.com</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4jssaa/Bahijja_Raimi-Abraham8h066.mp3" length="84267632" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Among other things, Dr. Bahijja Raimi-Abraham is an award-winning researcher, lecturer and trailblazer in the world of nanotechnology. She also hosts a podcast called Monday Science, keeping listeners updated on the latest in tech, science, health and their relationship. She joins hosts Ron and Chris for a jam packed episode, where they cover nanotechnology, biohacking, the vast world of academia and much more. 
 
Key Takeaways:
02:30 Bio
04:52 The origin story: combining science and art
09:40 Nanotechnology: what’s the latest, and where is the science headed?
16:00 Biohacking?
18:00 How does nanotechnology communicate?
23:34 The path to Academia: how do you find yours?
29:45 A message to the multi-talanted; knowing yourself, your strengths and Identifying the need
33:30 Get in touch with Bahijja Raimi-Abraham
 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Bahijja Raimi-Abraham: Twitter | LInkedin | Website | Podcast
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by livingsecurity.com]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2106</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>169</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 168 - Asking the Right Cybersecurity Questions with Ganesh Pai</title>
        <itunes:title>Episode 168 - Asking the Right Cybersecurity Questions with Ganesh Pai</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-168-asking-the-right-cybersecurity-questions-with-ganesh-pai/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-168-asking-the-right-cybersecurity-questions-with-ganesh-pai/#comments</comments>        <pubDate>Thu, 09 Sep 2021 05:40:59 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/0ac2d8c4-ec43-34ec-92c2-37e75c733f15</guid>
                                    <description><![CDATA[<p class="p1">Hacker Valley's Hosts, Ron and Chris are speaking with Ganesh Pai, the CEO and founder of Uptycs. What is it like to be an entrepreneur in the Cybersecurity field? While learning how Ganesh started Uptycs, learn of the techniques that he uses, such as asking the right questions and using different systems to further understand security software.</p>
<p class="p2">Key Takeaways:</p>
<p class="p2">01:42 Introducing Ganesh Pai. </p>
<p class="p2">02:30 Learning Ganesh's Background and his journey in entrepreneurship.</p>
<p class="p2">06:20 The Query System. </p>
<p class="p2">07:00 What is your professional Superpower? What time was that Evident? </p>
<p class="p2">07:1 Understanding the technology, working and interacting with others in the field. </p>
<p class="p2">10:45 Proactive and Reactive security. </p>
<p class="p2">12:00 How to ask the right questions. </p>
<p class="p2">14:10 Where does artificial intelligence play a part in Cyber Security.</p>
<p class="p2">19:00 Challenges Ganesh has faced in the workplace during COVID and the challenges and changes it poses.</p>
<p class="p2">20:20 Adapting to the evolving businesses and communities in a changing environment. </p>
<p class="p2">24:00 Helpful Habits </p>
<p class="p2">27:11 Last Advice</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p2">Ganesh Pai: <a href='https://www.linkedin.com/in/ganesh-pai'>LinkedIn</a> | <a href='https://www.uptycs.com/'>Uptycs</a></p>
<p class="p2">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p2">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='https://www.uptycs.com/'>Uptycs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Hacker Valley's Hosts, Ron and Chris are speaking with Ganesh Pai, the CEO and founder of Uptycs. What is it like to be an entrepreneur in the Cybersecurity field? While learning how Ganesh started Uptycs, learn of the techniques that he uses, such as asking the right questions and using different systems to further understand security software.</p>
<p class="p2">Key Takeaways:</p>
<p class="p2">01:42 Introducing Ganesh Pai. </p>
<p class="p2">02:30 Learning Ganesh's Background and his journey in entrepreneurship.</p>
<p class="p2">06:20 The Query System. </p>
<p class="p2">07:00 What is your professional Superpower? What time was that Evident? </p>
<p class="p2">07:1 Understanding the technology, working and interacting with others in the field. </p>
<p class="p2">10:45 Proactive and Reactive security. </p>
<p class="p2">12:00 How to ask the right questions. </p>
<p class="p2">14:10 Where does artificial intelligence play a part in Cyber Security.</p>
<p class="p2">19:00 Challenges Ganesh has faced in the workplace during COVID and the challenges and changes it poses.</p>
<p class="p2">20:20 Adapting to the evolving businesses and communities in a changing environment. </p>
<p class="p2">24:00 Helpful Habits </p>
<p class="p2">27:11 Last Advice</p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p2">Ganesh Pai: <a href='https://www.linkedin.com/in/ganesh-pai'>LinkedIn</a> | <a href='https://www.uptycs.com/'>Uptycs</a></p>
<p class="p2">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p2">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">This episode is sponsored by <a href='https://www.uptycs.com/'>Uptycs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/udenei/Ganesh_Pai8iddu.mp3" length="73391240" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hacker Valley's Hosts, Ron and Chris are speaking with Ganesh Pai, the CEO and founder of Uptycs. What is it like to be an entrepreneur in the Cybersecurity field? While learning how Ganesh started Uptycs, learn of the techniques that he uses, such as asking the right questions and using different systems to further understand security software.
Key Takeaways:
01:42 Introducing Ganesh Pai. 
02:30 Learning Ganesh's Background and his journey in entrepreneurship.
06:20 The Query System. 
07:00 What is your professional Superpower? What time was that Evident? 
07:1 Understanding the technology, working and interacting with others in the field. 
10:45 Proactive and Reactive security. 
12:00 How to ask the right questions. 
14:10 Where does artificial intelligence play a part in Cyber Security.
19:00 Challenges Ganesh has faced in the workplace during COVID and the challenges and changes it poses.
20:20 Adapting to the evolving businesses and communities in a changing environment. 
24:00 Helpful Habits 
27:11 Last Advice
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Ganesh Pai: LinkedIn | Uptycs
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by Uptycs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1834</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>168</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 167 - Fun Versus ”FUD” Security with Ashley Rose</title>
        <itunes:title>Episode 167 - Fun Versus ”FUD” Security with Ashley Rose</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-167-fun-versus-fud-security-with-ashley-rose/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-167-fun-versus-fud-security-with-ashley-rose/#comments</comments>        <pubDate>Tue, 07 Sep 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e3d951fa-9e07-3b18-b085-79efa5064487</guid>
                                    <description><![CDATA[<p class="p1">In today's episode Ron and Chris talk to Living Security's CEO and Co-Founder Ashley Rose, speaking on breaking the mold in the workspace and how allowing your team to have fun with what they do will create a stronger, happier and healthier work environment. Tune in to find out why, and also to get a better understanding of why Living Security is a must-have resource. </p>
<p class="p2"> </p>
<p class="p1">01:10 Listeners are introduced to the topic of today's episode</p>
<p class="p1">02:10 We meet Ashley Rose and discover her role in cybersecurity</p>
<p class="p1">04:30 Ashley's background before cybersecurity </p>
<p class="p1">08:45 How she incorporated fun into training in the workplace </p>
<p class="p1">16:37 Training based off of an individual's unique learning technique</p>
<p class="p1">19:52 How the brain activity reacts when having fun, and why that matters</p>
<p class="p1">24:00 Interactive learning styles to keep someone captivated</p>
<p class="p1">27:52 Ashley speaks on what inspires her and her team to maintain a fun, healthy and inclusive environment for everyone</p>
<p class="p1">32:28 Discussing how to get out of the FUD: Fear, Uncertainty, and Doubt and to genuinely enjoy what you do. </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Ashley Rose:  <a href='http://livingsecurity.com/'>livingsecurity.com</a> | <a href='https://www.linkedin.com/in/ashley-m-rose'>LinkedIn</a> | <a href='https://twitter.com/AshleyRose_ATX'>Twitter</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by <a href='http://livingsecurity.com/'>livingsecurity.com</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In today's episode Ron and Chris talk to Living Security's CEO and Co-Founder Ashley Rose, speaking on breaking the mold in the workspace and how allowing your team to have fun with what they do will create a stronger, happier and healthier work environment. Tune in to find out why, and also to get a better understanding of why Living Security is a must-have resource. </p>
<p class="p2"> </p>
<p class="p1">01:10 Listeners are introduced to the topic of today's episode</p>
<p class="p1">02:10 We meet Ashley Rose and discover her role in cybersecurity</p>
<p class="p1">04:30 Ashley's background before cybersecurity </p>
<p class="p1">08:45 How she incorporated fun into training in the workplace </p>
<p class="p1">16:37 Training based off of an individual's unique learning technique</p>
<p class="p1">19:52 How the brain activity reacts when having fun, and why that matters</p>
<p class="p1">24:00 Interactive learning styles to keep someone captivated</p>
<p class="p1">27:52 Ashley speaks on what inspires her and her team to maintain a fun, healthy and inclusive environment for everyone</p>
<p class="p1">32:28 Discussing how to get out of the FUD: Fear, Uncertainty, and Doubt and to genuinely enjoy what you do. </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Ashley Rose:  <a href='http://livingsecurity.com/'>livingsecurity.com</a> | <a href='https://www.linkedin.com/in/ashley-m-rose'>LinkedIn</a> | <a href='https://twitter.com/AshleyRose_ATX'>Twitter</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p4">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">This episode is sponsored by <a href='http://livingsecurity.com/'>livingsecurity.com</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/tuzjbu/Ashley_Rose9ujvr.mp3" length="84925352" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In today's episode Ron and Chris talk to Living Security's CEO and Co-Founder Ashley Rose, speaking on breaking the mold in the workspace and how allowing your team to have fun with what they do will create a stronger, happier and healthier work environment. Tune in to find out why, and also to get a better understanding of why Living Security is a must-have resource. 
 
01:10 Listeners are introduced to the topic of today's episode
02:10 We meet Ashley Rose and discover her role in cybersecurity
04:30 Ashley's background before cybersecurity 
08:45 How she incorporated fun into training in the workplace 
16:37 Training based off of an individual's unique learning technique
19:52 How the brain activity reacts when having fun, and why that matters
24:00 Interactive learning styles to keep someone captivated
27:52 Ashley speaks on what inspires her and her team to maintain a fun, healthy and inclusive environment for everyone
32:28 Discussing how to get out of the FUD: Fear, Uncertainty, and Doubt and to genuinely enjoy what you do. 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Ashley Rose:  livingsecurity.com | LinkedIn | Twitter
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
This episode is sponsored by livingsecurity.com]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2123</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>167</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 166 - There is No Skills Gap with Andy Ellis</title>
        <itunes:title>Episode 166 - There is No Skills Gap with Andy Ellis</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-166-there-is-no-skills-gap-with-andy-ellis/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-166-there-is-no-skills-gap-with-andy-ellis/#comments</comments>        <pubDate>Tue, 31 Aug 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/94885e4b-62d5-3d13-a189-87b5ad5e17d6</guid>
                                    <description><![CDATA[<p class="p1">Hosts Ron and Chris interview Andy Ellis, CISO for over two decades that recently started a startup. He is an operating partner at YL Ventures. Andy shares his perspective on whether there is really a skills gap or are we approaching this problem the wrong way?</p>
<p class="p1"> </p>
<p class="p1">0:57 – Intro </p>
<p class="p1">2:19 – Bio</p>
<p class="p1">3:12 – Andy’s personality that puts him in unique situations to win awards </p>
<p class="p1">4:29 – What other kind of things Andy experienced hacking in besides macro things</p>
<p class="p1">5:57 – The number one hack Andy did that spanned for a decade in his career</p>
<p class="p1">7:13 – Was Andy originally hired to do security for companies?</p>
<p class="p1">8:29 – Why Andy says there is no talent shortage</p>
<p class="p1">12:11 – If everyone started to go into security engineering team, would there be a gap to fill roles?</p>
<p class="p1">13:09 – Where did CISOS, managers, and recruiters go wrong in looking for security professionals?</p>
<p class="p1">19:55 – Andy’s number one tenet for leadership</p>
<p class="p1">22:42 –Andy’s philosophies on keeping the talent after investing on training programs, and having skills that can be used on other areas</p>
<p class="p1">24:49 – In what ways Andy is passing down knowledge</p>
<p class="p1">27:14 – Advice on the leadership journey that Andy gives to listeners</p>
<p class="p1">28::10 – Best ways to keep up with Andy</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Follow Andy Ellis <a href='https://twitter.com/csoandy'>Twitter</a> | <a href='https://www.linkedin.com/in/csoandy/'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Visit our sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Hosts Ron and Chris interview Andy Ellis, CISO for over two decades that recently started a startup. He is an operating partner at YL Ventures. Andy shares his perspective on whether there is really a skills gap or are we approaching this problem the wrong way?</p>
<p class="p1"> </p>
<p class="p1">0:57 – Intro </p>
<p class="p1">2:19 – Bio</p>
<p class="p1">3:12 – Andy’s personality that puts him in unique situations to win awards </p>
<p class="p1">4:29 – What other kind of things Andy experienced hacking in besides macro things</p>
<p class="p1">5:57 – The number one hack Andy did that spanned for a decade in his career</p>
<p class="p1">7:13 – Was Andy originally hired to do security for companies?</p>
<p class="p1">8:29 – Why Andy says there is no talent shortage</p>
<p class="p1">12:11 – If everyone started to go into security engineering team, would there be a gap to fill roles?</p>
<p class="p1">13:09 – Where did CISOS, managers, and recruiters go wrong in looking for security professionals?</p>
<p class="p1">19:55 – Andy’s number one tenet for leadership</p>
<p class="p1">22:42 –Andy’s philosophies on keeping the talent after investing on training programs, and having skills that can be used on other areas</p>
<p class="p1">24:49 – In what ways Andy is passing down knowledge</p>
<p class="p1">27:14 – Advice on the leadership journey that Andy gives to listeners</p>
<p class="p1">28::10 – Best ways to keep up with Andy</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Follow Andy Ellis <a href='https://twitter.com/csoandy'>Twitter</a> | <a href='https://www.linkedin.com/in/csoandy/'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Visit our sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/trq7ef/Andy_Ellis5yo5h.mp3" length="69807188" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hosts Ron and Chris interview Andy Ellis, CISO for over two decades that recently started a startup. He is an operating partner at YL Ventures. Andy shares his perspective on whether there is really a skills gap or are we approaching this problem the wrong way?
 
0:57 – Intro 
2:19 – Bio
3:12 – Andy’s personality that puts him in unique situations to win awards 
4:29 – What other kind of things Andy experienced hacking in besides macro things
5:57 – The number one hack Andy did that spanned for a decade in his career
7:13 – Was Andy originally hired to do security for companies?
8:29 – Why Andy says there is no talent shortage
12:11 – If everyone started to go into security engineering team, would there be a gap to fill roles?
13:09 – Where did CISOS, managers, and recruiters go wrong in looking for security professionals?
19:55 – Andy’s number one tenet for leadership
22:42 –Andy’s philosophies on keeping the talent after investing on training programs, and having skills that can be used on other areas
24:49 – In what ways Andy is passing down knowledge
27:14 – Advice on the leadership journey that Andy gives to listeners
28::10 – Best ways to keep up with Andy
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Follow Andy Ellis Twitter | LinkedIn
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Visit our sponsor Panther Labs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1745</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>166</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 165 - Living Your Values with Dean Sysman</title>
        <itunes:title>Episode 165 - Living Your Values with Dean Sysman</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-165-living-your-values-with-dean-sysman/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-165-living-your-values-with-dean-sysman/#comments</comments>        <pubDate>Thu, 26 Aug 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/640c2eb0-09c3-35e7-9991-d368c3d1eecd</guid>
                                    <description><![CDATA[<p class="p1">On this episode, Hacker Valley Studio has a very big announcement! Hosts Ron and Chris interview guest Dean Sysman, CEO and co-founder of Axonius. </p>
<p class="p1">The values, and founder story of Dean are shared as Ron and Chris ask him very interesting questions. Dean started his journey years ago with a passion on how technology could impact the world. He has also brought many values to Axonius, helping people through growth to become a better version of themselves.</p>
<p class="p1">Dean shares how he figured that the determining factor of success was realizing the problem that the organization needs to solve, and focusing on the customer’s experience.</p>
<p class="p2"> </p>
<p class="p1">0:21 – Intro </p>
<p class="p1">1:53 – Bio</p>
<p class="p1">3:24 – Ron and Chris talk about their role in Axonius and Dean Sysman shares the value he saw in them</p>
<p class="p1">7:26 – Dean’s founder story in Axonius</p>
<p class="p1">13:01 – The values that Dean has brought to Axonius and people’s lives</p>
<p class="p1">16:42 – Dean’s turning point where he could no longer go back from where he was</p>
<p class="p1">23:31 – Why Dean wants Ron and Chris to be the voice of Axonius</p>
<p class="p1">26:01 – Who are Dean’s inspiration for growth?</p>
<p class="p1">29:38 – What advice does Dean have to those that are looking for growth?</p>
<p class="p1">31:42 – How to stay up-to-date with Dean and all the great things at Axonius</p>
<p class="p1"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Dean Sysman: <a href='https://www.axonius.com/'>Axonius Website</a> | <a href='mailto:dean@axonius.com'>E-mail</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">On this episode, Hacker Valley Studio has a very big announcement! Hosts Ron and Chris interview guest Dean Sysman, CEO and co-founder of Axonius. </p>
<p class="p1">The values, and founder story of Dean are shared as Ron and Chris ask him very interesting questions. Dean started his journey years ago with a passion on how technology could impact the world. He has also brought many values to Axonius, helping people through growth to become a better version of themselves.</p>
<p class="p1">Dean shares how he figured that the determining factor of success was realizing the problem that the organization needs to solve, and focusing on the customer’s experience.</p>
<p class="p2"> </p>
<p class="p1">0:21 – Intro </p>
<p class="p1">1:53 – Bio</p>
<p class="p1">3:24 – Ron and Chris talk about their role in Axonius and Dean Sysman shares the value he saw in them</p>
<p class="p1">7:26 – Dean’s founder story in Axonius</p>
<p class="p1">13:01 – The values that Dean has brought to Axonius and people’s lives</p>
<p class="p1">16:42 – Dean’s turning point where he could no longer go back from where he was</p>
<p class="p1">23:31 – Why Dean wants Ron and Chris to be the voice of Axonius</p>
<p class="p1">26:01 – Who are Dean’s inspiration for growth?</p>
<p class="p1">29:38 – What advice does Dean have to those that are looking for growth?</p>
<p class="p1">31:42 – How to stay up-to-date with Dean and all the great things at Axonius</p>
<p class="p1"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Dean Sysman: <a href='https://www.axonius.com/'>Axonius Website</a> | <a href='mailto:dean@axonius.com'>E-mail</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jg2fbe/Dean_Sysman6zipr.mp3" length="78506840" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On this episode, Hacker Valley Studio has a very big announcement! Hosts Ron and Chris interview guest Dean Sysman, CEO and co-founder of Axonius. 
The values, and founder story of Dean are shared as Ron and Chris ask him very interesting questions. Dean started his journey years ago with a passion on how technology could impact the world. He has also brought many values to Axonius, helping people through growth to become a better version of themselves.
Dean shares how he figured that the determining factor of success was realizing the problem that the organization needs to solve, and focusing on the customer’s experience.
 
0:21 – Intro 
1:53 – Bio
3:24 – Ron and Chris talk about their role in Axonius and Dean Sysman shares the value he saw in them
7:26 – Dean’s founder story in Axonius
13:01 – The values that Dean has brought to Axonius and people’s lives
16:42 – Dean’s turning point where he could no longer go back from where he was
23:31 – Why Dean wants Ron and Chris to be the voice of Axonius
26:01 – Who are Dean’s inspiration for growth?
29:38 – What advice does Dean have to those that are looking for growth?
31:42 – How to stay up-to-date with Dean and all the great things at Axonius
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Dean Sysman: Axonius Website | E-mail 
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1962</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>165</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 164 - Demystifying Product Innovation with Erik Goldman</title>
        <itunes:title>Episode 164 - Demystifying Product Innovation with Erik Goldman</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-164-demystifying-product-innovation-with-erik-goldman/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-164-demystifying-product-innovation-with-erik-goldman/#comments</comments>        <pubDate>Tue, 24 Aug 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ad43bb87-192a-30ed-9a7b-86e12fea8ebe</guid>
                                    <description><![CDATA[<p class="p1">Hosts Ron and Chris interview guest Erik Goldman, VP of Product at Panther Labs, a software engineer, expert in product and an entrepreneur. </p>
<p class="p1">Erik is great at asking questions, that is one of his superpowers. One of his strategies to build a product is to sit down with customers, ask them what they want him to do, deeply understand their persona, and gather data.</p>
<p class="p1">Erik builds his thesis for success, and knows how to distinguish a good company from a great company by analyzing which one has a philosophy that goes beyond the software.</p>
<p class="p1">Erik offers advice for listeners on how to operate better on their company.</p>
<p class="p2"> </p>
<p class="p1">1:03 - Intro</p>
<p class="p1">2:37 – Bio</p>
<p class="p1">6:18 – The difference between building a product and building a business</p>
<p class="p1">7:18 – What are Erik’s strengths based on his past experiences</p>
<p class="p1">9:20 – How Erik stays away from tinkering with the code, and more of the technical aspects</p>
<p class="p1">11:48 – Erik’s power of understanding the concepts by asking questions</p>
<p class="p1">13:19 – The difference between a good company and a great company</p>
<p class="p1">15:20 – What Erik thinks about the future of technology and the cyber security of the future</p>
<p class="p1">19:30 – Erik’s thoughts about automating security operation</p>
<p class="p1">26:07 – Erik’s advice for listeners to operate better in their company’s environment</p>
<p class="p1">27:50 – How to stay up to date with Panther Labs.</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Erik Goldman: <a href='https://runpanther.io/'>Panther Website</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Visit our sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Hosts Ron and Chris interview guest Erik Goldman, VP of Product at Panther Labs, a software engineer, expert in product and an entrepreneur. </p>
<p class="p1">Erik is great at asking questions, that is one of his superpowers. One of his strategies to build a product is to sit down with customers, ask them what they want him to do, deeply understand their persona, and gather data.</p>
<p class="p1">Erik builds his thesis for success, and knows how to distinguish a good company from a great company by analyzing which one has a philosophy that goes beyond the software.</p>
<p class="p1">Erik offers advice for listeners on how to operate better on their company.</p>
<p class="p2"> </p>
<p class="p1">1:03 - Intro</p>
<p class="p1">2:37 – Bio</p>
<p class="p1">6:18 – The difference between building a product and building a business</p>
<p class="p1">7:18 – What are Erik’s strengths based on his past experiences</p>
<p class="p1">9:20 – How Erik stays away from tinkering with the code, and more of the technical aspects</p>
<p class="p1">11:48 – Erik’s power of understanding the concepts by asking questions</p>
<p class="p1">13:19 – The difference between a good company and a great company</p>
<p class="p1">15:20 – What Erik thinks about the future of technology and the cyber security of the future</p>
<p class="p1">19:30 – Erik’s thoughts about automating security operation</p>
<p class="p1">26:07 – Erik’s advice for listeners to operate better in their company’s environment</p>
<p class="p1">27:50 – How to stay up to date with Panther Labs.</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Erik Goldman: <a href='https://runpanther.io/'>Panther Website</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Visit our sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/iraubr/Erik_Goldman7vt9n.mp3" length="69174524" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hosts Ron and Chris interview guest Erik Goldman, VP of Product at Panther Labs, a software engineer, expert in product and an entrepreneur. 
Erik is great at asking questions, that is one of his superpowers. One of his strategies to build a product is to sit down with customers, ask them what they want him to do, deeply understand their persona, and gather data.
Erik builds his thesis for success, and knows how to distinguish a good company from a great company by analyzing which one has a philosophy that goes beyond the software.
Erik offers advice for listeners on how to operate better on their company.
 
1:03 - Intro
2:37 – Bio
6:18 – The difference between building a product and building a business
7:18 – What are Erik’s strengths based on his past experiences
9:20 – How Erik stays away from tinkering with the code, and more of the technical aspects
11:48 – Erik’s power of understanding the concepts by asking questions
13:19 – The difference between a good company and a great company
15:20 – What Erik thinks about the future of technology and the cyber security of the future
19:30 – Erik’s thoughts about automating security operation
26:07 – Erik’s advice for listeners to operate better in their company’s environment
27:50 – How to stay up to date with Panther Labs.
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Erik Goldman: Panther Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Visit our sponsor Panther Labs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1729</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>164</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 163 - A Blueprint for Learning Cyber with Keith Wilson</title>
        <itunes:title>Episode 163 - A Blueprint for Learning Cyber with Keith Wilson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-163-a-blueprint-for-learning-cyber-with-keith-wilson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-163-a-blueprint-for-learning-cyber-with-keith-wilson/#comments</comments>        <pubDate>Tue, 17 Aug 2021 04:30:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/4c52fa63-0663-3fa3-86a4-60752c178719</guid>
                                    <description><![CDATA[<p class="p1">Hosts Ron and Chris interview guest Keith Wilson, director of cyber security education at Attack IQ Academy. Keith is the perfect example on how to take years of experience in engineering and analysis, and turn it into something that is impactful for all people. Keith has created educational content for people in the industry and different types of learners. His trajectory is filled with success stories, and also invites people who want to get into cyber security. </p>
<p class="p2"> </p>
<p class="p1">1:11 - Intro</p>
<p class="p1">3:03 – Bio</p>
<p class="p1">6:13 – How Keith’s fascination with education started</p>
<p class="p1">9:09 – Blueprint for education: concepts, the structure of classes, and activities</p>
<p class="p1">12:33 – The approach to different types of learners </p>
<p class="p1">15:21 – Discussion about students who want to get into cyber security or transition into another aspect of it</p>
<p class="p1">16:51 – Keith’s creative process for building new content and sharing information</p>
<p class="p1">20:51 – Success story of when education is done right</p>
<p class="p1">22:41 – Advice to listeners about putting out educational content </p>
<p class="p1">24:16 – How to stay up to date with Keith and Attack Academy IQ</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Keith C. Wilson: <a href='https://www.linkedin.com/in/kcwilson/'>LinkedIn</a> | <a href='https://www.instagram.com/detectedanomaly/'>Instagram</a> | <a href='https://twitter.com/detectedanomaly'>Twitter</a> | <a href='https://academy.attackiq.com/'>Attack IQ Academy</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p2">Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Hosts Ron and Chris interview guest Keith Wilson, director of cyber security education at Attack IQ Academy. Keith is the perfect example on how to take years of experience in engineering and analysis, and turn it into something that is impactful for all people. Keith has created educational content for people in the industry and different types of learners. His trajectory is filled with success stories, and also invites people who want to get into cyber security. </p>
<p class="p2"> </p>
<p class="p1">1:11 - Intro</p>
<p class="p1">3:03 – Bio</p>
<p class="p1">6:13 – How Keith’s fascination with education started</p>
<p class="p1">9:09 – Blueprint for education: concepts, the structure of classes, and activities</p>
<p class="p1">12:33 – The approach to different types of learners </p>
<p class="p1">15:21 – Discussion about students who want to get into cyber security or transition into another aspect of it</p>
<p class="p1">16:51 – Keith’s creative process for building new content and sharing information</p>
<p class="p1">20:51 – Success story of when education is done right</p>
<p class="p1">22:41 – Advice to listeners about putting out educational content </p>
<p class="p1">24:16 – How to stay up to date with Keith and Attack Academy IQ</p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Keith C. Wilson: <a href='https://www.linkedin.com/in/kcwilson/'>LinkedIn</a> | <a href='https://www.instagram.com/detectedanomaly/'>Instagram</a> | <a href='https://twitter.com/detectedanomaly'>Twitter</a> | <a href='https://academy.attackiq.com/'>Attack IQ Academy</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p2">Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/sj6uht/Keith_Wilson73uui.mp3" length="48878523" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hosts Ron and Chris interview guest Keith Wilson, director of cyber security education at Attack IQ Academy. Keith is the perfect example on how to take years of experience in engineering and analysis, and turn it into something that is impactful for all people. Keith has created educational content for people in the industry and different types of learners. His trajectory is filled with success stories, and also invites people who want to get into cyber security. 
 
1:11 - Intro
3:03 – Bio
6:13 – How Keith’s fascination with education started
9:09 – Blueprint for education: concepts, the structure of classes, and activities
12:33 – The approach to different types of learners 
15:21 – Discussion about students who want to get into cyber security or transition into another aspect of it
16:51 – Keith’s creative process for building new content and sharing information
20:51 – Success story of when education is done right
22:41 – Advice to listeners about putting out educational content 
24:16 – How to stay up to date with Keith and Attack Academy IQ
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Keith C. Wilson: LinkedIn | Instagram | Twitter | Attack IQ Academy 
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Visit our friends and sponsor Panther Labs.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1527</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>163</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 162 - Security in Space with Frank Pound</title>
        <itunes:title>Episode 162 - Security in Space with Frank Pound</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-162-security-in-space-with-frank-pound/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-162-security-in-space-with-frank-pound/#comments</comments>        <pubDate>Tue, 10 Aug 2021 08:45:39 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/431f517f-f9aa-3ee6-bbbb-230b205b39a3</guid>
                                    <description><![CDATA[<p class="p1">What do you call cyberspace in space? What is the evolution of cyber security in space?</p>
<p class="p1">The expert Frank Pound, computer scientist, entrepreneur, founder and president of Astro Sec is the guest to clarify all things related to cyberspace. Space traffic control is discussed. Frank advised the Air Force, Space Force, and their contractors to help build the Hack-A-Sat competition which attracted teams from around the world to demonstrate their prowess in this blended space and cyber competition challenging them in everything from orbital dynamics to radio communications.</p>
<p class="p2"> </p>
<p class="p1">1:00 – Intro </p>
<p class="p1">2:10 – Bio Frank Pound</p>
<p class="p1">11:10 - Frank Pound talks about the democratization of technology </p>
<p class="p1">12:03 – The explosion of IOTs on the market, sensors, and rapid advancements on space launch </p>
<p class="p1">12:54 – The open-source hardware movement</p>
<p class="p1">18:04 – General excitement about space in 2019 and investment in safety</p>
<p class="p1">20:56 – Potential for a cascading effect making space travel impossible </p>
<p class="p1">23:37 – Frank Pound talks about safety measures</p>
<p class="p1">24:50 – A summary of Hack-A-Sat’s latest works</p>
<p class="p1">27:22 – Alternatives to cyber security and safety in space </p>
<p class="p1">37:00 – Frank answers the question on how to do missions in space</p>
<p class="p1">40:16 – How to find out more about Frank Pound and Hack-A-Sat’s competition, interviews and resources </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Frank Pound: <a href='https://twitter.com/hack_a_sat'>Twitter</a> | <a href='https://www.hackasat.com/'>Website</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">What do you call cyberspace in space? What is the evolution of cyber security in space?</p>
<p class="p1">The expert Frank Pound, computer scientist, entrepreneur, founder and president of Astro Sec is the guest to clarify all things related to cyberspace. Space traffic control is discussed. Frank advised the Air Force, Space Force, and their contractors to help build the Hack-A-Sat competition which attracted teams from around the world to demonstrate their prowess in this blended space and cyber competition challenging them in everything from orbital dynamics to radio communications.</p>
<p class="p2"> </p>
<p class="p1">1:00 – Intro </p>
<p class="p1">2:10 – Bio Frank Pound</p>
<p class="p1">11:10 - Frank Pound talks about the democratization of technology </p>
<p class="p1">12:03 – The explosion of IOTs on the market, sensors, and rapid advancements on space launch </p>
<p class="p1">12:54 – The open-source hardware movement</p>
<p class="p1">18:04 – General excitement about space in 2019 and investment in safety</p>
<p class="p1">20:56 – Potential for a cascading effect making space travel impossible </p>
<p class="p1">23:37 – Frank Pound talks about safety measures</p>
<p class="p1">24:50 – A summary of Hack-A-Sat’s latest works</p>
<p class="p1">27:22 – Alternatives to cyber security and safety in space </p>
<p class="p1">37:00 – Frank answers the question on how to do missions in space</p>
<p class="p1">40:16 – How to find out more about Frank Pound and Hack-A-Sat’s competition, interviews and resources </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='http://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p1">Frank Pound: <a href='https://twitter.com/hack_a_sat'>Twitter</a> | <a href='https://www.hackasat.com/'>Website</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p class="p1">Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8pfwu7/Frank_Pound9r59p.mp3" length="100526888" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What do you call cyberspace in space? What is the evolution of cyber security in space?
The expert Frank Pound, computer scientist, entrepreneur, founder and president of Astro Sec is the guest to clarify all things related to cyberspace. Space traffic control is discussed. Frank advised the Air Force, Space Force, and their contractors to help build the Hack-A-Sat competition which attracted teams from around the world to demonstrate their prowess in this blended space and cyber competition challenging them in everything from orbital dynamics to radio communications.
 
1:00 – Intro 
2:10 – Bio Frank Pound
11:10 - Frank Pound talks about the democratization of technology 
12:03 – The explosion of IOTs on the market, sensors, and rapid advancements on space launch 
12:54 – The open-source hardware movement
18:04 – General excitement about space in 2019 and investment in safety
20:56 – Potential for a cascading effect making space travel impossible 
23:37 – Frank Pound talks about safety measures
24:50 – A summary of Hack-A-Sat’s latest works
27:22 – Alternatives to cyber security and safety in space 
37:00 – Frank answers the question on how to do missions in space
40:16 – How to find out more about Frank Pound and Hack-A-Sat’s competition, interviews and resources 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Frank Pound: Twitter | Website
Support Hacker Valley Studio on Patreon
Join our monthly mastermind group via Patreon
Visit our friends and sponsor Panther Labs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2513</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>162</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>QuickQ: What is Social Networking? Hacker Summer Camp FOMO</title>
        <itunes:title>QuickQ: What is Social Networking? Hacker Summer Camp FOMO</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/quickq-what-is-social-networking-hacker-summer-camp-fomo/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/quickq-what-is-social-networking-hacker-summer-camp-fomo/#comments</comments>        <pubDate>Sun, 08 Aug 2021 05:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/51e7c9a5-9a35-3933-9d15-1132d63242d3</guid>
                                    <description><![CDATA[<p>In this episode of Hacker Valley, Chris and Ron tackle a quick question. The question of the day is, “what is social networking?” Together they discuss different aspects of social media and how it facilitates connections and careers.</p>
<p>Ron’s perspective is that social networking empowers folks to find like minded people, learn new things, self advocate and learn about others. Chris shares how social networking on LinkedIn put him in a position to build a community in cybersecurity.</p>
<p>Timecodes</p>
<p>01:53 - The difference between networking and social networking and polishing profiles.</p>
<p>04:00 - How Ron engages with social networking mindfully.</p>
<p>06:30 - How LinkedIn helped Chris and Ron find their community.</p>
<p>08:46 - How social networks can elevate cybersecurity practitioners, researchers and businesses.</p>
<p>10:00 - Threat intelligence, open source intelligence and finding family on social networks</p>
<p>13:00 - Perspectives on the future of social networks and digital interaction.</p>
<p>15:45 - Making the most of social networks</p>
<p> </p>
<p>Links Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | <a href='mailto:podcasts@hackervalley.com'>Email Ron & Chris</a> |</p>
<p><a href='https://hackervalley.com'>Website</a> Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Hacker Valley, Chris and Ron tackle a quick question. The question of the day is, “what is social networking?” Together they discuss different aspects of social media and how it facilitates connections and careers.</p>
<p>Ron’s perspective is that social networking empowers folks to find like minded people, learn new things, self advocate and learn about others. Chris shares how social networking on LinkedIn put him in a position to build a community in cybersecurity.</p>
<p>Timecodes</p>
<p>01:53 - The difference between networking and social networking and polishing profiles.</p>
<p>04:00 - How Ron engages with social networking mindfully.</p>
<p>06:30 - How LinkedIn helped Chris and Ron find their community.</p>
<p>08:46 - How social networks can elevate cybersecurity practitioners, researchers and businesses.</p>
<p>10:00 - Threat intelligence, open source intelligence and finding family on social networks</p>
<p>13:00 - Perspectives on the future of social networks and digital interaction.</p>
<p>15:45 - Making the most of social networks</p>
<p> </p>
<p>Links Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | <a href='mailto:podcasts@hackervalley.com'>Email Ron & Chris</a> |</p>
<p><a href='https://hackervalley.com'>Website</a> Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gxb474/HV_QuickQ-SocialNetworking_Mix_18ekjs.mp3" length="25609264" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley, Chris and Ron tackle a quick question. The question of the day is, “what is social networking?” Together they discuss different aspects of social media and how it facilitates connections and careers.
Ron’s perspective is that social networking empowers folks to find like minded people, learn new things, self advocate and learn about others. Chris shares how social networking on LinkedIn put him in a position to build a community in cybersecurity.
Timecodes
01:53 - The difference between networking and social networking and polishing profiles.
04:00 - How Ron engages with social networking mindfully.
06:30 - How LinkedIn helped Chris and Ron find their community.
08:46 - How social networks can elevate cybersecurity practitioners, researchers and businesses.
10:00 - Threat intelligence, open source intelligence and finding family on social networks
13:00 - Perspectives on the future of social networks and digital interaction.
15:45 - Making the most of social networks
 
Links Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris |
Website Support Hacker Valley Studio on Patreon.
Join our monthly mastermind group via Patreon]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1066</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>161</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 160 - Creating Valuable Tech Content with Ken Underhill</title>
        <itunes:title>Episode 160 - Creating Valuable Tech Content with Ken Underhill</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-160-creating-valuable-tech-content-with-ken-underhill/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-160-creating-valuable-tech-content-with-ken-underhill/#comments</comments>        <pubDate>Wed, 04 Aug 2021 04:30:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/88207998-cde4-3b16-b472-1c261ba381e5</guid>
                                    <description><![CDATA[<p class="p1">Ken Underhill is an award-winning cyber security executive, entrepreneur, and teacher. His mission is to help others find their value and share it; ultimately leading to success both professionally and personally. Ken’s courses offer an intuitive approach to help start a career in cyber security. Whether you’re a budding cyber security professional or a seasoned veteran, Ken’s perspective can serve a purpose in your life. </p>
<p class="p1">Join Ron, Chris and Ken to dive into what it takes to create content, help others, and thrive in your career!</p>
<p class="p2"> </p>
<p class="p1">01:30 Guest Intro</p>
<p class="p1">02:14 Bio </p>
<p class="p1">11:30 Ken’s journey in content creation</p>
<p class="p1">13:22 Why focusing on giving value first matters</p>
<p class="p1">16:15 Ken’s future plan for content</p>
<p class="p1">23:50 The path to making an impact</p>
<p class="p1">29:40 Connecting with your audience</p>
<p class="p1">37:58 Get in touch with Ken </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Ken Underhill: <a href='https://www.udemy.com/user/kennethunderhill/'>Courses</a> | <a href='https://www.youtube.com/channel/UCtbsMb1tvnH2_FQXZ6bk4ww'>YouTube</a> | <a href='https://www.kandltech.com'>Website</a> | <a href='https://www.linkedin.com/in/kenunderhill/'>LinkedIn</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon.</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Ken Underhill is an award-winning cyber security executive, entrepreneur, and teacher. His mission is to help others find their value and share it; ultimately leading to success both professionally and personally. Ken’s courses offer an intuitive approach to help start a career in cyber security. Whether you’re a budding cyber security professional or a seasoned veteran, Ken’s perspective can serve a purpose in your life. </p>
<p class="p1">Join Ron, Chris and Ken to dive into what it takes to create content, help others, and thrive in your career!</p>
<p class="p2"> </p>
<p class="p1">01:30 Guest Intro</p>
<p class="p1">02:14 Bio </p>
<p class="p1">11:30 Ken’s journey in content creation</p>
<p class="p1">13:22 Why focusing on giving value first matters</p>
<p class="p1">16:15 Ken’s future plan for content</p>
<p class="p1">23:50 The path to making an impact</p>
<p class="p1">29:40 Connecting with your audience</p>
<p class="p1">37:58 Get in touch with Ken </p>
<p class="p2"> </p>
<p class="p3">Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p3">Ken Underhill: <a href='https://www.udemy.com/user/kennethunderhill/'>Courses</a> | <a href='https://www.youtube.com/channel/UCtbsMb1tvnH2_FQXZ6bk4ww'>YouTube</a> | <a href='https://www.kandltech.com'>Website</a> | <a href='https://www.linkedin.com/in/kenunderhill/'>LinkedIn</a> </p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon.</a></p>
<p class="p1">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ywa8k7/Ken_Underhill8ixwd.mp3" length="95037536" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ken Underhill is an award-winning cyber security executive, entrepreneur, and teacher. His mission is to help others find their value and share it; ultimately leading to success both professionally and personally. Ken’s courses offer an intuitive approach to help start a career in cyber security. Whether you’re a budding cyber security professional or a seasoned veteran, Ken’s perspective can serve a purpose in your life. 
Join Ron, Chris and Ken to dive into what it takes to create content, help others, and thrive in your career!
 
01:30 Guest Intro
02:14 Bio 
11:30 Ken’s journey in content creation
13:22 Why focusing on giving value first matters
16:15 Ken’s future plan for content
23:50 The path to making an impact
29:40 Connecting with your audience
37:58 Get in touch with Ken 
 
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Ken Underhill: Courses | YouTube | Website | LinkedIn 
Support Hacker Valley Studio on Patreon.
Join our monthly mastermind group via Patreon
Visit our friends and sponsor Panther Labs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2375</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>160</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>QuickQ: What is Threat Hunting?</title>
        <itunes:title>QuickQ: What is Threat Hunting?</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/quickq-what-is-threat-hunting/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/quickq-what-is-threat-hunting/#comments</comments>        <pubDate>Fri, 30 Jul 2021 04:30:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/dcb35b26-86b6-34f2-8823-6d91f26e17ca</guid>
                                    <description><![CDATA[<p class="p2">In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Valentina Palacín, who you might have heard on HVS Blue <a href='https://hackervalley.com/blue/'>season 1</a>. Valentina is an author, public speaker, self-taught developer, and Threat Operations lead at Marqeta Incorporated, armed with a background in translation and interpretation. </p>
<p class="p2">Join Chris, Ron and Valentina for this round-table masterclass in all things Threat Hunting to discuss the questions you may be asking yourself:</p>
<p class="p2">What is Threat Hunting? How do you become a Threat Hunter? What’s it like to be in the shoes of a Threat Hunter? Or work with one? </p>
<p class="p1"> </p>
<p class="p2">Key Takeaways:</p>
<p class="p1"> </p>
<p class="p2">0:00 Welcome to the podcast!</p>
<p class="p2">1:10 Introduction/ Bio</p>
<p class="p2">2:55 What is Threat Hunting?</p>
<p class="p2">5:25 Chris’ take on working with a Threat Hunter (Ron)</p>
<p class="p2">7:08 Valentina’s Threat Hunting flow</p>
<p class="p2">9:18 Ron and Valentina talk about progressions in Threat Intelligence</p>
<p class="p2">12:20 The group talks about the ideal characteristics of a Threat Hunter in both junior and senior level positions</p>
<p class="p2">18:00 How to get into Threat Hunting</p>
<p class="p2">20:55 Get in touch with Valentina!</p>
<p class="p2"> </p>
<p class="p1">Valentina Palacín: <a href='https://www.amazon.com/Valentina-Palac%25C3%25ADn/dp/1838556370'>Book</a> | <a href='https://www.linkedin.com/in/valentinapalacin/'>LinkedIn</a> | <a href='https://twitter.com/fierytermite?lang=en'>Twitter</a></p>
<p class="p3">Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p2">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon.</a></p>
<p class="p2">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p2">In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Valentina Palacín, who you might have heard on HVS Blue <a href='https://hackervalley.com/blue/'>season 1</a>. Valentina is an author, public speaker, self-taught developer, and Threat Operations lead at Marqeta Incorporated, armed with a background in translation and interpretation. </p>
<p class="p2">Join Chris, Ron and Valentina for this round-table masterclass in all things Threat Hunting to discuss the questions you may be asking yourself:</p>
<p class="p2">What is Threat Hunting? How do you become a Threat Hunter? What’s it like to be in the shoes of a Threat Hunter? Or work with one? </p>
<p class="p1"> </p>
<p class="p2">Key Takeaways:</p>
<p class="p1"> </p>
<p class="p2">0:00 Welcome to the podcast!</p>
<p class="p2">1:10 Introduction/ Bio</p>
<p class="p2">2:55 What is Threat Hunting?</p>
<p class="p2">5:25 Chris’ take on working with a Threat Hunter (Ron)</p>
<p class="p2">7:08 Valentina’s Threat Hunting flow</p>
<p class="p2">9:18 Ron and Valentina talk about progressions in Threat Intelligence</p>
<p class="p2">12:20 The group talks about the ideal characteristics of a Threat Hunter in both junior and senior level positions</p>
<p class="p2">18:00 How to get into Threat Hunting</p>
<p class="p2">20:55 Get in touch with Valentina!</p>
<p class="p2"> </p>
<p class="p1">Valentina Palacín: <a href='https://www.amazon.com/Valentina-Palac%25C3%25ADn/dp/1838556370'>Book</a> | <a href='https://www.linkedin.com/in/valentinapalacin/'>LinkedIn</a> | <a href='https://twitter.com/fierytermite?lang=en'>Twitter</a></p>
<p class="p3">Hacker Valley Studio: <a href='https://store.hackervalley.com/'>Swag</a> | <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a> | <a href='https://twitter.com/thehackervalley'>Twitter</a> | <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a> | Email <a href='http://hackervalley.com/'>Ron & Chris</a> | <a href='https://hackervalley.com/'>Website</a></p>
<p class="p2">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon.</a></p>
<p class="p2">Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9acjjp/Ron_Chris_3b32go.mp3" length="52834880" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Valentina Palacín, who you might have heard on HVS Blue season 1. Valentina is an author, public speaker, self-taught developer, and Threat Operations lead at Marqeta Incorporated, armed with a background in translation and interpretation. 
Join Chris, Ron and Valentina for this round-table masterclass in all things Threat Hunting to discuss the questions you may be asking yourself:
What is Threat Hunting? How do you become a Threat Hunter? What’s it like to be in the shoes of a Threat Hunter? Or work with one? 
 
Key Takeaways:
 
0:00 Welcome to the podcast!
1:10 Introduction/ Bio
2:55 What is Threat Hunting?
5:25 Chris’ take on working with a Threat Hunter (Ron)
7:08 Valentina’s Threat Hunting flow
9:18 Ron and Valentina talk about progressions in Threat Intelligence
12:20 The group talks about the ideal characteristics of a Threat Hunter in both junior and senior level positions
18:00 How to get into Threat Hunting
20:55 Get in touch with Valentina!
 
Valentina Palacín: Book | LinkedIn | Twitter
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Support Hacker Valley Studio on Patreon.
Join our monthly mastermind group via Patreon]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1321</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>159</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 158 - Wild Adventures with Chef Bri Van Scotter</title>
        <itunes:title>Episode 158 - Wild Adventures with Chef Bri Van Scotter</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-158-wild-adventures-with-chef-bri-van-scotter/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-158-wild-adventures-with-chef-bri-van-scotter/#comments</comments>        <pubDate>Wed, 28 Jul 2021 04:30:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6dd864a6-7273-332f-8bfb-2414d52d0bd2</guid>
                                    <description><![CDATA[<p>In this episode, Chris, Ron, and their special guest going to be talking about your table. Not the table itself, but what is on it. They are talking about food and following our passions. They've brought in Bri Van Scotter, professional Chef, author, hunter, and host of the TV series Wilderness to Table. Bri is so unbelievably talented in so many areas. Everyone is going to love this episode and learn a little bit about the food we eat. </p>
<p> </p>
<p>Key Moments</p>
<p>00:56 - Intro to Bri</p>
<p>02:41 - Bri’s Background</p>
<p>03:59 - The darker side of food production</p>
<p>04:57 - The hunt begins</p>
<p>06:13 - For the love of food</p>
<p>11:41 - On going deep with your craft</p>
<p>16:10 - Getting more in touch with your food</p>
<p>21:33 -  Eating for Health</p>
<p>22:52 - Honoring our food sources</p>
<p>25:28 - Knowledge is power</p>
<p> </p>
<p>Visit Bri at her <a href='https://www.wildernesstotable.com/'>website</a></p>
<p>Follow Bri on <a href='https://www.instagram.com/wildernesstotable/'>Instagram</a></p>
<p>Keep in touch with Hacker Valley Studio on<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a>,<a href='https://twitter.com/thehackervalley'> Twitter</a>, and<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Chris, Ron, and their special guest going to be talking about your table. Not the table itself, but what is on it. They are talking about food and following our passions. They've brought in Bri Van Scotter, professional Chef, author, hunter, and host of the TV series Wilderness to Table. Bri is so unbelievably talented in so many areas. Everyone is going to love this episode and learn a little bit about the food we eat. </p>
<p> </p>
<p>Key Moments</p>
<p>00:56 - Intro to Bri</p>
<p>02:41 - Bri’s Background</p>
<p>03:59 - The darker side of food production</p>
<p>04:57 - The hunt begins</p>
<p>06:13 - For the love of food</p>
<p>11:41 - On going deep with your craft</p>
<p>16:10 - Getting more in touch with your food</p>
<p>21:33 -  Eating for Health</p>
<p>22:52 - Honoring our food sources</p>
<p>25:28 - Knowledge is power</p>
<p> </p>
<p>Visit Bri at her <a href='https://www.wildernesstotable.com/'>website</a></p>
<p>Follow Bri on <a href='https://www.instagram.com/wildernesstotable/'>Instagram</a></p>
<p>Keep in touch with Hacker Valley Studio on<a href='https://www.linkedin.com/company/hackervalleystudio/'> LinkedIn</a>,<a href='https://twitter.com/thehackervalley'> Twitter</a>, and<a href='https://www.instagram.com/hackervalleystudio'> Instagram</a></p>
<p>Join our monthly mastermind group via<a href='https://www.patreon.com/hackervalleystudio'> Patreon</a></p>
<p>Visit our friends and sponsor <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zwywx8/Bri_Van_Scotter_REV18cg9c.mp3" length="65348264" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Chris, Ron, and their special guest going to be talking about your table. Not the table itself, but what is on it. They are talking about food and following our passions. They've brought in Bri Van Scotter, professional Chef, author, hunter, and host of the TV series Wilderness to Table. Bri is so unbelievably talented in so many areas. Everyone is going to love this episode and learn a little bit about the food we eat. 
 
Key Moments
00:56 - Intro to Bri
02:41 - Bri’s Background
03:59 - The darker side of food production
04:57 - The hunt begins
06:13 - For the love of food
11:41 - On going deep with your craft
16:10 - Getting more in touch with your food
21:33 -  Eating for Health
22:52 - Honoring our food sources
25:28 - Knowledge is power
 
Visit Bri at her website
Follow Bri on Instagram
Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram
Join our monthly mastermind group via Patreon
Visit our friends and sponsor Panther Labs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1634</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>158</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>QuickQ: What is Security Architecture?</title>
        <itunes:title>QuickQ: What is Security Architecture?</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/quickq-what-is-security-architecture/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/quickq-what-is-security-architecture/#comments</comments>        <pubDate>Thu, 22 Jul 2021 11:11:29 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1c1148ab-76b2-3c98-82be-b704b82e8fbe</guid>
                                    <description><![CDATA[<p>Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic.</p>
<p>Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money.</p>
<p>Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )</p>
<p> </p>
<p>Key Takeaways:</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p>1:10 - Ron's favorite topic! Security Architecture</p>
<p>1:45 - Security architecture is the foundation </p>
<p>2:21 - Where a security architecture starts and stops</p>
<p>4:00 - A security architect is playing a game of Tower Defense</p>
<p>6:27 - Using EASY Framework as a security architect</p>
<p>10:04 - Prerequisites for becoming a security architect</p>
<p>13:55 - Differences between security architect and security engineers</p>
<p>16:55 - Resources for learning more about security architecture</p>
<p>19:21 - Stay in touch with Hacker Valley Studio!</p>
<p> </p>
<p>Keep in touch with Hacker Valley Studio on <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://twitter.com/thehackervalley'>Twitter</a>, and <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Learn more about our fantastic sponsor <a href='https://www.uptycs.com/'>Upytcs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic.</p>
<p>Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money.</p>
<p>Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )</p>
<p> </p>
<p>Key Takeaways:</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p>1:10 - Ron's favorite topic! Security Architecture</p>
<p>1:45 - Security architecture is the foundation </p>
<p>2:21 - Where a security architecture starts and stops</p>
<p>4:00 - A security architect is playing a game of Tower Defense</p>
<p>6:27 - Using EASY Framework as a security architect</p>
<p>10:04 - Prerequisites for becoming a security architect</p>
<p>13:55 - Differences between security architect and security engineers</p>
<p>16:55 - Resources for learning more about security architecture</p>
<p>19:21 - Stay in touch with Hacker Valley Studio!</p>
<p> </p>
<p>Keep in touch with Hacker Valley Studio on <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a>, <a href='https://twitter.com/thehackervalley'>Twitter</a>, and <a href='https://www.instagram.com/hackervalleystudio'>Instagram</a></p>
<p>Join our monthly mastermind group via <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a></p>
<p>Learn more about our fantastic sponsor <a href='https://www.uptycs.com/'>Upytcs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pxm7bp/Ron_Chris_2bfli3.mp3" length="48118088" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic.
Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money.
Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )
 
Key Takeaways:
0:00 - Welcome back to the Hacker Valley Studio
1:10 - Ron's favorite topic! Security Architecture
1:45 - Security architecture is the foundation 
2:21 - Where a security architecture starts and stops
4:00 - A security architect is playing a game of Tower Defense
6:27 - Using EASY Framework as a security architect
10:04 - Prerequisites for becoming a security architect
13:55 - Differences between security architect and security engineers
16:55 - Resources for learning more about security architecture
19:21 - Stay in touch with Hacker Valley Studio!
 
Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram
Join our monthly mastermind group via Patreon
Learn more about our fantastic sponsor Upytcs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1203</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>157</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 156 - Detection as Code with Nick Hakmiller</title>
        <itunes:title>Episode 156 - Detection as Code with Nick Hakmiller</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-156-detection-as-code-with-nick-hakmiller/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-156-detection-as-code-with-nick-hakmiller/#comments</comments>        <pubDate>Tue, 20 Jul 2021 05:45:48 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/69b76a70-7ad8-38c7-ba01-b7625436bc43</guid>
                                    <description><![CDATA[<p>In this episode, we speak to a Detection and Response expert! Our guest is Nick Hakmiller, Senior Engineering Manager at Panther Labs.</p>
<p>Nick was first exposed to technology in High School where he took an introduction to Visual Basic programming course. When learning about multi-threaded applications Nick became curious and began exploring how to open too many threads to crash a computer. Throughout Nick’s career he’s maintained an interest and focus on attack techniques and building defensive security programs.</p>
<p>On occasions, security controls may fail to catch an attacker. A detection is logic that is applied to logs, security controls, and alerts to notify teams and automated processes. Nick describes Python as an exceptional programming language to apply detections and create detections as code.</p>
<p>Nick describes many aspects of security as an engineering problem. As organizations transform and adopt new technologies, security issues arise and evolve. Nick describes that the team’s that are most successful with applying detection as code have chosen to view security as a function that engineering should participate in and help solve.</p>
<p>As an organization’s security program matures, Nick mentions that the most impactful detections will likely be written and created by someone within the organization. For instance, creating a detection that defines which users should have access to sensitive data is likely to be created by a member of the organization with knowledge of team structure.</p>
<p>Towards the end of the episode, Nick shares his wisdom to any practitioner that wants to step into the role of creating detections and providing impact while doing so.</p>
<p> </p>
<p>Key Takeaways</p>
<p>0:00 - Welcome Back to the Hacker Valley Studio Podcast!</p>
<p>2:29 - Nick Hakmiller, Senior Engineering Manager at Panther Labs</p>
<p>4:20 - How Nick became interested in technology</p>
<p>6:00 - What is a detection?</p>
<p>7:25 - How detection as code applies to cybersecurity and software engineering</p>
<p>10:11 - Prerequisites to consider before applying detection as code</p>
<p>12:27 - Thinking beyond out of the box solutions and applying detections</p>
<p>15:54 - Categories of detections and which are most impactful</p>
<p>23:45 - Reducing alerts by engineering efforts</p>
<p>27:40 - Is it possible to automate everything for security?</p>
<p>32:56 - Advice on getting started with creating detections</p>
<p> </p>
<p>Keep in touch with Nick Hakmiller on <a href='https://www.linkedin.com/in/nicholas-hakmiller-680508131/'>LinkedIn</a></p>
<p>Reach out to Nick on Panther’s Community <a href='https://slack.runpanther.io/'>Slack</a></p>
<p>Stay up to date with Nick’s work by viewing <a href='https://github.com/panther-labs/panther-analysis'>Panther Analysis</a></p>
<p>Learn more about <a href='https://runpanther.io/?gclid=Cj0KCQjwxdSHBhCdARIsAG6zhlXxOtmRz7HJi0sO8z43Q_vOOtDMawEu-aUwK4TPTNf_N8AOOFJK3wAaAttDEALw_wcB'>Panther Labs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we speak to a Detection and Response expert! Our guest is Nick Hakmiller, Senior Engineering Manager at Panther Labs.</p>
<p>Nick was first exposed to technology in High School where he took an introduction to Visual Basic programming course. When learning about multi-threaded applications Nick became curious and began exploring how to open too many threads to crash a computer. Throughout Nick’s career he’s maintained an interest and focus on attack techniques and building defensive security programs.</p>
<p>On occasions, security controls may fail to catch an attacker. A detection is logic that is applied to logs, security controls, and alerts to notify teams and automated processes. Nick describes Python as an exceptional programming language to apply detections and create detections as code.</p>
<p>Nick describes many aspects of security as an engineering problem. As organizations transform and adopt new technologies, security issues arise and evolve. Nick describes that the team’s that are most successful with applying detection as code have chosen to view security as a function that engineering should participate in and help solve.</p>
<p>As an organization’s security program matures, Nick mentions that the most impactful detections will likely be written and created by someone within the organization. For instance, creating a detection that defines which users should have access to sensitive data is likely to be created by a member of the organization with knowledge of team structure.</p>
<p>Towards the end of the episode, Nick shares his wisdom to any practitioner that wants to step into the role of creating detections and providing impact while doing so.</p>
<p> </p>
<p>Key Takeaways</p>
<p>0:00 - Welcome Back to the Hacker Valley Studio Podcast!</p>
<p>2:29 - Nick Hakmiller, Senior Engineering Manager at Panther Labs</p>
<p>4:20 - How Nick became interested in technology</p>
<p>6:00 - What is a detection?</p>
<p>7:25 - How detection as code applies to cybersecurity and software engineering</p>
<p>10:11 - Prerequisites to consider before applying detection as code</p>
<p>12:27 - Thinking beyond out of the box solutions and applying detections</p>
<p>15:54 - Categories of detections and which are most impactful</p>
<p>23:45 - Reducing alerts by engineering efforts</p>
<p>27:40 - Is it possible to automate everything for security?</p>
<p>32:56 - Advice on getting started with creating detections</p>
<p> </p>
<p>Keep in touch with Nick Hakmiller on <a href='https://www.linkedin.com/in/nicholas-hakmiller-680508131/'>LinkedIn</a></p>
<p>Reach out to Nick on Panther’s Community <a href='https://slack.runpanther.io/'>Slack</a></p>
<p>Stay up to date with Nick’s work by viewing <a href='https://github.com/panther-labs/panther-analysis'>Panther Analysis</a></p>
<p>Learn more about <a href='https://runpanther.io/?gclid=Cj0KCQjwxdSHBhCdARIsAG6zhlXxOtmRz7HJi0sO8z43Q_vOOtDMawEu-aUwK4TPTNf_N8AOOFJK3wAaAttDEALw_wcB'>Panther Labs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6gmkpm/7-12_Nick_Hackmiller8hkuh.mp3" length="91360568" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we speak to a Detection and Response expert! Our guest is Nick Hakmiller, Senior Engineering Manager at Panther Labs.
Nick was first exposed to technology in High School where he took an introduction to Visual Basic programming course. When learning about multi-threaded applications Nick became curious and began exploring how to open too many threads to crash a computer. Throughout Nick’s career he’s maintained an interest and focus on attack techniques and building defensive security programs.
On occasions, security controls may fail to catch an attacker. A detection is logic that is applied to logs, security controls, and alerts to notify teams and automated processes. Nick describes Python as an exceptional programming language to apply detections and create detections as code.
Nick describes many aspects of security as an engineering problem. As organizations transform and adopt new technologies, security issues arise and evolve. Nick describes that the team’s that are most successful with applying detection as code have chosen to view security as a function that engineering should participate in and help solve.
As an organization’s security program matures, Nick mentions that the most impactful detections will likely be written and created by someone within the organization. For instance, creating a detection that defines which users should have access to sensitive data is likely to be created by a member of the organization with knowledge of team structure.
Towards the end of the episode, Nick shares his wisdom to any practitioner that wants to step into the role of creating detections and providing impact while doing so.
 
Key Takeaways
0:00 - Welcome Back to the Hacker Valley Studio Podcast!
2:29 - Nick Hakmiller, Senior Engineering Manager at Panther Labs
4:20 - How Nick became interested in technology
6:00 - What is a detection?
7:25 - How detection as code applies to cybersecurity and software engineering
10:11 - Prerequisites to consider before applying detection as code
12:27 - Thinking beyond out of the box solutions and applying detections
15:54 - Categories of detections and which are most impactful
23:45 - Reducing alerts by engineering efforts
27:40 - Is it possible to automate everything for security?
32:56 - Advice on getting started with creating detections
 
Keep in touch with Nick Hakmiller on LinkedIn
Reach out to Nick on Panther’s Community Slack
Stay up to date with Nick’s work by viewing Panther Analysis
Learn more about Panther Labs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2284</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>156</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>QuickQ: What is Threat Intelligence?</title>
        <itunes:title>QuickQ: What is Threat Intelligence?</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/quickq-what-is-threat-intelligence/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/quickq-what-is-threat-intelligence/#comments</comments>        <pubDate>Thu, 15 Jul 2021 08:32:54 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c164fb36-d38b-37fc-8f98-01fa06e77b75</guid>
                                    <description><![CDATA[<p class="p1">Today’s guests are our very own hosts!  Ron and Chris.  Together they tackle everything that surrounds threat intelligence by answering both the hard and easy questions.</p>
<p class="p1">Between the stories they share about past experiences, and the facts behind threat intelligence, you will learn something new, and that’s a promise!</p>
<p class="p1">In essence, threat intelligence is taking the information about threats or things that can go wrong and applying it to their network and company.  It’s the processing, collection and analyzation of data to understand threat actors, motives, targets and attack behaviors. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">1:10 Episode starts</p>
<p class="p1">2:39 Threat intelligence</p>
<p class="p1">3:00 Ron & Chris share what threat intelligence means to them</p>
<p class="p1">6:33 Organizations and threat intelligence</p>
<p class="p1">8:39 Back in the day</p>
<p class="p1">12:54 Benefits of threat intelligence</p>
<p class="p1">15:08 Skills needed to be in threat intelligence</p>
<p class="p1">19:22 Networking</p>
<p class="p1">23:34 E.A.S.Y.</p>
<p class="p1"> </p>
<p class="p1">Links:</p>
<p class="p1">Email <a href='http://hackervalley.com'>Ron & Chris</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p2">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p2"><a href='https://store.hackervalley.com/'>Hacker Valley Merch!</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Today’s guests are our very own hosts!  Ron and Chris.  Together they tackle everything that surrounds threat intelligence by answering both the hard and easy questions.</p>
<p class="p1">Between the stories they share about past experiences, and the facts behind threat intelligence, you will learn something new, and that’s a promise!</p>
<p class="p1">In essence, threat intelligence is taking the information about threats or things that can go wrong and applying it to their network and company.  It’s the processing, collection and analyzation of data to understand threat actors, motives, targets and attack behaviors. </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">1:10 Episode starts</p>
<p class="p1">2:39 Threat intelligence</p>
<p class="p1">3:00 Ron & Chris share what threat intelligence means to them</p>
<p class="p1">6:33 Organizations and threat intelligence</p>
<p class="p1">8:39 Back in the day</p>
<p class="p1">12:54 Benefits of threat intelligence</p>
<p class="p1">15:08 Skills needed to be in threat intelligence</p>
<p class="p1">19:22 Networking</p>
<p class="p1">23:34 E.A.S.Y.</p>
<p class="p1"> </p>
<p class="p1">Links:</p>
<p class="p1">Email <a href='http://hackervalley.com'>Ron & Chris</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p2">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p2"><a href='https://store.hackervalley.com/'>Hacker Valley Merch!</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/nncydp/Ron_Chris_1_-_Threat_Intelligenceb6r7x.mp3" length="64220744" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Today’s guests are our very own hosts!  Ron and Chris.  Together they tackle everything that surrounds threat intelligence by answering both the hard and easy questions.
Between the stories they share about past experiences, and the facts behind threat intelligence, you will learn something new, and that’s a promise!
In essence, threat intelligence is taking the information about threats or things that can go wrong and applying it to their network and company.  It’s the processing, collection and analyzation of data to understand threat actors, motives, targets and attack behaviors. 
 
Key Takeaways
 
1:10 Episode starts
2:39 Threat intelligence
3:00 Ron & Chris share what threat intelligence means to them
6:33 Organizations and threat intelligence
8:39 Back in the day
12:54 Benefits of threat intelligence
15:08 Skills needed to be in threat intelligence
19:22 Networking
23:34 E.A.S.Y.
 
Links:
Email Ron & Chris
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Hacker Valley Merch!]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1606</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>155</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 154 - Equity in Technology with Olivia Herriford</title>
        <itunes:title>Episode 154 - Equity in Technology with Olivia Herriford</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-154-equity-in-technology-with-olivia-herriford/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-154-equity-in-technology-with-olivia-herriford/#comments</comments>        <pubDate>Tue, 13 Jul 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/becda118-c7b0-367f-9317-a325f3c9811a</guid>
                                    <description><![CDATA[<p class="p1">Today in the studio, we have Olivia Herriford, whose great and exceptional work is focused on equity in technology.  Olivia is the Regional Director and Employer Engagement at Bay Area Community College Consortium.  </p>
<p class="p1">Olivia’s background is in technology, and with the Bay Area Community College Consortium, they support 28 community colleges in the San Francisco Bay region.  She often tells people she has what one would call an “ancient” computer science degree which she earned in 1973.  Olivia takes us back to what it was like to be a black woman in the mid-70s working with hardware and software engineers in the area of hardware design.  Sadly, she experienced a rather hostile work environment.  </p>
<p class="p1">In today’s world, Olivia believes one of the best things we can do for reaching out to younger people is instill confidence.  These young people do not need to be swayed by comparing themselves to others, but rather realize we all bring something unique to the table.  Everyone needs to understand their own capabilities and power.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">2:26 Olivia’s background</p>
<p class="p1">6:38 How Olivia ended up where she is</p>
<p class="p1">15:45 How do we change the environment</p>
<p class="p1">17:17 Progress & future</p>
<p class="p1">20:42 Making an impact</p>
<p class="p1">23:04 Cultivating conversations</p>
<p class="p1">26:22 Equity in technology</p>
<p class="p1">29:08 Advice for awareness</p>
<p class="p1">32:35 Connecting with Olivia</p>
<p class="p1"> </p>
<p class="p1">Links:</p>
<p class="p1">Olivia on <a href='https://www.linkedin.com/in/oliviaherriford/'>LinkedIn</a></p>
<p class="p3">Olivia on <a href='https://www.youtube.com/channel/UCzEym-TC0JlORYdDLI3p45A/featured'>YouTube</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Sponsored by <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Today in the studio, we have Olivia Herriford, whose great and exceptional work is focused on equity in technology.  Olivia is the Regional Director and Employer Engagement at Bay Area Community College Consortium.  </p>
<p class="p1">Olivia’s background is in technology, and with the Bay Area Community College Consortium, they support 28 community colleges in the San Francisco Bay region.  She often tells people she has what one would call an “ancient” computer science degree which she earned in 1973.  Olivia takes us back to what it was like to be a black woman in the mid-70s working with hardware and software engineers in the area of hardware design.  Sadly, she experienced a rather hostile work environment.  </p>
<p class="p1">In today’s world, Olivia believes one of the best things we can do for reaching out to younger people is instill confidence.  These young people do not need to be swayed by comparing themselves to others, but rather realize we all bring something unique to the table.  Everyone needs to understand their own capabilities and power.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">2:26 Olivia’s background</p>
<p class="p1">6:38 How Olivia ended up where she is</p>
<p class="p1">15:45 How do we change the environment</p>
<p class="p1">17:17 Progress & future</p>
<p class="p1">20:42 Making an impact</p>
<p class="p1">23:04 Cultivating conversations</p>
<p class="p1">26:22 Equity in technology</p>
<p class="p1">29:08 Advice for awareness</p>
<p class="p1">32:35 Connecting with Olivia</p>
<p class="p1"> </p>
<p class="p1">Links:</p>
<p class="p1">Olivia on <a href='https://www.linkedin.com/in/oliviaherriford/'>LinkedIn</a></p>
<p class="p3">Olivia on <a href='https://www.youtube.com/channel/UCzEym-TC0JlORYdDLI3p45A/featured'>YouTube</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Sponsored by <a href='https://runpanther.io/'>Panther Labs</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/27bxfw/Olivia_Harriford_27epoa.mp3" length="80321312" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Today in the studio, we have Olivia Herriford, whose great and exceptional work is focused on equity in technology.  Olivia is the Regional Director and Employer Engagement at Bay Area Community College Consortium.  
Olivia’s background is in technology, and with the Bay Area Community College Consortium, they support 28 community colleges in the San Francisco Bay region.  She often tells people she has what one would call an “ancient” computer science degree which she earned in 1973.  Olivia takes us back to what it was like to be a black woman in the mid-70s working with hardware and software engineers in the area of hardware design.  Sadly, she experienced a rather hostile work environment.  
In today’s world, Olivia believes one of the best things we can do for reaching out to younger people is instill confidence.  These young people do not need to be swayed by comparing themselves to others, but rather realize we all bring something unique to the table.  Everyone needs to understand their own capabilities and power.
 
Key Takeaways:
2:26 Olivia’s background
6:38 How Olivia ended up where she is
15:45 How do we change the environment
17:17 Progress & future
20:42 Making an impact
23:04 Cultivating conversations
26:22 Equity in technology
29:08 Advice for awareness
32:35 Connecting with Olivia
 
Links:
Olivia on LinkedIn
Olivia on YouTube
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Sponsored by Panther Labs]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2008</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>154</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 153 - Your Personal Brand in Demand with Stephen Hart</title>
        <itunes:title>Episode 153 - Your Personal Brand in Demand with Stephen Hart</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-153-your-personal-brand-in-demand-with-stephen-hart/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-153-your-personal-brand-in-demand-with-stephen-hart/#comments</comments>        <pubDate>Tue, 06 Jul 2021 07:10:49 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/63024918-74c7-38da-b7e3-fd8ee53fd40a</guid>
                                    <description><![CDATA[<p class="p3">Welcome back to the Hacker Valley Studio podcast. I'm sure you've heard of the term personal brand, and maybe you've asked yourself, what does it mean and how do I promote it. In this episode, we speak to someone that helps others develop their personal brand. We speak to Stephen Hart, entrepreneur, marketer, and brand strategist. We've known Stephen since way back. He's been a huge supporter, and someone that's helped develop our podcast and our branding. And this episode is nothing but pure gold and entertainment. Can't wait for everyone to listen. Let's jump right into it. </p>
<p class="p3">Our guest this episode is Stephen Hart. Stephen is the founder of Isles Media LLC, creator of Brand in Demand, and podcast host of Trailblazers.fm. podcast. Stephen always starts conversations off from a place of gratitude. He is grateful for his daughters, who have given him a “home base to run everything through. Beyond that, his is a Marketer and a podcast host for the last five, five and a half years. He is a brand strategist and the creator of an amazing program that he will talk about in a bit here.</p>
<p class="p3">Listen in as Stephen gives some great tips, and a special invitation.</p>
<p class="p2"> </p>
<p class="p3">00:59 Welcome and Intro to Steven Hart</p>
<p class="p3">2:16 Steven shares his background</p>
<p class="p3">3:45 Become a brand in demand</p>
<p class="p3">6:06 Creating a digital footprint</p>
<p class="p3">8:15 Desire to start a podcast</p>
<p class="p3">9:08 Share others success through Trailblazers.fm</p>
<p class="p3">10:00 Creating a course for others</p>
<p class="p3">11:23 Brand Management</p>
<p class="p3">13:05 Business Digital Footprint vs. Personal footprint</p>
<p class="p3">14:39 Brand does not equal logo</p>
<p class="p3">16:55 Recreating himself</p>
<p class="p3">18:26 Getting clear on goals</p>
<p class="p3">19:55 Lacking clarity & how to get clear</p>
<p class="p3">24:00 Foundation to your vision</p>
<p class="p3">27:10 Entrepreneurship can live simultaneously with employment</p>
<p class="p3">30:46 Investment vs. spending</p>
<p class="p3">32:45 Getting started on your own vision</p>
<p class="p3">35:00 Who do you want to serve?</p>
<p class="p3">37:47 Discount for Hacker Valley Tribe</p>
<p class="p3"> </p>
<p class="p1">Stephen Hart on <a href='https://www.linkedin.com/in/stephenaihart/'>LinkedIn</a></p>
<p class="p1">Stephen Hart on <a href='https://twitter.com/stephenahart'>Twitter</a></p>
<p class="p1">Stephen Hart on <a href='https://www.instagram.com/stephenahart/'>Instagram</a></p>
<p class="p1">Visit Stephen on his website, <a href='https://stephenahart.com/'>stephenahart.com</a></p>
<p class="p1">Join Brand in Demand, <a href='https://brandindemand.co/'>brandindemand.co </a>Coupon code: hackervalley200</p>
<p class="p1">Hacker Valley website, <a href='https://hackervalley.com/'>hackervalley.com</a></p>
<p class="p1">Hacker Valley Studio on <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a></p>
<p class="p1">Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a></p>
<p class="p1">Hacker Valley Studio on <a href='https://www.instagram.com/hackervalleystudio/'>Instagram</a></p>
<p class="p1">Sponsored by <a href='https://attackiq.com/'>AttackIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p3">Welcome back to the Hacker Valley Studio podcast. I'm sure you've heard of the term personal brand, and maybe you've asked yourself, what does it mean and how do I promote it. In this episode, we speak to someone that helps others develop their personal brand. We speak to Stephen Hart, entrepreneur, marketer, and brand strategist. We've known Stephen since way back. He's been a huge supporter, and someone that's helped develop our podcast and our branding. And this episode is nothing but pure gold and entertainment. Can't wait for everyone to listen. Let's jump right into it. </p>
<p class="p3">Our guest this episode is Stephen Hart. Stephen is the founder of Isles Media LLC, creator of Brand in Demand, and podcast host of Trailblazers.fm. podcast. Stephen always starts conversations off from a place of gratitude. He is grateful for his daughters, who have given him a “home base to run everything through. Beyond that, his is a Marketer and a podcast host for the last five, five and a half years. He is a brand strategist and the creator of an amazing program that he will talk about in a bit here.</p>
<p class="p3">Listen in as Stephen gives some great tips, and a special invitation.</p>
<p class="p2"> </p>
<p class="p3">00:59 Welcome and Intro to Steven Hart</p>
<p class="p3">2:16 Steven shares his background</p>
<p class="p3">3:45 Become a brand in demand</p>
<p class="p3">6:06 Creating a digital footprint</p>
<p class="p3">8:15 Desire to start a podcast</p>
<p class="p3">9:08 Share others success through Trailblazers.fm</p>
<p class="p3">10:00 Creating a course for others</p>
<p class="p3">11:23 Brand Management</p>
<p class="p3">13:05 Business Digital Footprint vs. Personal footprint</p>
<p class="p3">14:39 Brand does not equal logo</p>
<p class="p3">16:55 Recreating himself</p>
<p class="p3">18:26 Getting clear on goals</p>
<p class="p3">19:55 Lacking clarity & how to get clear</p>
<p class="p3">24:00 Foundation to your vision</p>
<p class="p3">27:10 Entrepreneurship can live simultaneously with employment</p>
<p class="p3">30:46 Investment vs. spending</p>
<p class="p3">32:45 Getting started on your own vision</p>
<p class="p3">35:00 Who do you want to serve?</p>
<p class="p3">37:47 Discount for Hacker Valley Tribe</p>
<p class="p3"> </p>
<p class="p1">Stephen Hart on <a href='https://www.linkedin.com/in/stephenaihart/'>LinkedIn</a></p>
<p class="p1">Stephen Hart on <a href='https://twitter.com/stephenahart'>Twitter</a></p>
<p class="p1">Stephen Hart on <a href='https://www.instagram.com/stephenahart/'>Instagram</a></p>
<p class="p1">Visit Stephen on his website, <a href='https://stephenahart.com/'>stephenahart.com</a></p>
<p class="p1">Join Brand in Demand, <a href='https://brandindemand.co/'>brandindemand.co </a>Coupon code: hackervalley200</p>
<p class="p1">Hacker Valley website, <a href='https://hackervalley.com/'>hackervalley.com</a></p>
<p class="p1">Hacker Valley Studio on <a href='https://www.linkedin.com/company/hackervalleystudio/'>LinkedIn</a></p>
<p class="p1">Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a></p>
<p class="p1">Hacker Valley Studio on <a href='https://www.instagram.com/hackervalleystudio/'>Instagram</a></p>
<p class="p1">Sponsored by <a href='https://attackiq.com/'>AttackIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/k4j5vv/Stephen_Hart7jv4z.mp3" length="77084823" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Welcome back to the Hacker Valley Studio podcast. I'm sure you've heard of the term personal brand, and maybe you've asked yourself, what does it mean and how do I promote it. In this episode, we speak to someone that helps others develop their personal brand. We speak to Stephen Hart, entrepreneur, marketer, and brand strategist. We've known Stephen since way back. He's been a huge supporter, and someone that's helped develop our podcast and our branding. And this episode is nothing but pure gold and entertainment. Can't wait for everyone to listen. Let's jump right into it. 
Our guest this episode is Stephen Hart. Stephen is the founder of Isles Media LLC, creator of Brand in Demand, and podcast host of Trailblazers.fm. podcast. Stephen always starts conversations off from a place of gratitude. He is grateful for his daughters, who have given him a “home base to run everything through. Beyond that, his is a Marketer and a podcast host for the last five, five and a half years. He is a brand strategist and the creator of an amazing program that he will talk about in a bit here.
Listen in as Stephen gives some great tips, and a special invitation.
 
00:59 Welcome and Intro to Steven Hart
2:16 Steven shares his background
3:45 Become a brand in demand
6:06 Creating a digital footprint
8:15 Desire to start a podcast
9:08 Share others success through Trailblazers.fm
10:00 Creating a course for others
11:23 Brand Management
13:05 Business Digital Footprint vs. Personal footprint
14:39 Brand does not equal logo
16:55 Recreating himself
18:26 Getting clear on goals
19:55 Lacking clarity & how to get clear
24:00 Foundation to your vision
27:10 Entrepreneurship can live simultaneously with employment
30:46 Investment vs. spending
32:45 Getting started on your own vision
35:00 Who do you want to serve?
37:47 Discount for Hacker Valley Tribe
 
Stephen Hart on LinkedIn
Stephen Hart on Twitter
Stephen Hart on Instagram
Visit Stephen on his website, stephenahart.com
Join Brand in Demand, brandindemand.co Coupon code: hackervalley200
Hacker Valley website, hackervalley.com
Hacker Valley Studio on LinkedIn
Hacker Valley Studio on Twitter
Hacker Valley Studio on Instagram
Sponsored by AttackIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2409</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>153</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 152 - Cancelling the Cold Call with Nikki Ivey</title>
        <itunes:title>Episode 152 - Cancelling the Cold Call with Nikki Ivey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-152-cancelling-the-cold-call-with-nikki-ivey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-152-cancelling-the-cold-call-with-nikki-ivey/#comments</comments>        <pubDate>Tue, 29 Jun 2021 07:30:23 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/dca46e30-e441-300c-8be1-3e6079801d75</guid>
                                    <description><![CDATA[<p class="p1">It has been way too long in the making. But it's finally here! We have Hacker Valley merchandise available!  We have shirts, we have hats, we have sweatshirts that you can purchase. </p>
<p class="p1">You are in the Hacker Valley Studio with your hosts Ron and Chris. Welcome back to the show.  Today in the studio, we've brought in Nikki Ivey. Nikki is a B2B revenue growth and startup culture leader. She's recognized as a 2020 LinkedIn top voice, and she is the co-founder of SDR Defenders community. </p>
<p class="p1">For those that want to get to know Nikki and understand where she come from and what she is up to today, Nikki shares she works with Fortune 500 companies to help them make their outsides match their insides. In short, she helps folks close a gap, so everybody has access to a greater sense of belonging and purpose in the work that they do.  </p>
<p class="p1">Sadly, Nikki started down this path because she felt she often did not belong or was not often treated like she belonged. Her mom says her first full sentence was, “That's not fair.” She actually studied broadcasting and journalism but then discovered that tech sales was an outlet for all of those things that she cared about.</p>
<p class="p1">Nikki cares deeply about culture and has experienced so many issues as she has gone through her career.  The one thing she would love to change is people not being the gatekeepers rather be stewards.  </p>
<p class="p1">Nikki has a lot of advice on “cancelling the cold call” and making connections.  She is full of beautiful ideas to make everyone, from top to bottom in a company feel included, important and connected.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">:58 Episode starts with Ron and Chris</p>
<p class="p1">1:40 Nikki shares her background</p>
<p class="p1">2:55 Bringing people into the fold</p>
<p class="p1">5:18 Culture issues</p>
<p class="p1">7:57 Nikki’s superpower</p>
<p class="p1">10:00 Making connections</p>
<p class="p1">14:20 Doubling down</p>
<p class="p1">19:09 Being genuine</p>
<p class="p1">23:11 Building your brand</p>
<p class="p1">26:54 Final piece of advice from Nikki</p>
<p class="p1">Links:</p>
<p class="p1"><a href='http://gmail.com'>Email Nikki</a></p>
<p class="p1">Nikki on <a href='https://www.linkedin.com/in/nikki-ivey/'>LinkedIn</a></p>
<p class="p1">Nikki on <a href='https://www.instagram.com/knownikkiivey/'>Instagram</a></p>
<p class="p1">Nikki on <a href='https://twitter.com/knownikkiivey'>Twitter</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p3">Get your Hacker Valley Merch <a href='https://store.hackervalley.com/'>here</a>!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">It has been way too long in the making. But it's finally here! We have Hacker Valley merchandise available!  We have shirts, we have hats, we have sweatshirts that you can purchase. </p>
<p class="p1">You are in the Hacker Valley Studio with your hosts Ron and Chris. Welcome back to the show.  Today in the studio, we've brought in Nikki Ivey. Nikki is a B2B revenue growth and startup culture leader. She's recognized as a 2020 LinkedIn top voice, and she is the co-founder of SDR Defenders community. </p>
<p class="p1">For those that want to get to know Nikki and understand where she come from and what she is up to today, Nikki shares she works with Fortune 500 companies to help them make their outsides match their insides. In short, she helps folks close a gap, so everybody has access to a greater sense of belonging and purpose in the work that they do.  </p>
<p class="p1">Sadly, Nikki started down this path because she felt she often did not belong or was not often treated like she belonged. Her mom says her first full sentence was, “That's not fair.” She actually studied broadcasting and journalism but then discovered that tech sales was an outlet for all of those things that she cared about.</p>
<p class="p1">Nikki cares deeply about culture and has experienced so many issues as she has gone through her career.  The one thing she would love to change is people not being the gatekeepers rather be stewards.  </p>
<p class="p1">Nikki has a lot of advice on “cancelling the cold call” and making connections.  She is full of beautiful ideas to make everyone, from top to bottom in a company feel included, important and connected.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">:58 Episode starts with Ron and Chris</p>
<p class="p1">1:40 Nikki shares her background</p>
<p class="p1">2:55 Bringing people into the fold</p>
<p class="p1">5:18 Culture issues</p>
<p class="p1">7:57 Nikki’s superpower</p>
<p class="p1">10:00 Making connections</p>
<p class="p1">14:20 Doubling down</p>
<p class="p1">19:09 Being genuine</p>
<p class="p1">23:11 Building your brand</p>
<p class="p1">26:54 Final piece of advice from Nikki</p>
<p class="p1">Links:</p>
<p class="p1"><a href='http://gmail.com'>Email Nikki</a></p>
<p class="p1">Nikki on <a href='https://www.linkedin.com/in/nikki-ivey/'>LinkedIn</a></p>
<p class="p1">Nikki on <a href='https://www.instagram.com/knownikkiivey/'>Instagram</a></p>
<p class="p1">Nikki on <a href='https://twitter.com/knownikkiivey'>Twitter</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p3">Get your Hacker Valley Merch <a href='https://store.hackervalley.com/'>here</a>!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/uetj3q/Nikki_Ivey8oye1.mp3" length="58865123" type="audio/mpeg"/>
        <itunes:summary><![CDATA[It has been way too long in the making. But it's finally here! We have Hacker Valley merchandise available!  We have shirts, we have hats, we have sweatshirts that you can purchase. 
You are in the Hacker Valley Studio with your hosts Ron and Chris. Welcome back to the show.  Today in the studio, we've brought in Nikki Ivey. Nikki is a B2B revenue growth and startup culture leader. She's recognized as a 2020 LinkedIn top voice, and she is the co-founder of SDR Defenders community. 
For those that want to get to know Nikki and understand where she come from and what she is up to today, Nikki shares she works with Fortune 500 companies to help them make their outsides match their insides. In short, she helps folks close a gap, so everybody has access to a greater sense of belonging and purpose in the work that they do.  
Sadly, Nikki started down this path because she felt she often did not belong or was not often treated like she belonged. Her mom says her first full sentence was, “That's not fair.” She actually studied broadcasting and journalism but then discovered that tech sales was an outlet for all of those things that she cared about.
Nikki cares deeply about culture and has experienced so many issues as she has gone through her career.  The one thing she would love to change is people not being the gatekeepers rather be stewards.  
Nikki has a lot of advice on “cancelling the cold call” and making connections.  She is full of beautiful ideas to make everyone, from top to bottom in a company feel included, important and connected.
 
Key Takeaways:
 
:58 Episode starts with Ron and Chris
1:40 Nikki shares her background
2:55 Bringing people into the fold
5:18 Culture issues
7:57 Nikki’s superpower
10:00 Making connections
14:20 Doubling down
19:09 Being genuine
23:11 Building your brand
26:54 Final piece of advice from Nikki
Links:
Email Nikki
Nikki on LinkedIn
Nikki on Instagram
Nikki on Twitter
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Get your Hacker Valley Merch here!]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1840</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>152</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 151 - Health is Wealth with Alexis Robertson</title>
        <itunes:title>Episode 151 - Health is Wealth with Alexis Robertson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-151-health-is-wealth-with-alexis-robertson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-151-health-is-wealth-with-alexis-robertson/#comments</comments>        <pubDate>Tue, 22 Jun 2021 04:49:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/486e04dd-1124-38b2-8463-17662395fbbf</guid>
                                    <description><![CDATA[<p class="p1">Today in the studio, we have Alexis Robertson, Director of Diversity and Inclusion at a large law firm and a recovering lawyer. </p>
<p class="p1">Alexis kicks in with a bit about herself, and shares “I am director of diversity inclusion at a large law firm but spent the first 10 years or so of my career dedicated to laws, going to law school and practicing as a lawyer for about seven and a half years before leaving legal practice closing in on six years ago, I grew up in the suburbs of Milwaukee, Wisconsin, spent most of my life in the Midwest, except for time spent in DC at American University for undergrad and then I went to the University of Michigan for law school. That's me in a nutshell.”</p>
<p class="p1">Alexis shares throughout this episode how her health, exercise and food habits all became habit with some very big changes.  It isn’t about getting healthy; it is about a long journey of being healthy.  You will hear a little bit about her food choices and why she made them, the exercises she partakes in, and how she balances it all.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:27 Welcome</p>
<p class="p1">2:23 Alexis shares her background</p>
<p class="p1">3:25 Serendipity</p>
<p class="p1">5:33 Self-improvement journey</p>
<p class="p1">12:41 Healthy mentality with food</p>
<p class="p1">17:20 Next steps</p>
<p class="p1">21:12 Getting back on track</p>
<p class="p1">24:07 Fitness journey</p>
<p class="p1">28:16 Looking forward</p>
<p class="p1">31:13 Advice to others</p>
<p class="p1">33:17 Staying in touch with Alexis</p>
<p class="p1"> </p>
<p class="p1">Alexis on <a href='https://www.linkedin.com/in/alexisrobertson/'>LinkedIn</a></p>
<p class="p1">Alexis on <a href='https://www.instagram.com/alexis_robertson/'>Instagram</a></p>
<p class="p3"><a href='https://podcasts.apple.com/us/podcast/the-path-the-practice/id1523076918'>The Path & The Practice Podcast</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p4">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p4">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek.</a></p>
<p class="p1"> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Today in the studio, we have Alexis Robertson, Director of Diversity and Inclusion at a large law firm and a recovering lawyer. </p>
<p class="p1">Alexis kicks in with a bit about herself, and shares “I am director of diversity inclusion at a large law firm but spent the first 10 years or so of my career dedicated to laws, going to law school and practicing as a lawyer for about seven and a half years before leaving legal practice closing in on six years ago, I grew up in the suburbs of Milwaukee, Wisconsin, spent most of my life in the Midwest, except for time spent in DC at American University for undergrad and then I went to the University of Michigan for law school. That's me in a nutshell.”</p>
<p class="p1">Alexis shares throughout this episode how her health, exercise and food habits all became habit with some very big changes.  It isn’t about getting healthy; it is about a long journey of being healthy.  You will hear a little bit about her food choices and why she made them, the exercises she partakes in, and how she balances it all.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:27 Welcome</p>
<p class="p1">2:23 Alexis shares her background</p>
<p class="p1">3:25 Serendipity</p>
<p class="p1">5:33 Self-improvement journey</p>
<p class="p1">12:41 Healthy mentality with food</p>
<p class="p1">17:20 Next steps</p>
<p class="p1">21:12 Getting back on track</p>
<p class="p1">24:07 Fitness journey</p>
<p class="p1">28:16 Looking forward</p>
<p class="p1">31:13 Advice to others</p>
<p class="p1">33:17 Staying in touch with Alexis</p>
<p class="p1"> </p>
<p class="p1">Alexis on <a href='https://www.linkedin.com/in/alexisrobertson/'>LinkedIn</a></p>
<p class="p1">Alexis on <a href='https://www.instagram.com/alexis_robertson/'>Instagram</a></p>
<p class="p3"><a href='https://podcasts.apple.com/us/podcast/the-path-the-practice/id1523076918'>The Path & The Practice Podcast</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p4">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p4">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek.</a></p>
<p class="p1"> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/e32a2c/HVS_AlexisRobertson.mp3" length="65627788" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Today in the studio, we have Alexis Robertson, Director of Diversity and Inclusion at a large law firm and a recovering lawyer. 
Alexis kicks in with a bit about herself, and shares “I am director of diversity inclusion at a large law firm but spent the first 10 years or so of my career dedicated to laws, going to law school and practicing as a lawyer for about seven and a half years before leaving legal practice closing in on six years ago, I grew up in the suburbs of Milwaukee, Wisconsin, spent most of my life in the Midwest, except for time spent in DC at American University for undergrad and then I went to the University of Michigan for law school. That's me in a nutshell.”
Alexis shares throughout this episode how her health, exercise and food habits all became habit with some very big changes.  It isn’t about getting healthy; it is about a long journey of being healthy.  You will hear a little bit about her food choices and why she made them, the exercises she partakes in, and how she balances it all.  
 
Key Takeaways:
 
1:27 Welcome
2:23 Alexis shares her background
3:25 Serendipity
5:33 Self-improvement journey
12:41 Healthy mentality with food
17:20 Next steps
21:12 Getting back on track
24:07 Fitness journey
28:16 Looking forward
31:13 Advice to others
33:17 Staying in touch with Alexis
 
Alexis on LinkedIn
Alexis on Instagram
The Path & The Practice Podcast
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek.
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2051</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>151</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 150 - Making a Difference Mindfully with Natasha Barnes</title>
        <itunes:title>Episode 150 - Making a Difference Mindfully with Natasha Barnes</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-150-making-a-difference-mindfully-with-natasha-barnes/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-150-making-a-difference-mindfully-with-natasha-barnes/#comments</comments>        <pubDate>Tue, 15 Jun 2021 05:34:49 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/97be9630-26e1-3bdc-af5b-5542ad942f02</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we talk to our special guest, Natasha Barnes. Natasha is the Associate Director and the CEO Action for Racial Equity Fellow of Protiviti. She is a certified mindfulness workplace facilitator and mindfulness-based stress reduction. </p>
<p class="p1">Natasha is part of a movement to answer the question of does corporate America have a role to play in advancing racial equity within our nation, and essentially improving our overall societal well-being. </p>
<p class="p1">Technology serves as a way to propel the conversation forward, and recognizing global interconnectedness.</p>
<p class="p1">Listen in for all of Natasha’s insights!</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:02 Welcome back</p>
<p class="p1">2:16 Natasha shares her background</p>
<p class="p1">3:11 Natasha’s journey through wellness</p>
<p class="p1">4:23 Mindfulness purpose</p>
<p class="p1">6:28 Instructing others </p>
<p class="p1">10:27 Corporate role </p>
<p class="p1">10:52 Four pillars</p>
<p class="p1">15:06 Her journey</p>
<p class="p1">17:24 Creating solutions</p>
<p class="p1">19:24 Progress</p>
<p class="p1">21:39 Equity through mindfulness and technology</p>
<p class="p1">26:48 Impact</p>
<p class="p1"> </p>
<p class="p1">Natasha on <a href='https://www.linkedin.com/in/natasharbarnes/'>LinkedIn</a></p>
<p class="p2"><a href='https://www.ceoaction.com/racial-equity/'>CEO Action for Diversity & Inclusion</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p4">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p4">Sponsored by <a href='https://www.bytechek.com/'>ByteChek</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we talk to our special guest, Natasha Barnes. Natasha is the Associate Director and the CEO Action for Racial Equity Fellow of Protiviti. She is a certified mindfulness workplace facilitator and mindfulness-based stress reduction. </p>
<p class="p1">Natasha is part of a movement to answer the question of does corporate America have a role to play in advancing racial equity within our nation, and essentially improving our overall societal well-being. </p>
<p class="p1">Technology serves as a way to propel the conversation forward, and recognizing global interconnectedness.</p>
<p class="p1">Listen in for all of Natasha’s insights!</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:02 Welcome back</p>
<p class="p1">2:16 Natasha shares her background</p>
<p class="p1">3:11 Natasha’s journey through wellness</p>
<p class="p1">4:23 Mindfulness purpose</p>
<p class="p1">6:28 Instructing others </p>
<p class="p1">10:27 Corporate role </p>
<p class="p1">10:52 Four pillars</p>
<p class="p1">15:06 Her journey</p>
<p class="p1">17:24 Creating solutions</p>
<p class="p1">19:24 Progress</p>
<p class="p1">21:39 Equity through mindfulness and technology</p>
<p class="p1">26:48 Impact</p>
<p class="p1"> </p>
<p class="p1">Natasha on <a href='https://www.linkedin.com/in/natasharbarnes/'>LinkedIn</a></p>
<p class="p2"><a href='https://www.ceoaction.com/racial-equity/'>CEO Action for Diversity & Inclusion</a></p>
<p class="p4">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p4">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p4">Sponsored by <a href='https://www.bytechek.com/'>ByteChek</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3de42r/Natasha_Barnes.mp3" length="60169393" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we talk to our special guest, Natasha Barnes. Natasha is the Associate Director and the CEO Action for Racial Equity Fellow of Protiviti. She is a certified mindfulness workplace facilitator and mindfulness-based stress reduction. 
Natasha is part of a movement to answer the question of does corporate America have a role to play in advancing racial equity within our nation, and essentially improving our overall societal well-being. 
Technology serves as a way to propel the conversation forward, and recognizing global interconnectedness.
Listen in for all of Natasha’s insights!
 
Key Takeaways:
 
1:02 Welcome back
2:16 Natasha shares her background
3:11 Natasha’s journey through wellness
4:23 Mindfulness purpose
6:28 Instructing others 
10:27 Corporate role 
10:52 Four pillars
15:06 Her journey
17:24 Creating solutions
19:24 Progress
21:39 Equity through mindfulness and technology
26:48 Impact
 
Natasha on LinkedIn
CEO Action for Diversity & Inclusion
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Sponsored by ByteChek]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1880</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>150</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 149  - Permission to Launch with Kelsey Hightower</title>
        <itunes:title>Episode 149  - Permission to Launch with Kelsey Hightower</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-149-permission-to-launch-with-kelsey-hightower/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-149-permission-to-launch-with-kelsey-hightower/#comments</comments>        <pubDate>Tue, 08 Jun 2021 04:05:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1f26bc5a-e9be-3320-929c-c6806752a8ae</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we've brought in a special guest, Kelsey Hightower.  Kelsey is Principal Engineer at Google, and also co-author of Kubernetes: Up and Running: Dive into the Future of Infrastructure. </p>
<p class="p1">To start the show, Kelsey shares he considers himself a self-taught engineer. He started his life out as a small business owner and then moved to a system administrator. Now, he is at Google.</p>
<p class="p1">Kelsey’s fascination with cyber started post High School. Rather than go to college, he jumped into, tech support, consulting, dropping cat five cable, but about 2004ish he really digs into the world of open source and all the things that you can do with it as a user and as a contributor.</p>
<p class="p1">When it comes to community and customers, Kelsey felt they were one in the same.  However, in the last five years or so, he has kind of changed that a little bit, thinking everyone is probably in your community. The willing the ones that are willing to pay you money, we call those customers.</p>
<p class="p1">And then the conversation turns to comedy, and his journey through comedy management and performances.  Along with this comes discussion about acquiring skills.  </p>
<p class="p1">Finally, Kelsey shares advice to listeners!</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:00 Welcome back</p>
<p class="p1">2:18 Kelsey shares his background</p>
<p class="p1">3:31 Community and customers</p>
<p class="p1">4:40 Professional purpose</p>
<p class="p1">6:00 Retirement thoughts</p>
<p class="p1">10:31 Journey in comedy</p>
<p class="p1">14:35 Getting better</p>
<p class="p1">16:28 Propelling forward</p>
<p class="p1">20:12 Minimalism</p>
<p class="p1">22:18 Immersion journey</p>
<p class="p1">25:25 Don’t miss the moment</p>
<p class="p1">27:00 Exceeding expectations</p>
<p class="p1">37:56 It’s ok to start!</p>
<p class="p1">39:25 How to keep up to date with Kelsey</p>
<p class="p1">Kelsey on <a href='https://twitter.com/kelseyhightower'>Twitter</a></p>
<p class="p2">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p2">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p2">Sponsored by <a href='https://attackiq.com/'>Attack IQ</a></p>
<p class="p1">Attack IQ <a href='https://academy.attackiq.com/'>Academy</a></p>
<p class="p1"> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we've brought in a special guest, Kelsey Hightower.  Kelsey is Principal Engineer at Google, and also co-author of Kubernetes: Up and Running: Dive into the Future of Infrastructure. </p>
<p class="p1">To start the show, Kelsey shares he considers himself a self-taught engineer. He started his life out as a small business owner and then moved to a system administrator. Now, he is at Google.</p>
<p class="p1">Kelsey’s fascination with cyber started post High School. Rather than go to college, he jumped into, tech support, consulting, dropping cat five cable, but about 2004ish he really digs into the world of open source and all the things that you can do with it as a user and as a contributor.</p>
<p class="p1">When it comes to community and customers, Kelsey felt they were one in the same.  However, in the last five years or so, he has kind of changed that a little bit, thinking everyone is probably in your community. The willing the ones that are willing to pay you money, we call those customers.</p>
<p class="p1">And then the conversation turns to comedy, and his journey through comedy management and performances.  Along with this comes discussion about acquiring skills.  </p>
<p class="p1">Finally, Kelsey shares advice to listeners!</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:00 Welcome back</p>
<p class="p1">2:18 Kelsey shares his background</p>
<p class="p1">3:31 Community and customers</p>
<p class="p1">4:40 Professional purpose</p>
<p class="p1">6:00 Retirement thoughts</p>
<p class="p1">10:31 Journey in comedy</p>
<p class="p1">14:35 Getting better</p>
<p class="p1">16:28 Propelling forward</p>
<p class="p1">20:12 Minimalism</p>
<p class="p1">22:18 Immersion journey</p>
<p class="p1">25:25 Don’t miss the moment</p>
<p class="p1">27:00 Exceeding expectations</p>
<p class="p1">37:56 It’s ok to start!</p>
<p class="p1">39:25 How to keep up to date with Kelsey</p>
<p class="p1">Kelsey on <a href='https://twitter.com/kelseyhightower'>Twitter</a></p>
<p class="p2">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p2">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p2">Sponsored by <a href='https://attackiq.com/'>Attack IQ</a></p>
<p class="p1">Attack IQ <a href='https://academy.attackiq.com/'>Academy</a></p>
<p class="p1"> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/atgg2w/HVS_Kelsey_Hightower.mp3" length="77532383" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we've brought in a special guest, Kelsey Hightower.  Kelsey is Principal Engineer at Google, and also co-author of Kubernetes: Up and Running: Dive into the Future of Infrastructure. 
To start the show, Kelsey shares he considers himself a self-taught engineer. He started his life out as a small business owner and then moved to a system administrator. Now, he is at Google.
Kelsey’s fascination with cyber started post High School. Rather than go to college, he jumped into, tech support, consulting, dropping cat five cable, but about 2004ish he really digs into the world of open source and all the things that you can do with it as a user and as a contributor.
When it comes to community and customers, Kelsey felt they were one in the same.  However, in the last five years or so, he has kind of changed that a little bit, thinking everyone is probably in your community. The willing the ones that are willing to pay you money, we call those customers.
And then the conversation turns to comedy, and his journey through comedy management and performances.  Along with this comes discussion about acquiring skills.  
Finally, Kelsey shares advice to listeners!
 
Key Takeaways:
 
1:00 Welcome back
2:18 Kelsey shares his background
3:31 Community and customers
4:40 Professional purpose
6:00 Retirement thoughts
10:31 Journey in comedy
14:35 Getting better
16:28 Propelling forward
20:12 Minimalism
22:18 Immersion journey
25:25 Don’t miss the moment
27:00 Exceeding expectations
37:56 It’s ok to start!
39:25 How to keep up to date with Kelsey
Kelsey on Twitter
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Sponsored by Attack IQ
Attack IQ Academy
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2423</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>149</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 148 - Immersed in Cybersecurity with James Hadley</title>
        <itunes:title>Episode 148 - Immersed in Cybersecurity with James Hadley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-148-immersed-in-cybersecurity-with-james-hadley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-148-immersed-in-cybersecurity-with-james-hadley/#comments</comments>        <pubDate>Wed, 02 Jun 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/70a90077-26b1-305f-b9e9-13ca1cf69ed1</guid>
                                    <description><![CDATA[<p class="p2">In this episode, have James Hadley, CEO of Immersive Labs, and we talk about the best ways to learn in cybersecurity. </p>
<p class="p2">James starts the show with his background and what he is doing today, which is Immersive Labs.  But, he spent a lot of time in different organizations prior to that.  </p>
<p class="p2">When it came to education, James found he had quite a poor memory, so he would always learn better through doing things rather than reading about things. Things would go in one ear and out the other.</p>
<p class="p2">In addition to learning styles, they all discuss measuring education.  When it comes to measuring academics, for James it is all about the outcomes you want people to achieve. </p>
<p class="p2">They all agree that storytelling is incredibly powerful.  James shares a few of his own drawing back on his incredible journey.  And, of course, they round out the show with how to stay in touch and up to date with James.</p>
<p class="p1"> </p>
<p class="p2">Key Takeaways:</p>
<p class="p2">1:02 Welcome back</p>
<p class="p2">2:24 James’ background</p>
<p class="p2">5:06 Education experience</p>
<p class="p2">5:46 Changes</p>
<p class="p2">7:18 Measuring education</p>
<p class="p2">9:14 Balancing in testing</p>
<p class="p2">11:40 Biggest a’ha</p>
<p class="p2">13:14 Feedback</p>
<p class="p2">15:54 Learner vs. learner</p>
<p class="p2">17:37 Skill behind catching the bad guys</p>
<p class="p2">19:20 Applying knowledge</p>
<p class="p2">21:53 Geeks in the basement</p>
<p class="p2">23:47 The best job in cyber</p>
<p class="p2">26:30 Advice</p>
<p class="p2">27:58 How to stay in touch with James</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">James on <a href='https://www.immersivelabs.com/'>Immersive Labs</a></p>
<p class="p1">James on <a href='https://www.linkedin.com/in/james-hadley-8441397/?originalSubdomain=uk'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek.</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p2">In this episode, have James Hadley, CEO of Immersive Labs, and we talk about the best ways to learn in cybersecurity. </p>
<p class="p2">James starts the show with his background and what he is doing today, which is Immersive Labs.  But, he spent a lot of time in different organizations prior to that.  </p>
<p class="p2">When it came to education, James found he had quite a poor memory, so he would always learn better through doing things rather than reading about things. Things would go in one ear and out the other.</p>
<p class="p2">In addition to learning styles, they all discuss measuring education.  When it comes to measuring academics, for James it is all about the outcomes you want people to achieve. </p>
<p class="p2">They all agree that storytelling is incredibly powerful.  James shares a few of his own drawing back on his incredible journey.  And, of course, they round out the show with how to stay in touch and up to date with James.</p>
<p class="p1"> </p>
<p class="p2">Key Takeaways:</p>
<p class="p2">1:02 Welcome back</p>
<p class="p2">2:24 James’ background</p>
<p class="p2">5:06 Education experience</p>
<p class="p2">5:46 Changes</p>
<p class="p2">7:18 Measuring education</p>
<p class="p2">9:14 Balancing in testing</p>
<p class="p2">11:40 Biggest a’ha</p>
<p class="p2">13:14 Feedback</p>
<p class="p2">15:54 Learner vs. learner</p>
<p class="p2">17:37 Skill behind catching the bad guys</p>
<p class="p2">19:20 Applying knowledge</p>
<p class="p2">21:53 Geeks in the basement</p>
<p class="p2">23:47 The best job in cyber</p>
<p class="p2">26:30 Advice</p>
<p class="p2">27:58 How to stay in touch with James</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">James on <a href='https://www.immersivelabs.com/'>Immersive Labs</a></p>
<p class="p1">James on <a href='https://www.linkedin.com/in/james-hadley-8441397/?originalSubdomain=uk'>LinkedIn</a></p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek.</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9wkuy7/HVS_James_Hadley_5-20.mp3" length="55806518" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, have James Hadley, CEO of Immersive Labs, and we talk about the best ways to learn in cybersecurity. 
James starts the show with his background and what he is doing today, which is Immersive Labs.  But, he spent a lot of time in different organizations prior to that.  
When it came to education, James found he had quite a poor memory, so he would always learn better through doing things rather than reading about things. Things would go in one ear and out the other.
In addition to learning styles, they all discuss measuring education.  When it comes to measuring academics, for James it is all about the outcomes you want people to achieve. 
They all agree that storytelling is incredibly powerful.  James shares a few of his own drawing back on his incredible journey.  And, of course, they round out the show with how to stay in touch and up to date with James.
 
Key Takeaways:
1:02 Welcome back
2:24 James’ background
5:06 Education experience
5:46 Changes
7:18 Measuring education
9:14 Balancing in testing
11:40 Biggest a’ha
13:14 Feedback
15:54 Learner vs. learner
17:37 Skill behind catching the bad guys
19:20 Applying knowledge
21:53 Geeks in the basement
23:47 The best job in cyber
26:30 Advice
27:58 How to stay in touch with James
 
Links:
James on Immersive Labs
James on LinkedIn
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1744</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>148</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 147 - Learning Cybersecurity Until You Get It Right with John Strand</title>
        <itunes:title>Episode 147 - Learning Cybersecurity Until You Get It Right with John Strand</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-147-learning-cybersecurity-until-you-get-it-right-with-john-strand/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-147-learning-cybersecurity-until-you-get-it-right-with-john-strand/#comments</comments>        <pubDate>Tue, 25 May 2021 04:21:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e1911523-49af-36c1-9097-36e5957e39d5</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we brought back fan-favorite, John Strand.  He is owner of Black Hills Information Security, a SANS instructor, and a mentor to many in the industry. </p>
<p class="p1">Johns starts the show sharing a little bit about his background and what he is doing today.</p>
<p class="p1">Ron and Chris dive a little bit deeper into John’s earlier life asking what his personal superpower, personal or professional, and when did that power really came about in his life?</p>
<p class="p1">John shares his experiences with failure, which he feels are key to where he is at today.  How everyone needs to get comfortable with struggles, failures and hardships.  On top of that, one needs to be able to laugh at themself.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">1:02 Back with fan favorite John Strand</p>
<p class="p1">2:21 John shares his background</p>
<p class="p1">3:38 John’s superpower</p>
<p class="p1">5:51 Going through the grind to learn</p>
<p class="p1">8:30 Partnerships</p>
<p class="p1">11:44 Getting a head start</p>
<p class="p1">14:58 The entertainment factor</p>
<p class="p1">16:36 Journey through being an instructor</p>
<p class="p1">19:35 Pay what you can concept</p>
<p class="p1">25:53 Education systems</p>
<p class="p1">29:18 Advice from John</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">John Strand <a href='https://www.blackhillsinfosec.com/blog/'>blog.</a></p>
<p class="p1">John Strand on <a href='https://twitter.com/strandjs'>Twitter</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek.</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we brought back fan-favorite, John Strand.  He is owner of Black Hills Information Security, a SANS instructor, and a mentor to many in the industry. </p>
<p class="p1">Johns starts the show sharing a little bit about his background and what he is doing today.</p>
<p class="p1">Ron and Chris dive a little bit deeper into John’s earlier life asking what his personal superpower, personal or professional, and when did that power really came about in his life?</p>
<p class="p1">John shares his experiences with failure, which he feels are key to where he is at today.  How everyone needs to get comfortable with struggles, failures and hardships.  On top of that, one needs to be able to laugh at themself.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">1:02 Back with fan favorite John Strand</p>
<p class="p1">2:21 John shares his background</p>
<p class="p1">3:38 John’s superpower</p>
<p class="p1">5:51 Going through the grind to learn</p>
<p class="p1">8:30 Partnerships</p>
<p class="p1">11:44 Getting a head start</p>
<p class="p1">14:58 The entertainment factor</p>
<p class="p1">16:36 Journey through being an instructor</p>
<p class="p1">19:35 Pay what you can concept</p>
<p class="p1">25:53 Education systems</p>
<p class="p1">29:18 Advice from John</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">John Strand <a href='https://www.blackhillsinfosec.com/blog/'>blog.</a></p>
<p class="p1">John Strand on <a href='https://twitter.com/strandjs'>Twitter</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.  Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter.</a></p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek.</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/t9di5d/HVS_JohnStrand.mp3" length="61363443" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we brought back fan-favorite, John Strand.  He is owner of Black Hills Information Security, a SANS instructor, and a mentor to many in the industry. 
Johns starts the show sharing a little bit about his background and what he is doing today.
Ron and Chris dive a little bit deeper into John’s earlier life asking what his personal superpower, personal or professional, and when did that power really came about in his life?
John shares his experiences with failure, which he feels are key to where he is at today.  How everyone needs to get comfortable with struggles, failures and hardships.  On top of that, one needs to be able to laugh at themself.  
 
Key Takeaways
 
1:02 Back with fan favorite John Strand
2:21 John shares his background
3:38 John’s superpower
5:51 Going through the grind to learn
8:30 Partnerships
11:44 Getting a head start
14:58 The entertainment factor
16:36 Journey through being an instructor
19:35 Pay what you can concept
25:53 Education systems
29:18 Advice from John
 
Links:
John Strand blog.
John Strand on Twitter.
Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1918</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>147</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Season 2 Finale</title>
        <itunes:title>Hacker Valley Blue Season 2 Finale</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-season-2-finale/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-season-2-finale/#comments</comments>        <pubDate>Tue, 18 May 2021 05:45:41 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/af86fbe0-41a8-33b0-97ed-99c93ddfa7c2</guid>
                                    <description><![CDATA[<p class="p1">This is the finale of Know Thyself. What an incredible journey, we feel like this entire experience flew by so fast, we got to talk to so many incredible people about knowing yourself, knowing your team, knowing your tech stack, knowing your environment, and even knowing your story.</p>
<p class="p1">Make your organization better make your security posture better, strive for impact, what are the most high leverage things that you can do today to make everybody's lives easier, or more safe, and then yield the feedback, there might be some things that you might be missing, you might need to ask questions, ask for feedback, get some information from your stakeholders, what what are you thinking about that I might not be thinking about? asking these different things is how you know thyself. And this is how you get to know the people that are around you, your peers, your stakeholders, the more knowledge you have got started with that Sun Tzu quote, in the very beginning of the podcast, if you know yourself and you know your enemy, you need not fear the results of 100 battles. So if you really understand yourself, and you have good threat intelligence, understanding the externals, you have good vulnerability management that understands the externals and the internals, if you mash all that information together, I think you'll be able to do great things with your cybersecurity program.</p>
<p class="p3"> </p>
<p class="p1">Key Takeaways</p>
<p class="p1">0:02 Introduction to the show</p>
<p class="p1">0:49 Our Sponsor, Axonius </p>
<p class="p1">2:09 Welcome back</p>
<p class="p1">2:31 Reflecting on Know Thyself</p>
<p class="p1">3:17 Recap This Seasons Guest</p>
<p class="p1">3:22 Marcus Carey</p>
<p class="p1">4:17 John Strand</p>
<p class="p1">5:05 Aaron Reinhart & Jamie Dixon</p>
<p class="p1">5:54 Chaos Engineering</p>
<p class="p1">7:12 Lenny Zeltser, asset inventory</p>
<p class="p1">7:54 Kevin Allison, Storytelling is a soft skill</p>
<p class="p1">10:19 John Strand</p>
<p class="p1">12:13 Can we do better?</p>
<p class="p1">13:54 What kind of leader are you?</p>
<p class="p1">14:26 Do you have unsupported devices?</p>
<p class="p1">17:34 Ask yourself these questions</p>
<p class="p1">13:33 Go back to the EASY Framework</p>
<p class="p1">21:50 Learning</p>
<p class="p1">23:29 Exploration</p>
<p class="p1">24:00 Immersion</p>
<p class="p1">27:28 Reach Hacker Valley</p>
<p class="p2"> </p>
<p class="p4"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p4"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p4"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p4"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p4"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p4"><a href='https://www.axonius.com/'>Supported by Axonius</a></p>
<p class="p5"> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This is the finale of Know Thyself. What an incredible journey, we feel like this entire experience flew by so fast, we got to talk to so many incredible people about knowing yourself, knowing your team, knowing your tech stack, knowing your environment, and even knowing your story.</p>
<p class="p1">Make your organization better make your security posture better, strive for impact, what are the most high leverage things that you can do today to make everybody's lives easier, or more safe, and then yield the feedback, there might be some things that you might be missing, you might need to ask questions, ask for feedback, get some information from your stakeholders, what what are you thinking about that I might not be thinking about? asking these different things is how you know thyself. And this is how you get to know the people that are around you, your peers, your stakeholders, the more knowledge you have got started with that Sun Tzu quote, in the very beginning of the podcast, if you know yourself and you know your enemy, you need not fear the results of 100 battles. So if you really understand yourself, and you have good threat intelligence, understanding the externals, you have good vulnerability management that understands the externals and the internals, if you mash all that information together, I think you'll be able to do great things with your cybersecurity program.</p>
<p class="p3"> </p>
<p class="p1">Key Takeaways</p>
<p class="p1">0:02 Introduction to the show</p>
<p class="p1">0:49 Our Sponsor, Axonius </p>
<p class="p1">2:09 Welcome back</p>
<p class="p1">2:31 Reflecting on Know Thyself</p>
<p class="p1">3:17 Recap This Seasons Guest</p>
<p class="p1">3:22 Marcus Carey</p>
<p class="p1">4:17 John Strand</p>
<p class="p1">5:05 Aaron Reinhart & Jamie Dixon</p>
<p class="p1">5:54 Chaos Engineering</p>
<p class="p1">7:12 Lenny Zeltser, asset inventory</p>
<p class="p1">7:54 Kevin Allison, Storytelling is a soft skill</p>
<p class="p1">10:19 John Strand</p>
<p class="p1">12:13 Can we do better?</p>
<p class="p1">13:54 What kind of leader are you?</p>
<p class="p1">14:26 Do you have unsupported devices?</p>
<p class="p1">17:34 Ask yourself these questions</p>
<p class="p1">13:33 Go back to the EASY Framework</p>
<p class="p1">21:50 Learning</p>
<p class="p1">23:29 Exploration</p>
<p class="p1">24:00 Immersion</p>
<p class="p1">27:28 Reach Hacker Valley</p>
<p class="p2"> </p>
<p class="p4"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p4"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p4"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p4"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p4"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p4"><a href='https://www.axonius.com/'>Supported by Axonius</a></p>
<p class="p5"> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5mbnwg/HVB_S2_Finale.mp3" length="53866813" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This is the finale of Know Thyself. What an incredible journey, we feel like this entire experience flew by so fast, we got to talk to so many incredible people about knowing yourself, knowing your team, knowing your tech stack, knowing your environment, and even knowing your story.
Make your organization better make your security posture better, strive for impact, what are the most high leverage things that you can do today to make everybody's lives easier, or more safe, and then yield the feedback, there might be some things that you might be missing, you might need to ask questions, ask for feedback, get some information from your stakeholders, what what are you thinking about that I might not be thinking about? asking these different things is how you know thyself. And this is how you get to know the people that are around you, your peers, your stakeholders, the more knowledge you have got started with that Sun Tzu quote, in the very beginning of the podcast, if you know yourself and you know your enemy, you need not fear the results of 100 battles. So if you really understand yourself, and you have good threat intelligence, understanding the externals, you have good vulnerability management that understands the externals and the internals, if you mash all that information together, I think you'll be able to do great things with your cybersecurity program.
 
Key Takeaways
0:02 Introduction to the show
0:49 Our Sponsor, Axonius 
2:09 Welcome back
2:31 Reflecting on Know Thyself
3:17 Recap This Seasons Guest
3:22 Marcus Carey
4:17 John Strand
5:05 Aaron Reinhart & Jamie Dixon
5:54 Chaos Engineering
7:12 Lenny Zeltser, asset inventory
7:54 Kevin Allison, Storytelling is a soft skill
10:19 John Strand
12:13 Can we do better?
13:54 What kind of leader are you?
14:26 Do you have unsupported devices?
17:34 Ask yourself these questions
13:33 Go back to the EASY Framework
21:50 Learning
23:29 Exploration
24:00 Immersion
27:28 Reach Hacker Valley
 
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ron Eddings on Twitter
Follow Chris Cochran on Twitter
Supported by Axonius
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1683</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>146</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue S2 Episode 7 - Kevin Allison</title>
        <itunes:title>Hacker Valley Blue S2 Episode 7 - Kevin Allison</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-7-kevin-allison/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-7-kevin-allison/#comments</comments>        <pubDate>Tue, 18 May 2021 05:41:35 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3f6f404d-40c4-349e-85c9-757a50b716d9</guid>
                                    <description><![CDATA[<p class="p1">In this masterclass of HVB season 2 we brought in a master story teller in Kevin Allison. The biggest thing is to get a person to understand, don't just summarize, don't just walk us through a Wikipedia like where you're just giving us a broad overview. And you're explaining; it’s important to remember sensory details that will help us see almost like movie scenes, what was happening between people. That is what brings the story alive. So that's a good case right there where the bones of the story were incredible. Like that's just on paper and an incredible overview of a story, but it's not going to work unless you can fill in all those sensory details that bring it alive and make it emotional for us.</p>
<p class="p1">Storytelling is a soft skill that offers the ability to contextualize cybersecurity in a manner that any organization can understand to allow their business to stay safe.</p>
<p class="p3"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">0:00 Previously on the show</p>
<p class="p1">2:37 Kevin introduction</p>
<p class="p1">3:20 Episode begins</p>
<p class="p1">3:39 Where Kevin is today</p>
<p class="p1">7:58 Kevin’s origin story</p>
<p class="p1">12:04 Cybersecurity is performing</p>
<p class="p1">17:08 Storytelling for business</p>
<p class="p1">21:00 Engineering a story</p>
<p class="p1">26:12 Authentic storytelling</p>
<p class="p1">34:54 Speaking isn’t perfect</p>
<p class="p1">41:02 Where to find Kevin</p>
<p class="p2"> </p>
<p class="p4"><a href='https://thestorystudio.org/'>The Story Studio</a></p>
<p class="p5"><a href='http://theriskbook.com/'>RISK!: True Stories People Never Thought They’d Dare To Share</a></p>
<p class="p4"><a href='http://risk-show.com/listen/'>RISK! Podcast</a></p>
<p class="p4"><a href='https://twitter.com/TheKevinAllison'>Twitter</a></p>
<p class="p4"><a href='https://www.facebook.com/riskshow'>Facebook</a></p>
<p class="p4"><a href='https://www.instagram.com/thekevinallison/'>Instagram</a></p>
<p class="p4"><a href='http://risk-show.com/listen/'>Risk Show Podcast</a></p>
<p class="p6"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p6"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p6"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p6"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p6"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p6"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this masterclass of HVB season 2 we brought in a master story teller in Kevin Allison. The biggest thing is to get a person to understand, don't just summarize, don't just walk us through a Wikipedia like where you're just giving us a broad overview. And you're explaining; it’s important to remember sensory details that will help us see almost like movie scenes, what was happening between people. That is what brings the story alive. So that's a good case right there where the bones of the story were incredible. Like that's just on paper and an incredible overview of a story, but it's not going to work unless you can fill in all those sensory details that bring it alive and make it emotional for us.</p>
<p class="p1">Storytelling is a soft skill that offers the ability to contextualize cybersecurity in a manner that any organization can understand to allow their business to stay safe.</p>
<p class="p3"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">0:00 Previously on the show</p>
<p class="p1">2:37 Kevin introduction</p>
<p class="p1">3:20 Episode begins</p>
<p class="p1">3:39 Where Kevin is today</p>
<p class="p1">7:58 Kevin’s origin story</p>
<p class="p1">12:04 Cybersecurity is performing</p>
<p class="p1">17:08 Storytelling for business</p>
<p class="p1">21:00 Engineering a story</p>
<p class="p1">26:12 Authentic storytelling</p>
<p class="p1">34:54 Speaking isn’t perfect</p>
<p class="p1">41:02 Where to find Kevin</p>
<p class="p2"> </p>
<p class="p4"><a href='https://thestorystudio.org/'>The Story Studio</a></p>
<p class="p5"><a href='http://theriskbook.com/'><em>RISK!: True Stories People Never Thought They’d Dare To Share</em></a></p>
<p class="p4"><a href='http://risk-show.com/listen/'>RISK! Podcast</a></p>
<p class="p4"><a href='https://twitter.com/TheKevinAllison'>Twitter</a></p>
<p class="p4"><a href='https://www.facebook.com/riskshow'>Facebook</a></p>
<p class="p4"><a href='https://www.instagram.com/thekevinallison/'>Instagram</a></p>
<p class="p4"><a href='http://risk-show.com/listen/'>Risk Show Podcast</a></p>
<p class="p6"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p6"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p6"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p6"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p6"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p6"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qmffud/HVB_S2EP7_KevinAllison.mp3" length="81253978" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this masterclass of HVB season 2 we brought in a master story teller in Kevin Allison. The biggest thing is to get a person to understand, don't just summarize, don't just walk us through a Wikipedia like where you're just giving us a broad overview. And you're explaining; it’s important to remember sensory details that will help us see almost like movie scenes, what was happening between people. That is what brings the story alive. So that's a good case right there where the bones of the story were incredible. Like that's just on paper and an incredible overview of a story, but it's not going to work unless you can fill in all those sensory details that bring it alive and make it emotional for us.
Storytelling is a soft skill that offers the ability to contextualize cybersecurity in a manner that any organization can understand to allow their business to stay safe.
 
Key Takeaways:
 
0:00 Previously on the show
2:37 Kevin introduction
3:20 Episode begins
3:39 Where Kevin is today
7:58 Kevin’s origin story
12:04 Cybersecurity is performing
17:08 Storytelling for business
21:00 Engineering a story
26:12 Authentic storytelling
34:54 Speaking isn’t perfect
41:02 Where to find Kevin
 
The Story Studio
RISK!: True Stories People Never Thought They’d Dare To Share
RISK! Podcast
Twitter
Facebook
Instagram
Risk Show Podcast
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ron Eddings on Twitter
Follow Chris Cochran on Twitter
Sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2539</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>145</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue S2 Episode 6 - John Strand</title>
        <itunes:title>Hacker Valley Blue S2 Episode 6 - John Strand</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-6-john-strand/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-6-john-strand/#comments</comments>        <pubDate>Tue, 18 May 2021 05:37:34 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2376482b-fe84-34f6-a478-9207372cc2dd</guid>
                                    <description><![CDATA[<p class="p1">If want to get into computer security, you're going to learn to love it, you're going to have to be successful, because a lot of computer security isn't just about bits and bytes, it's really about effectively communicating what needs to be done to the right people.</p>
<p class="p1">In this episode wet have the incredible John Strand. Organizations need to become more proactive, and see where those weak spots are to protect themselves from something like ransomware. You need to run a pen test because you can have somebody literally launch those attacks, and identify those weaknesses in those vulnerabilities before the bad people do.</p>
<p class="p1">What's the gap that we can all learn from? It's passwords. By and large for most users, passphrases are the way to go. And, multi-factor authentication is actually a very sound strategy.</p>
<p class="p1">If you look at one key tenant of computer security, complexity is the enemy of computer security. And security is constantly trying to catch up and protect against yesterday's attacks. So, the future is more connected, it's more complicated. And the problem is, we still have people that use weak passwords, we still have people that click on links from strangers. And ultimately, when we're looking at that future, you're going to see the exact same problems that we've always had complicated on a much, much, much, much, much larger scale. As things get more and more pushed to the cloud. There'll be no shelter here, the front line is everywhere. World of computer security. </p>
<p class="p3"> </p>
<p class="p4">Key Takeaways:</p>
<p class="p4">0:00 Previously on the show
2:02 John introduction
2:44 Episode begins
2:47 What John is doing today
3:45 John’s core tenets
5:51 How pen testing is “Blue”
6:17 Why understanding fundamentals matters
8:55 Ransomware
10:41 Organizations need to be prepared
11:58 Password gap
13:37 Password philosophy
17:07 Multi-factor authentication
21:40 What to do today
24:24 New problems
26:44 Learn your own network
28:26 Where to find John</p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/strandjs'>John Strand on Twitter</a></p>
<p class="p5"><a href='https://www.linkedin.com/in/john-strand-a1b4b62/'>John Strand on LinkedIn</a></p>
<p class="p5"><a href='https://www.blackhillsinfosec.com/'>Black Hills Information Security</a></p>
<p class="p5"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p5"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">If want to get into computer security, you're going to learn to love it, you're going to have to be successful, because a lot of computer security isn't just about bits and bytes, it's really about effectively communicating what needs to be done to the right people.</p>
<p class="p1">In this episode wet have the incredible John Strand. Organizations need to become more proactive, and see where those weak spots are to protect themselves from something like ransomware. You need to run a pen test because you can have somebody literally launch those attacks, and identify those weaknesses in those vulnerabilities before the bad people do.</p>
<p class="p1">What's the gap that we can all learn from? It's passwords. By and large for most users, passphrases are the way to go. And, multi-factor authentication is actually a very sound strategy.</p>
<p class="p1">If you look at one key tenant of computer security, complexity is the enemy of computer security. And security is constantly trying to catch up and protect against yesterday's attacks. So, the future is more connected, it's more complicated. And the problem is, we still have people that use weak passwords, we still have people that click on links from strangers. And ultimately, when we're looking at that future, you're going to see the exact same problems that we've always had complicated on a much, much, much, much, much larger scale. As things get more and more pushed to the cloud. There'll be no shelter here, the front line is everywhere. World of computer security. </p>
<p class="p3"> </p>
<p class="p4">Key Takeaways:</p>
<p class="p4">0:00 Previously on the show<br>
2:02 John introduction<br>
2:44 Episode begins<br>
2:47 What John is doing today<br>
3:45 John’s core tenets<br>
5:51 How pen testing is “Blue”<br>
6:17 Why understanding fundamentals matters<br>
8:55 Ransomware<br>
10:41 Organizations need to be prepared<br>
11:58 Password gap<br>
13:37 Password philosophy<br>
17:07 Multi-factor authentication<br>
21:40 What to do today<br>
24:24 New problems<br>
26:44 Learn your own network<br>
28:26 Where to find John</p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/strandjs'>John Strand on Twitter</a></p>
<p class="p5"><a href='https://www.linkedin.com/in/john-strand-a1b4b62/'>John Strand on LinkedIn</a></p>
<p class="p5"><a href='https://www.blackhillsinfosec.com/'>Black Hills Information Security</a></p>
<p class="p5"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p5"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/euc9ek/HVB_S2EP6_JohnStrand.mp3" length="56110458" type="audio/mpeg"/>
        <itunes:summary><![CDATA[If want to get into computer security, you're going to learn to love it, you're going to have to be successful, because a lot of computer security isn't just about bits and bytes, it's really about effectively communicating what needs to be done to the right people.
In this episode wet have the incredible John Strand. Organizations need to become more proactive, and see where those weak spots are to protect themselves from something like ransomware. You need to run a pen test because you can have somebody literally launch those attacks, and identify those weaknesses in those vulnerabilities before the bad people do.
What's the gap that we can all learn from? It's passwords. By and large for most users, passphrases are the way to go. And, multi-factor authentication is actually a very sound strategy.
If you look at one key tenant of computer security, complexity is the enemy of computer security. And security is constantly trying to catch up and protect against yesterday's attacks. So, the future is more connected, it's more complicated. And the problem is, we still have people that use weak passwords, we still have people that click on links from strangers. And ultimately, when we're looking at that future, you're going to see the exact same problems that we've always had complicated on a much, much, much, much, much larger scale. As things get more and more pushed to the cloud. There'll be no shelter here, the front line is everywhere. World of computer security. 
 
Key Takeaways:
0:00 Previously on the show2:02 John introduction2:44 Episode begins2:47 What John is doing today3:45 John’s core tenets5:51 How pen testing is “Blue”6:17 Why understanding fundamentals matters8:55 Ransomware10:41 Organizations need to be prepared11:58 Password gap13:37 Password philosophy17:07 Multi-factor authentication21:40 What to do today24:24 New problems26:44 Learn your own network28:26 Where to find John
 
John Strand on Twitter
John Strand on LinkedIn
Black Hills Information Security
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ron Eddings on Twitter
Follow Chris Cochran on Twitter
Sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1753</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>144</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue S2 Episode 5 - Jamie Dicken and Aaron Rinehart</title>
        <itunes:title>Hacker Valley Blue S2 Episode 5 - Jamie Dicken and Aaron Rinehart</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-5-jamie-dicken-and-aaron-rinehart/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-5-jamie-dicken-and-aaron-rinehart/#comments</comments>        <pubDate>Tue, 18 May 2021 05:34:39 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/60f8391a-5f27-3586-80e5-66ca5547e717</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we brought in two exceptional guests that are no stranger to chaos. In fact, they've identified ways to engineer for chaos. In the studio, we have Aaron Rinehart, CTO, and founder at Verica. We also have Jamie Dicken, former manager of applied security at Cardinal Health and current director at Resilience. These two are also authors of Security Chaos Engineering. If you haven't read that book it's already out, you should check it out. </p>
<p class="p1">Chaos engineering is the technique of introducing turbulent conditions into a distributed system to try to determine the conditions that cause it to fail before it actually fails. So they simplify it. What we do with chaos engineering is learn about the system without experiencing the pain of an outage or an incident. You learn to trust your gear by testing.</p>
<p class="p1">The biggest impact really came once we understood how security chaos engineering fits into the bigger security picture. It's not about just being a part of the latest and greatest techniques and having the excitement of doing something that's cutting edge, but security chaos engineering at the end of the day. It's useless unless what you've learned drives change. </p>
<p class="p3"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">0:00 Previously on the show</p>
<p class="p1">1:40 Aaron Rinehart and Jamie Dixon introduction </p>
<p class="p1">2:08 Episode begins</p>
<p class="p1">2:59 What Jamie and Aaron are doing today</p>
<p class="p1">3:13 What Jamie is doing</p>
<p class="p1">4:13 What Aaron is doing</p>
<p class="p1">5:00 Discuss chaos engineering</p>
<p class="p1">9:26 Importance of chaos engineering</p>
<p class="p1">10:16 Myths of chaos engineering</p>
<p class="p1">12:55 Chaos engineering customer impacts</p>
<p class="p1">17:34 Learning to trust the test and end result</p>
<p class="p1">19:03 Reader and customer feedback</p>
<p class="p1">22:21 Chaos engineering gone wrong</p>
<p class="p1">27:39 Implementing change in cybersecurity</p>
<p class="p1">28:11 Building a team of experts</p>
<p class="p1">39:08 Getting involved in chaos engineering </p>
<p class="p1">41:09 Tools for listeners</p>
<p class="p1">43:25 Keeping up with Aaron and Jamie</p>
<p class="p3"> </p>
<p class="p3"> </p>
<p class="p4"><a href='https://twitter.com/aaronrinehart'>Aaron Rinehart on Twitter</a></p>
<p class="p4"><a href='mailto:aaron@verica.io'>aaron@verica.io</a></p>
<p class="p4"><a href='https://twitter.com/jamie_dicken'>Jamie Dicken on Twitter</a></p>
<p class="p4"><a href='https://www.linkedin.com/company/vericaio/'>Verica on LinkedIn</a></p>
<p class="p4"><a href='https://www.verica.io/sce-book/'>Verica Free Book </a></p>
<p class="p5"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p5"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we brought in two exceptional guests that are no stranger to chaos. In fact, they've identified ways to engineer for chaos. In the studio, we have Aaron Rinehart, CTO, and founder at Verica. We also have Jamie Dicken, former manager of applied security at Cardinal Health and current director at Resilience. These two are also authors of <em>Security Chaos Engineering</em>. If you haven't read that book it's already out, you should check it out. </p>
<p class="p1">Chaos engineering is the technique of introducing turbulent conditions into a distributed system to try to determine the conditions that cause it to fail before it actually fails. So they simplify it. What we do with chaos engineering is learn about the system without experiencing the pain of an outage or an incident. You learn to trust your gear by testing.</p>
<p class="p1">The biggest impact really came once we understood how security chaos engineering fits into the bigger security picture. It's not about just being a part of the latest and greatest techniques and having the excitement of doing something that's cutting edge, but security chaos engineering at the end of the day. It's useless unless what you've learned drives change. </p>
<p class="p3"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p1">0:00 Previously on the show</p>
<p class="p1">1:40 Aaron Rinehart and Jamie Dixon introduction </p>
<p class="p1">2:08 Episode begins</p>
<p class="p1">2:59 What Jamie and Aaron are doing today</p>
<p class="p1">3:13 What Jamie is doing</p>
<p class="p1">4:13 What Aaron is doing</p>
<p class="p1">5:00 Discuss chaos engineering</p>
<p class="p1">9:26 Importance of chaos engineering</p>
<p class="p1">10:16 Myths of chaos engineering</p>
<p class="p1">12:55 Chaos engineering customer impacts</p>
<p class="p1">17:34 Learning to trust the test and end result</p>
<p class="p1">19:03 Reader and customer feedback</p>
<p class="p1">22:21 Chaos engineering gone wrong</p>
<p class="p1">27:39 Implementing change in cybersecurity</p>
<p class="p1">28:11 Building a team of experts</p>
<p class="p1">39:08 Getting involved in chaos engineering </p>
<p class="p1">41:09 Tools for listeners</p>
<p class="p1">43:25 Keeping up with Aaron and Jamie</p>
<p class="p3"> </p>
<p class="p3"> </p>
<p class="p4"><a href='https://twitter.com/aaronrinehart'>Aaron Rinehart on Twitter</a></p>
<p class="p4"><a href='mailto:aaron@verica.io'>aaron@verica.io</a></p>
<p class="p4"><a href='https://twitter.com/jamie_dicken'>Jamie Dicken on Twitter</a></p>
<p class="p4"><a href='https://www.linkedin.com/company/vericaio/'>Verica on LinkedIn</a></p>
<p class="p4"><a href='https://www.verica.io/sce-book/'>Verica Free Book </a></p>
<p class="p5"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p5"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hjnaks/HVB_S2EP_Jamie_Aaron6z4s9.mp3" length="86273163" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we brought in two exceptional guests that are no stranger to chaos. In fact, they've identified ways to engineer for chaos. In the studio, we have Aaron Rinehart, CTO, and founder at Verica. We also have Jamie Dicken, former manager of applied security at Cardinal Health and current director at Resilience. These two are also authors of Security Chaos Engineering. If you haven't read that book it's already out, you should check it out. 
Chaos engineering is the technique of introducing turbulent conditions into a distributed system to try to determine the conditions that cause it to fail before it actually fails. So they simplify it. What we do with chaos engineering is learn about the system without experiencing the pain of an outage or an incident. You learn to trust your gear by testing.
The biggest impact really came once we understood how security chaos engineering fits into the bigger security picture. It's not about just being a part of the latest and greatest techniques and having the excitement of doing something that's cutting edge, but security chaos engineering at the end of the day. It's useless unless what you've learned drives change. 
 
Key Takeaways:
0:00 Previously on the show
1:40 Aaron Rinehart and Jamie Dixon introduction 
2:08 Episode begins
2:59 What Jamie and Aaron are doing today
3:13 What Jamie is doing
4:13 What Aaron is doing
5:00 Discuss chaos engineering
9:26 Importance of chaos engineering
10:16 Myths of chaos engineering
12:55 Chaos engineering customer impacts
17:34 Learning to trust the test and end result
19:03 Reader and customer feedback
22:21 Chaos engineering gone wrong
27:39 Implementing change in cybersecurity
28:11 Building a team of experts
39:08 Getting involved in chaos engineering 
41:09 Tools for listeners
43:25 Keeping up with Aaron and Jamie
 
 
Aaron Rinehart on Twitter
aaron@verica.io
Jamie Dicken on Twitter
Verica on LinkedIn
Verica Free Book 
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ron Eddings on Twitter
Follow Chris Cochran on Twitter
Sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2696</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>143</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue S2 Episode 4 - Lenny Zeltser</title>
        <itunes:title>Hacker Valley Blue S2 Episode 4 - Lenny Zeltser</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-4-lenny-zeltser/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-4-lenny-zeltser/#comments</comments>        <pubDate>Tue, 18 May 2021 05:27:28 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c0d37dca-4365-343b-a89a-467feb5dcfa0</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we brought back our good friend Lenny Zeltser.  Lenny is Chief Information Security Officer at Axonius.  He's developed a mindset of looking at security components as building blocks to create a holistic security environment. To this day, even while operating as an executive, he has wisdom that anyone can learn from.</p>
<p class="p1">Quite often, the less sexy aspects of information security are ignored, when in reality, you need to understand what resources you're supposed to protect, which assets are compromised, and the infrastructure for your organization.  People jump right into fighting the big fires, and as you know, there is a reason why there are so many day-to-day urgent activities. </p>
<p class="p1">To start moving in a positive direction, Lenny shares this advice, “Understand what the major data sources you can tap into rather than thinking ‘let me create this one new way of serving everything I have are.’”  The information is there. Think about three sources of information that might get you the biggest bang for the buck!</p>
<p class="p3"> </p>
<p class="p4">Key Takeaways:</p>
<p class="p3"> </p>
<p class="p4">0:00 Previously on the show</p>
<p class="p4">1:40 Lenny introduction</p>
<p class="p4">2:05 Episode begins</p>
<p class="p4">3:10 What Lenny is doing today</p>
<p class="p4">5:35 The evolution of Lenny’s career</p>
<p class="p4">8:30 Parallels between beginning and now</p>
<p class="p4">10:38 Journey and growth of REMnux</p>
<p class="p4">13:00 Challenges Lenny has faced</p>
<p class="p4">15:21 Collaboration surprises</p>
<p class="p4">17:18 Horror stories</p>
<p class="p4">20:18 Enforcing policies</p>
<p class="p4">23:34 Asset management</p>
<p class="p4">26:08 New tech and trends</p>
<p class="p4">28:45 Biggest discovery about self</p>
<p class="p4">32:38 Advice for others</p>
<p class="p4">34:24 Keeping up with Lenny</p>
<p class="p3"> </p>
<p class="p3"> </p>
<p class="p4">Links:</p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.axonius.com/'>What Lenny Does</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://zeltser.com/'>Lenny on the Web</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/lennyzeltser'>Follow Lenny on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.linkedin.com/in/lennyzeltser/'>Lenny on LinkedIn</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we brought back our good friend Lenny Zeltser.  Lenny is Chief Information Security Officer at Axonius.  He's developed a mindset of looking at security components as building blocks to create a holistic security environment. To this day, even while operating as an executive, he has wisdom that anyone can learn from.</p>
<p class="p1">Quite often, the less sexy aspects of information security are ignored, when in reality, you need to understand what resources you're supposed to protect, which assets are compromised, and the infrastructure for your organization.  People jump right into fighting the big fires, and as you know, there is a reason why there are so many day-to-day urgent activities. </p>
<p class="p1">To start moving in a positive direction, Lenny shares this advice, “Understand what the major data sources you can tap into rather than thinking ‘let me create this one new way of serving everything I have are.’”  The information is there. Think about three sources of information that might get you the biggest bang for the buck!</p>
<p class="p3"> </p>
<p class="p4">Key Takeaways:</p>
<p class="p3"> </p>
<p class="p4">0:00 Previously on the show</p>
<p class="p4">1:40 Lenny introduction</p>
<p class="p4">2:05 Episode begins</p>
<p class="p4">3:10 What Lenny is doing today</p>
<p class="p4">5:35 The evolution of Lenny’s career</p>
<p class="p4">8:30 Parallels between beginning and now</p>
<p class="p4">10:38 Journey and growth of REMnux</p>
<p class="p4">13:00 Challenges Lenny has faced</p>
<p class="p4">15:21 Collaboration surprises</p>
<p class="p4">17:18 Horror stories</p>
<p class="p4">20:18 Enforcing policies</p>
<p class="p4">23:34 Asset management</p>
<p class="p4">26:08 New tech and trends</p>
<p class="p4">28:45 Biggest discovery about self</p>
<p class="p4">32:38 Advice for others</p>
<p class="p4">34:24 Keeping up with Lenny</p>
<p class="p3"> </p>
<p class="p3"> </p>
<p class="p4">Links:</p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.axonius.com/'>What Lenny Does</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://zeltser.com/'>Lenny on the Web</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/lennyzeltser'>Follow Lenny on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.linkedin.com/in/lennyzeltser/'>Lenny on LinkedIn</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"> </p>
<p class="p5"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/igqryp/HVB_S2E4_LennyZeltzer.mp3" length="67262718" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we brought back our good friend Lenny Zeltser.  Lenny is Chief Information Security Officer at Axonius.  He's developed a mindset of looking at security components as building blocks to create a holistic security environment. To this day, even while operating as an executive, he has wisdom that anyone can learn from.
Quite often, the less sexy aspects of information security are ignored, when in reality, you need to understand what resources you're supposed to protect, which assets are compromised, and the infrastructure for your organization.  People jump right into fighting the big fires, and as you know, there is a reason why there are so many day-to-day urgent activities. 
To start moving in a positive direction, Lenny shares this advice, “Understand what the major data sources you can tap into rather than thinking ‘let me create this one new way of serving everything I have are.’”  The information is there. Think about three sources of information that might get you the biggest bang for the buck!
 
Key Takeaways:
 
0:00 Previously on the show
1:40 Lenny introduction
2:05 Episode begins
3:10 What Lenny is doing today
5:35 The evolution of Lenny’s career
8:30 Parallels between beginning and now
10:38 Journey and growth of REMnux
13:00 Challenges Lenny has faced
15:21 Collaboration surprises
17:18 Horror stories
20:18 Enforcing policies
23:34 Asset management
26:08 New tech and trends
28:45 Biggest discovery about self
32:38 Advice for others
34:24 Keeping up with Lenny
 
 
Links:
 
What Lenny Does
 
Lenny on the Web
 
Follow Lenny on Twitter
 
Lenny on LinkedIn
 
Learn more about Hacker Valley Studio
 
Support Hacker Valley Studio on Patreon
 
Follow Hacker Valley Studio on Twitter
 
Follow Ron Eddings on Twitter
 
Follow Chris Cochran on Twitter
 
Sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2102</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>142</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue S2 Episode 3 - Chani Simms</title>
        <itunes:title>Hacker Valley Blue S2 Episode 3 - Chani Simms</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-3-chani-simms/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-3-chani-simms/#comments</comments>        <pubDate>Tue, 18 May 2021 05:24:10 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/75967a54-b8f2-3c96-83ab-64bdfb012be5</guid>
                                    <description><![CDATA[<p class="p1">In this episode of Hacker Valley Blue, we brought in a guest who has been on a journey of transformation of self and technology.  Our guest is Chani Simms, managing director of Meta Defence Labs.  We talk about what is essential for cybersecurity.  If there was a magic box that could solve an issue, what problem would Chani want solved? “People!”  They need to be trained, and care, and have buy in.  They must be devoted to what they’re doing.  They need cultural awareness and support – it isn’t easy and the hardest job.  </p>
<p class="p1">When it comes to leadership, organizations need to use people already in the organization.  It is important to know what they’re trying to do.  You have to use security as an enabler.  Leadership is responsible for communicating objectives and goals.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p1">0:00 Previously on Hacker Valley Blue</p>
<p class="p1">1:36 In this episode</p>
<p class="p1">3:10 Background and day job</p>
<p class="p1">5:37 Cyber essentials</p>
<p class="p1">13:46 Keeping up to date</p>
<p class="p1">15:26 Access control</p>
<p class="p1">17:07 Security hygiene</p>
<p class="p1">19:48 Magic box</p>
<p class="p1">21:32 Leadership fundamentals</p>
<p class="p1">26:22 Formula 1 analogy</p>
<p class="p1">28: 46 Wrap up</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://www.linkedin.com/in/chani-simms'>Chani on LinkedIn</a></p>
<p class="p3"><a href='https://twitter.com/ChaniSimms'>Chani on Twitter</a></p>
<p class="p3">Email: <a href='mailto:info@metadefencelabs.com'>info@metadefencelabs.com</a></p>
<p class="p1">Sponsored by <a href='https://www.axonius.com/'>Axonius</a></p>
<p class="p3"><a href='https://hackervalley.com/'>Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/chriscochrancyber/'>Chris Cochran on LinkedIn</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/ronaldeddings/'>Ron Eddings on LinkedIn</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of Hacker Valley Blue, we brought in a guest who has been on a journey of transformation of self and technology.  Our guest is Chani Simms, managing director of Meta Defence Labs.  We talk about what is essential for cybersecurity.  If there was a magic box that could solve an issue, what problem would Chani want solved? “People!”  They need to be trained, and care, and have buy in.  They must be devoted to what they’re doing.  They need cultural awareness and support – it isn’t easy and the hardest job.  </p>
<p class="p1">When it comes to leadership, organizations need to use people already in the organization.  It is important to know what they’re trying to do.  You have to use security as an enabler.  Leadership is responsible for communicating objectives and goals.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p1">0:00 Previously on Hacker Valley Blue</p>
<p class="p1">1:36 In this episode</p>
<p class="p1">3:10 Background and day job</p>
<p class="p1">5:37 Cyber essentials</p>
<p class="p1">13:46 Keeping up to date</p>
<p class="p1">15:26 Access control</p>
<p class="p1">17:07 Security hygiene</p>
<p class="p1">19:48 Magic box</p>
<p class="p1">21:32 Leadership fundamentals</p>
<p class="p1">26:22 Formula 1 analogy</p>
<p class="p1">28: 46 Wrap up</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://www.linkedin.com/in/chani-simms'>Chani on LinkedIn</a></p>
<p class="p3"><a href='https://twitter.com/ChaniSimms'>Chani on Twitter</a></p>
<p class="p3">Email: <a href='mailto:info@metadefencelabs.com'>info@metadefencelabs.com</a></p>
<p class="p1">Sponsored by <a href='https://www.axonius.com/'>Axonius</a></p>
<p class="p3"><a href='https://hackervalley.com/'>Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/chriscochrancyber/'>Chris Cochran on LinkedIn</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/ronaldeddings/'>Ron Eddings on LinkedIn</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qccwz8/HVB_EP3_ChaniSimms.mp3" length="57348763" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley Blue, we brought in a guest who has been on a journey of transformation of self and technology.  Our guest is Chani Simms, managing director of Meta Defence Labs.  We talk about what is essential for cybersecurity.  If there was a magic box that could solve an issue, what problem would Chani want solved? “People!”  They need to be trained, and care, and have buy in.  They must be devoted to what they’re doing.  They need cultural awareness and support – it isn’t easy and the hardest job.  
When it comes to leadership, organizations need to use people already in the organization.  It is important to know what they’re trying to do.  You have to use security as an enabler.  Leadership is responsible for communicating objectives and goals.  
 
Key Takeaways
0:00 Previously on Hacker Valley Blue
1:36 In this episode
3:10 Background and day job
5:37 Cyber essentials
13:46 Keeping up to date
15:26 Access control
17:07 Security hygiene
19:48 Magic box
21:32 Leadership fundamentals
26:22 Formula 1 analogy
28: 46 Wrap up
 
Links:
Chani on LinkedIn
Chani on Twitter
Email: info@metadefencelabs.com
Sponsored by Axonius
Hacker Valley Studio
Chris Cochran on LinkedIn
Ron Eddings on LinkedIn]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1792</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>141</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue S2 Episode 2 - Marcus Carey</title>
        <itunes:title>Hacker Valley Blue S2 Episode 2 - Marcus Carey</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-2-marcus-carey/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-2-marcus-carey/#comments</comments>        <pubDate>Tue, 18 May 2021 05:21:37 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/44e778fc-58d6-3f4a-9d26-ec40b2544445</guid>
                                    <description><![CDATA[<p class="p1">Know thy organization is key! Wise words from the powerful Marcus J. Carey.  Don’t be afraid to admit the bad stuff and be honest about the situation.  Most of the time people get fired because they are scared to admit the failure.  </p>
<p class="p1">You have to build a tight network of people you trust who will be brutally honest with you.  You need those people who are going to tell you the truth.  Other people will see your superpowers before you do.  Superman didn’t know he was different, but others saw the differences and the strengths he didn’t even realize he had.  Always pay attention to how people react to what you do, then you will figure out what you are really good at.  We over emphasize what we suck at and ignore what we are good at.  Don’t do that. You need to understand how amazing, awesome and beautiful you are.  Double down and double down hard.  Do not be afraid to show your talents and be confident in your superpower.  </p>
<p class="p1">In security, there is a role for everybody.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:40 In this episode</p>
<p class="p1">2:12 Welcome</p>
<p class="p1">3:40 Marcus background</p>
<p class="p1">4:57 What lead Marcus to cyber</p>
<p class="p1">7:09 Self discovery</p>
<p class="p1">9:48 Creations and inventions</p>
<p class="p1">14:22 Gathering and retaining information</p>
<p class="p1">17:53 Auxiliary skill</p>
<p class="p1">21:35 Abilities and mission</p>
<p class="p1">25:26 Overlooked areas</p>
<p class="p1">31:44 Advice to others</p>
<p class="p1">35:41 Staying up-to-date with Marcus</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/marcusjcarey'>Marcus on Twitter</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://www.amazon.com/Marcus-J-Carey/e/B07MFWJPGV/ref=dp_byline_cont_book_1'>Marcus' Books on Amazon</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/marcuscarey/'>Marcus on LinkedIn</a></p>
<p class="p3"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Know thy organization is key! Wise words from the powerful Marcus J. Carey.  Don’t be afraid to admit the bad stuff and be honest about the situation.  Most of the time people get fired because they are scared to admit the failure.  </p>
<p class="p1">You have to build a tight network of people you trust who will be brutally honest with you.  You need those people who are going to tell you the truth.  Other people will see your superpowers before you do.  Superman didn’t know he was different, but others saw the differences and the strengths he didn’t even realize he had.  Always pay attention to how people react to what you do, then you will figure out what you are really good at.  We over emphasize what we suck at and ignore what we are good at.  Don’t do that. You need to understand how amazing, awesome and beautiful you are.  Double down and double down hard.  Do not be afraid to show your talents and be confident in your superpower.  </p>
<p class="p1">In security, there is a role for everybody.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2"> </p>
<p class="p1">1:40 In this episode</p>
<p class="p1">2:12 Welcome</p>
<p class="p1">3:40 Marcus background</p>
<p class="p1">4:57 What lead Marcus to cyber</p>
<p class="p1">7:09 Self discovery</p>
<p class="p1">9:48 Creations and inventions</p>
<p class="p1">14:22 Gathering and retaining information</p>
<p class="p1">17:53 Auxiliary skill</p>
<p class="p1">21:35 Abilities and mission</p>
<p class="p1">25:26 Overlooked areas</p>
<p class="p1">31:44 Advice to others</p>
<p class="p1">35:41 Staying up-to-date with Marcus</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/marcusjcarey'>Marcus on Twitter</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://www.amazon.com/Marcus-J-Carey/e/B07MFWJPGV/ref=dp_byline_cont_book_1'>Marcus' Books on Amazon</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/marcuscarey/'>Marcus on LinkedIn</a></p>
<p class="p3"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.axonius.com/'>Sponsored by Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8vzunb/HVB_S2EP2_MarcusCarey_REV.mp3" length="69794438" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Know thy organization is key! Wise words from the powerful Marcus J. Carey.  Don’t be afraid to admit the bad stuff and be honest about the situation.  Most of the time people get fired because they are scared to admit the failure.  
You have to build a tight network of people you trust who will be brutally honest with you.  You need those people who are going to tell you the truth.  Other people will see your superpowers before you do.  Superman didn’t know he was different, but others saw the differences and the strengths he didn’t even realize he had.  Always pay attention to how people react to what you do, then you will figure out what you are really good at.  We over emphasize what we suck at and ignore what we are good at.  Don’t do that. You need to understand how amazing, awesome and beautiful you are.  Double down and double down hard.  Do not be afraid to show your talents and be confident in your superpower.  
In security, there is a role for everybody.
 
Key Takeaways:
 
1:40 In this episode
2:12 Welcome
3:40 Marcus background
4:57 What lead Marcus to cyber
7:09 Self discovery
9:48 Creations and inventions
14:22 Gathering and retaining information
17:53 Auxiliary skill
21:35 Abilities and mission
25:26 Overlooked areas
31:44 Advice to others
35:41 Staying up-to-date with Marcus
 
Links:
 
Marcus on Twitter
 
Marcus' Books on Amazon
Marcus on LinkedIn
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ron Eddings on Twitter
Follow Chris Cochran on Twitter
Sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2181</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>140</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue S2 Episode 1</title>
        <itunes:title>Hacker Valley Blue S2 Episode 1</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-1/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-s2-episode-1/#comments</comments>        <pubDate>Tue, 18 May 2021 05:15:12 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/dd27ffb9-23df-34b7-be57-f237c722ad0d</guid>
                                    <description><![CDATA[<p class="p1">Welcome to Hacker Valley Blue Season 2 “Know Thyself”. Instead of focusing on the enemy – threat intelligence and environment, we are focusing on knowing yourself and security stack. You need to know the business, but also the fundamentals of security landscape. Without the fundamentals, you cannot reach the level of success you desire. Getting laser sharp on computer networks and how computers speak to each other. Without understanding how each of the pieces work together, you cannot make strategic decisions. We have many guests this season that will teach more about the fundamentals. Stop ignoring the fundamentals and find synchronicity among your team. Building this team makes an impact for the business. You will have positive outcomes. Stop sweeping the issues under the rug to make better decisions.</p>
<p class="p1">Cybersecurity is a lot like playing a game of chess using pieces, policies, and guidelines.  Opponents use the same things but don’t play by the rules.  You continually must up your game and face the opponent who isn’t playing fairly. </p>
<p class="p1">Knowing business, team, story and self is so important and that is what is coming up on the rest of the season.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">0:00 Welcome</p>
<p class="p1">2:00 Kick-off</p>
<p class="p1">3:13 The fundamentals</p>
<p class="p1">5:46 How do you get people excited?</p>
<p class="p1">7:07 Making an impact on a business</p>
<p class="p1">8:43 Where does one begin to know thyself</p>
<p class="p1">10:32 Formula 1 analogy</p>
<p class="p1">12:32 Leadership</p>
<p class="p1">16:00 Superpowers</p>
<p class="p1">19:38 Three Rs of memory</p>
<p class="p1">24:58 Chaos engineering</p>
<p class="p1">27:56 The brother’s trip</p>
<p class="p1">30:11 Stepping into unknown</p>
<p class="p1">31:15 Play at work</p>
<p class="p1">32:00 Season recap</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p4"> </p>
<p class="p3"><a href='https://www.axonius.com/'>This entire season is sponsored by Axonius</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Welcome to Hacker Valley Blue Season 2 “Know Thyself”. Instead of focusing on the enemy – threat intelligence and environment, we are focusing on knowing yourself and security stack. You need to know the business, but also the fundamentals of security landscape. Without the fundamentals, you cannot reach the level of success you desire. Getting laser sharp on computer networks and how computers speak to each other. Without understanding how each of the pieces work together, you cannot make strategic decisions. We have many guests this season that will teach more about the fundamentals. Stop ignoring the fundamentals and find synchronicity among your team. Building this team makes an impact for the business. You will have positive outcomes. Stop sweeping the issues under the rug to make better decisions.</p>
<p class="p1">Cybersecurity is a lot like playing a game of chess using pieces, policies, and guidelines.  Opponents use the same things but don’t play by the rules.  You continually must up your game and face the opponent who isn’t playing fairly. </p>
<p class="p1">Knowing business, team, story and self is so important and that is what is coming up on the rest of the season.  </p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">0:00 Welcome</p>
<p class="p1">2:00 Kick-off</p>
<p class="p1">3:13 The fundamentals</p>
<p class="p1">5:46 How do you get people excited?</p>
<p class="p1">7:07 Making an impact on a business</p>
<p class="p1">8:43 Where does one begin to know thyself</p>
<p class="p1">10:32 Formula 1 analogy</p>
<p class="p1">12:32 Leadership</p>
<p class="p1">16:00 Superpowers</p>
<p class="p1">19:38 Three Rs of memory</p>
<p class="p1">24:58 Chaos engineering</p>
<p class="p1">27:56 The brother’s trip</p>
<p class="p1">30:11 Stepping into unknown</p>
<p class="p1">31:15 Play at work</p>
<p class="p1">32:00 Season recap</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p2"> </p>
<p class="p3"><a href='https://hackervalley.com/'>Learn more about Hacker Valley Studio</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ron Eddings on Twitter</a></p>
<p class="p2"> </p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p4"> </p>
<p class="p3"><a href='https://www.axonius.com/'>This entire season is sponsored by Axonius</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ecnb9i/HVB_S2EP1_REV.mp3" length="64686743" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Welcome to Hacker Valley Blue Season 2 “Know Thyself”. Instead of focusing on the enemy – threat intelligence and environment, we are focusing on knowing yourself and security stack. You need to know the business, but also the fundamentals of security landscape. Without the fundamentals, you cannot reach the level of success you desire. Getting laser sharp on computer networks and how computers speak to each other. Without understanding how each of the pieces work together, you cannot make strategic decisions. We have many guests this season that will teach more about the fundamentals. Stop ignoring the fundamentals and find synchronicity among your team. Building this team makes an impact for the business. You will have positive outcomes. Stop sweeping the issues under the rug to make better decisions.
Cybersecurity is a lot like playing a game of chess using pieces, policies, and guidelines.  Opponents use the same things but don’t play by the rules.  You continually must up your game and face the opponent who isn’t playing fairly. 
Knowing business, team, story and self is so important and that is what is coming up on the rest of the season.  
 
Key Takeaways
 
0:00 Welcome
2:00 Kick-off
3:13 The fundamentals
5:46 How do you get people excited?
7:07 Making an impact on a business
8:43 Where does one begin to know thyself
10:32 Formula 1 analogy
12:32 Leadership
16:00 Superpowers
19:38 Three Rs of memory
24:58 Chaos engineering
27:56 The brother’s trip
30:11 Stepping into unknown
31:15 Play at work
32:00 Season recap
 
Links:
 
Learn more about Hacker Valley Studio
 
Support Hacker Valley Studio on Patreon
 
Follow Hacker Valley Studio on Twitter
 
Follow Ron Eddings on Twitter
 
Follow Chris Cochran on Twitter
 
This entire season is sponsored by Axonius]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2021</itunes:duration>
        <itunes:season>6</itunes:season>
        <itunes:episode>139</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 138 - On Being Us in Technology with Kendrick Trotter</title>
        <itunes:title>Episode 138 - On Being Us in Technology with Kendrick Trotter</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-138-on-being-us-in-technology-with-kendrick-trotter/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-138-on-being-us-in-technology-with-kendrick-trotter/#comments</comments>        <pubDate>Mon, 17 May 2021 05:28:52 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5403b7fa-9eba-3ed3-a1ed-71562b8e24c1</guid>
                                    <description><![CDATA[<p class="p1">Imagine, for a moment, you’re driving for Uber, and one of your riders changes your life forever! That’s the story we are sharing with you. It's all about Kendrick Trotter, the entrepreneur that has had an incredible journey in technology. Kendrick talks to us about that and the relationship between sales and engineering.  </p>
<p class="p1">Ron and Chris are glad to be back with Kendrick Trotter who is helping diversify technology through partnerships with top technology firms. He is excited and humbled to be part of this!</p>
<p class="p1">Kendrick shares his passion about Us in Technology. Their mission is “We are going to diversify the tech industry with more underrepresented people.” This is a very broad definition intentionally.  People associate diversity to black or brown, but really, it is variety. </p>
<p class="p1">Us in Technology partner with people who have coachability, drive, intelligence, and integrity. He feels they are teaching these mentees to be an entrepreneur, not a worker. </p>
<p class="p1">Change won’t happen until influential positions are more diverse.  </p>
<p class="p1">To stay in touch with Kendrick or to learn more, visit his website, LinkedIn or Instagram. </p>
<p class="p1">Thank you</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">0:00 Introduction to the show</p>
<p class="p1">1:03 Welcome back</p>
<p class="p1">2:06 Kendrick joins the show</p>
<p class="p1">2:44 Kendrick shares his background</p>
<p class="p1">6:17 Catalyst to the trajectory for Kendrick</p>
<p class="p1">9:18 Power of Networking</p>
<p class="p1">13:35 Complexities of sales and engineering</p>
<p class="p1">15:53 Maintaining confidence</p>
<p class="p1">18:32 Big lesson learned</p>
<p class="p1">21:18 Diversity in the industry</p>
<p class="p1">26: 37 Surprises along the way</p>
<p class="p1">30:03 When change happens</p>
<p class="p1">30:53 Advice to those wanting into tech</p>
<p class="p1">32:39 Best ways to stay in touch with Kendrick</p>
<p class="p1">33:20 Thank you</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='http://www.usintechnology.com/'>Us In Technology Website</a></p>
<p class="p3"><a href='https://www.instagram.com/usintech'>Kendrick's Instagram</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/kendrick-trotter-326a9062/'>Kendrick on LinkedIn</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>. Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p3">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Imagine, for a moment, you’re driving for Uber, and one of your riders changes your life forever! That’s the story we are sharing with you. It's all about Kendrick Trotter, the entrepreneur that has had an incredible journey in technology. Kendrick talks to us about that and the relationship between sales and engineering.  </p>
<p class="p1">Ron and Chris are glad to be back with Kendrick Trotter who is helping diversify technology through partnerships with top technology firms. He is excited and humbled to be part of this!</p>
<p class="p1">Kendrick shares his passion about Us in Technology. Their mission is “We are going to diversify the tech industry with more underrepresented people.” This is a very broad definition intentionally.  People associate diversity to black or brown, but really, it is variety. </p>
<p class="p1">Us in Technology partner with people who have coachability, drive, intelligence, and integrity. He feels they are teaching these mentees to be an entrepreneur, not a worker. </p>
<p class="p1">Change won’t happen until influential positions are more diverse.  </p>
<p class="p1">To stay in touch with Kendrick or to learn more, visit his website, LinkedIn or Instagram. </p>
<p class="p1">Thank you</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2"> </p>
<p class="p1">0:00 Introduction to the show</p>
<p class="p1">1:03 Welcome back</p>
<p class="p1">2:06 Kendrick joins the show</p>
<p class="p1">2:44 Kendrick shares his background</p>
<p class="p1">6:17 Catalyst to the trajectory for Kendrick</p>
<p class="p1">9:18 Power of Networking</p>
<p class="p1">13:35 Complexities of sales and engineering</p>
<p class="p1">15:53 Maintaining confidence</p>
<p class="p1">18:32 Big lesson learned</p>
<p class="p1">21:18 Diversity in the industry</p>
<p class="p1">26: 37 Surprises along the way</p>
<p class="p1">30:03 When change happens</p>
<p class="p1">30:53 Advice to those wanting into tech</p>
<p class="p1">32:39 Best ways to stay in touch with Kendrick</p>
<p class="p1">33:20 Thank you</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='http://www.usintechnology.com/'>Us In Technology Website</a></p>
<p class="p3"><a href='https://www.instagram.com/usintech'>Kendrick's Instagram</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/kendrick-trotter-326a9062/'>Kendrick on LinkedIn</a></p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>. Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p3">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8gy3cz/HVS_KendrickTrotter.mp3" length="64629128" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Imagine, for a moment, you’re driving for Uber, and one of your riders changes your life forever! That’s the story we are sharing with you. It's all about Kendrick Trotter, the entrepreneur that has had an incredible journey in technology. Kendrick talks to us about that and the relationship between sales and engineering.  
Ron and Chris are glad to be back with Kendrick Trotter who is helping diversify technology through partnerships with top technology firms. He is excited and humbled to be part of this!
Kendrick shares his passion about Us in Technology. Their mission is “We are going to diversify the tech industry with more underrepresented people.” This is a very broad definition intentionally.  People associate diversity to black or brown, but really, it is variety. 
Us in Technology partner with people who have coachability, drive, intelligence, and integrity. He feels they are teaching these mentees to be an entrepreneur, not a worker. 
Change won’t happen until influential positions are more diverse.  
To stay in touch with Kendrick or to learn more, visit his website, LinkedIn or Instagram. 
Thank you
 
Key Takeaways
 
0:00 Introduction to the show
1:03 Welcome back
2:06 Kendrick joins the show
2:44 Kendrick shares his background
6:17 Catalyst to the trajectory for Kendrick
9:18 Power of Networking
13:35 Complexities of sales and engineering
15:53 Maintaining confidence
18:32 Big lesson learned
21:18 Diversity in the industry
26: 37 Surprises along the way
30:03 When change happens
30:53 Advice to those wanting into tech
32:39 Best ways to stay in touch with Kendrick
33:20 Thank you
 
Links:
Us In Technology Website
Kendrick's Instagram
Kendrick on LinkedIn
Support Hacker Valley Studio on Patreon. Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek. ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2020</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>138</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 137 - Securing Virtual and Augmented Reality with Tamas Henning</title>
        <itunes:title>Episode 137 - Securing Virtual and Augmented Reality with Tamas Henning</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-137-securing-virtual-and-augmented-reality-with-tamas-henning/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-137-securing-virtual-and-augmented-reality-with-tamas-henning/#comments</comments>        <pubDate>Mon, 10 May 2021 18:15:04 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c533cd75-512a-3089-8de1-40b2db13ca0d</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we have the powerful Tamas Henning, Director of Security Engineering at Marqeta and also Trust and Safety Advisor for XR Safety Initiative. </p>
<p class="p1">Tamas got started in technology at a very young age and that is credited to his dad.  In the Early 90s his dad built a software company, and he was a super curious kid. By 6th grade, he learned trigonometry just so he could recreate Tetris. </p>
<p class="p1">Take a listen to this incredible origin story and passion project of securing XR.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2">0:00 Intro</p>
<p class="p1">1:22 Show starts with Ron & Chris</p>
<p class="p1">1:50 Introduction to Tamas Henning</p>
<p class="p1">2:25 Tamas shares his background</p>
<p class="p1">3:30 Introduction to tech</p>
<p class="p1">6:48 Challenges faced</p>
<p class="p1">8:20 How Tamas’ dad feels about him</p>
<p class="p1">9:50 Brotherly relationships</p>
<p class="p1">10:50 Why security?</p>
<p class="p1">17:37 Kids and exposure to the internet</p>
<p class="p1">21:27 Thoughts about information collection</p>
<p class="p1">24:22 XR and what it really means</p>
<p class="p1">27:25 Making the internet safer</p>
<p class="p1">29:58 Advice to people who want to make an impact</p>
<p class="p1">31:01 Best ways to keep up with Tamas</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://twitter.com/tamashenning'>Tamas on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/tamashenning/'>Tamas on LinkedIn</a> </p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>. Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter. </p>
<p class="p3">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p class="p3"> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we have the powerful Tamas Henning, Director of Security Engineering at Marqeta and also Trust and Safety Advisor for XR Safety Initiative. </p>
<p class="p1">Tamas got started in technology at a very young age and that is credited to his dad.  In the Early 90s his dad built a software company, and he was a super curious kid. By 6th grade, he learned trigonometry just so he could recreate Tetris. </p>
<p class="p1">Take a listen to this incredible origin story and passion project of securing XR.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways</p>
<p class="p2">0:00 Intro</p>
<p class="p1">1:22 Show starts with Ron & Chris</p>
<p class="p1">1:50 Introduction to Tamas Henning</p>
<p class="p1">2:25 Tamas shares his background</p>
<p class="p1">3:30 Introduction to tech</p>
<p class="p1">6:48 Challenges faced</p>
<p class="p1">8:20 How Tamas’ dad feels about him</p>
<p class="p1">9:50 Brotherly relationships</p>
<p class="p1">10:50 Why security?</p>
<p class="p1">17:37 Kids and exposure to the internet</p>
<p class="p1">21:27 Thoughts about information collection</p>
<p class="p1">24:22 XR and what it really means</p>
<p class="p1">27:25 Making the internet safer</p>
<p class="p1">29:58 Advice to people who want to make an impact</p>
<p class="p1">31:01 Best ways to keep up with Tamas</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://twitter.com/tamashenning'>Tamas on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/tamashenning/'>Tamas on LinkedIn</a> </p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>. Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter. </p>
<p class="p3">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p class="p3"> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cd4tbt/Tamas_Henning.mp3" length="60759738" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we have the powerful Tamas Henning, Director of Security Engineering at Marqeta and also Trust and Safety Advisor for XR Safety Initiative. 
Tamas got started in technology at a very young age and that is credited to his dad.  In the Early 90s his dad built a software company, and he was a super curious kid. By 6th grade, he learned trigonometry just so he could recreate Tetris. 
Take a listen to this incredible origin story and passion project of securing XR.
 
Key Takeaways
0:00 Intro
1:22 Show starts with Ron & Chris
1:50 Introduction to Tamas Henning
2:25 Tamas shares his background
3:30 Introduction to tech
6:48 Challenges faced
8:20 How Tamas’ dad feels about him
9:50 Brotherly relationships
10:50 Why security?
17:37 Kids and exposure to the internet
21:27 Thoughts about information collection
24:22 XR and what it really means
27:25 Making the internet safer
29:58 Advice to people who want to make an impact
31:01 Best ways to keep up with Tamas
 
Links:
Tamas on Twitter
Tamas on LinkedIn 
Support Hacker Valley Studio on Patreon. Follow Hacker Valley Studio on Twitter. 
Follow hosts Ron Eddings and Chris Cochran on Twitter. 
Learn more about our sponsor ByteChek. 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1899</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>137</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 136 - From Tragedy to Triumph with Chani Simms</title>
        <itunes:title>Episode 136 - From Tragedy to Triumph with Chani Simms</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-136-from-tragedy-to-triumph-with-chani-simms/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-136-from-tragedy-to-triumph-with-chani-simms/#comments</comments>        <pubDate>Tue, 04 May 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/1b71ec70-541f-34b7-a290-efa294598e00</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we welcome Chani Simms, Managing Director of Meta Defence Labs as well as Founder and Chief Architect of She Ciso Exec.  Chani tells us the story of her rise from tragedy during childhood to being triumphant today.</p>
<p class="p1"> </p>
<p class="p1">0:00 Intro</p>
<p class="p1">1:03 In this episode with Chani Simms</p>
<p class="p1">2:22 Chani shares a bit about her background</p>
<p class="p1">3:35 Exposure to IT</p>
<p class="p1">5:24 First cold call experience</p>
<p class="p1">6:24 Chani’s early years in Sri Lanka</p>
<p class="p1">12:25 How did Chani recover from the trauma</p>
<p class="p1">13:08 What gave Chani hope</p>
<p class="p1">16:24 How a specific billboard spoke to her</p>
<p class="p1">18:12 Surprises along the way</p>
<p class="p1">20:35 Superpowers</p>
<p class="p1">23:00 Emotional intelligence</p>
<p class="p1">25:40 Having a good relationship with others</p>
<p class="p1">28:43 Chani’s advice to others</p>
<p class="p1">31:08 Connecting with Chani</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">LinkedIn: <a href='https://www.linkedin.com/in/chani-simms'>https://www.linkedin.com/in/chani-simms</a></p>
<p class="p3">Twitter: <a href='https://twitter.com/ChaniSimms'>https://twitter.com/ChaniSimms</a></p>
<p class="p3">Website: <a href='http://www.metadefencelabs.com'>www.metadefencelabs.com</a></p>
<p class="p3">TedX Talk: <a href='https://www.ted.com/talks/chani_simms_stop_chasing_the_magic_security_box'>https://www.ted.com/talks/chani_simms_stop_chasing_the_magic_security_box</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a> and enroll in The AttackIQ <a href='https://academy.attackiq.com/'>Academy</a>!</p>
<p class="p3"> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we welcome Chani Simms, Managing Director of Meta Defence Labs as well as Founder and Chief Architect of She Ciso Exec.  Chani tells us the story of her rise from tragedy during childhood to being triumphant today.</p>
<p class="p1"> </p>
<p class="p1">0:00 Intro</p>
<p class="p1">1:03 In this episode with Chani Simms</p>
<p class="p1">2:22 Chani shares a bit about her background</p>
<p class="p1">3:35 Exposure to IT</p>
<p class="p1">5:24 First cold call experience</p>
<p class="p1">6:24 Chani’s early years in Sri Lanka</p>
<p class="p1">12:25 How did Chani recover from the trauma</p>
<p class="p1">13:08 What gave Chani hope</p>
<p class="p1">16:24 How a specific billboard spoke to her</p>
<p class="p1">18:12 Surprises along the way</p>
<p class="p1">20:35 Superpowers</p>
<p class="p1">23:00 Emotional intelligence</p>
<p class="p1">25:40 Having a good relationship with others</p>
<p class="p1">28:43 Chani’s advice to others</p>
<p class="p1">31:08 Connecting with Chani</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">LinkedIn: <a href='https://www.linkedin.com/in/chani-simms'>https://www.linkedin.com/in/chani-simms</a></p>
<p class="p3">Twitter: <a href='https://twitter.com/ChaniSimms'>https://twitter.com/ChaniSimms</a></p>
<p class="p3">Website: <a href='http://www.metadefencelabs.com'>www.metadefencelabs.com</a></p>
<p class="p3">TedX Talk: <a href='https://www.ted.com/talks/chani_simms_stop_chasing_the_magic_security_box'>https://www.ted.com/talks/chani_simms_stop_chasing_the_magic_security_box</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a> and enroll in The AttackIQ <a href='https://academy.attackiq.com/'>Academy</a>!</p>
<p class="p3"> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/g6qrqy/HVS_133_Chani_Simms_REVa7r9y.mp3" length="31059427" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we welcome Chani Simms, Managing Director of Meta Defence Labs as well as Founder and Chief Architect of She Ciso Exec.  Chani tells us the story of her rise from tragedy during childhood to being triumphant today.
 
0:00 Intro
1:03 In this episode with Chani Simms
2:22 Chani shares a bit about her background
3:35 Exposure to IT
5:24 First cold call experience
6:24 Chani’s early years in Sri Lanka
12:25 How did Chani recover from the trauma
13:08 What gave Chani hope
16:24 How a specific billboard spoke to her
18:12 Surprises along the way
20:35 Superpowers
23:00 Emotional intelligence
25:40 Having a good relationship with others
28:43 Chani’s advice to others
31:08 Connecting with Chani
 
Links:
LinkedIn: https://www.linkedin.com/in/chani-simms
Twitter: https://twitter.com/ChaniSimms
Website: www.metadefencelabs.com
TedX Talk: https://www.ted.com/talks/chani_simms_stop_chasing_the_magic_security_box
Learn more about Hacker Valley Studio.
Learn more about our sponsor AttackIQ and enroll in The AttackIQ Academy!
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1941</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>136</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Road to the Webby's: An Underdog Story</title>
        <itunes:title>Road to the Webby's: An Underdog Story</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/road-to-the-webbys-an-underdog-story/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/road-to-the-webbys-an-underdog-story/#comments</comments>        <pubDate>Sun, 02 May 2021 12:35:31 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/cbb27bd2-c781-36d3-b1aa-74511800e30c</guid>
                                    <description><![CDATA[<p>Vote here: <a href='https://lnkd.in/gGCmwTR'>https://www.hackervalley.com/vote</a></p>
<p>It might seem impossible... but we need an incredible amount of votes to have a shot to win this People's Choice Webby.

Who would have thought that two black cybersecurity professional with home studios, would have a shot against these huge media companies.

But this prize is more than the trophy or the title.

We are representing cybersecurity.

We are representing the independent creators.

We are representing the underrepresented.

The audacious part... We believe we will win this thing.

30 seconds of your time can put us in the history books.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Vote here: <a href='https://lnkd.in/gGCmwTR'>https://www.hackervalley.com/vote</a></p>
<p>It might seem impossible... but we need an incredible amount of votes to have a shot to win this People's Choice Webby.<br>
<br>
Who would have thought that two black cybersecurity professional with home studios, would have a shot against these huge media companies.<br>
<br>
But this prize is more than the trophy or the title.<br>
<br>
We are representing cybersecurity.<br>
<br>
We are representing the independent creators.<br>
<br>
We are representing the underrepresented.<br>
<br>
The audacious part... We believe we will win this thing.<br>
<br>
30 seconds of your time can put us in the history books.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hn3wuh/Road_to_Webby7lldz.mp3" length="10056192" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Vote here: https://www.hackervalley.com/vote
It might seem impossible... but we need an incredible amount of votes to have a shot to win this People's Choice Webby.Who would have thought that two black cybersecurity professional with home studios, would have a shot against these huge media companies.But this prize is more than the trophy or the title.We are representing cybersecurity.We are representing the independent creators.We are representing the underrepresented.The audacious part... We believe we will win this thing.30 seconds of your time can put us in the history books.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>624</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>135</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 134 - Knowing Your Worth in Technology and Cybersecurity with Jimmy Sanders</title>
        <itunes:title>Episode 134 - Knowing Your Worth in Technology and Cybersecurity with Jimmy Sanders</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-134-knowing-your-worth-in-technology-and-cybersecurity-with-jimmy-sanders/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-134-knowing-your-worth-in-technology-and-cybersecurity-with-jimmy-sanders/#comments</comments>        <pubDate>Tue, 27 Apr 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5ebd62e5-57ca-3865-8c25-1d838bd87cae</guid>
                                    <description><![CDATA[<p class="p1">In the studio today is Jimmy Sanders, a mentor, technician and all-around leader.  Jimmy is the head of information security at Netflix DVD where he secures data and systems from cyber threat while building resilient compliance programs across technology, financial services, and healthcare organizations.</p>
<p class="p1">Jimmy is here to talk about what we are worth in technology and cyber security.  He is always full of advice and knowledge and is always promoting positive change in our community. </p>
<p class="p1">To start this podcast, Jimmy shares a little about his background and how he came to the role he is in now for Netflix.  Along with his career background, he shares all the organizations he is involved with.</p>
<p class="p1">Jimmy talks briefly about what happened to him that encouraged him to go 120% and then some in this career choice.  He didn’t find his passion in technology until 12 years after graduating college.  You will hear how the possibility of never walking again affected his work ethic.  </p>
<p class="p1">Allan and Jimmy talk at length about those 12-years where Jimmy was stumbling, bouncing from college to college, to flunking out of college.  It took those years for him to discover how the absence of passion can truly feel.  </p>
<p class="p1">The show closes discussing knowing how to recognize opportunities and taking them.  In addition, they talk about how important it is to know your worth, recognize your value and that everything in life or work is negotiable.  You will only be better than your job description if you make it that way.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2">0:00 Intro</p>
<p class="p1">1:27 Episode begins</p>
<p class="p1">2:28 Jimmy Sanders introduced</p>
<p class="p1">2:40 Jimmy shares his background</p>
<p class="p1">4:20 Jimmy shares how he made his way into cyber security</p>
<p class="p1">6:28 What happened to Jimmy that got him going headstrong into cyber security</p>
<p class="p1">8:57 For 12-years, Jimmy stumbled through life – what did he learn and do?</p>
<p class="p1">10:40 Journey into his career choice and how it skyrocketed</p>
<p class="p1">13:00 How does Jimmy stay fresh and on top of advancements</p>
<p class="p1">14:54 Jimmy shares his “superpower”</p>
<p class="p1">17:55 Making the most of opportunities and getting into that mindset</p>
<p class="p1">20:15 Jimmy shares how to know your worth and understand your value</p>
<p class="p1">23:35 Negotiations when looking for a job</p>
<p class="p1">25:10 Jimmy’s hopes and objectives for the Technology Collaborative Summit which Cyber Ranch is hosting</p>
<p class="p1">27:26 Advice to those questioning their value in their cyber security job</p>
<p class="p1">28:55 Thank you and how to keep in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Sign up for the April 27th event 3:30 PM – 5:00 PM Pacific Time: <a href='http://www.techwc.org'>www.techwc.org</a></p>
<p class="p3"><a href='mailto:https%3A//www.linkedin.com/in/jimmy-s-cissp-crisc-cism/'>Jimmy Sanders</a> on LinkedIn</p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>. Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter. </p>
<p class="p3">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p class="p3"><a href='https://vote.webbyawards.com/PublicVoting#/2021/podcasts/general-series/technology'>Vote for Hacker Valley Studio to win a Webby!</a></p>
<p class="p3"> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In the studio today is Jimmy Sanders, a mentor, technician and all-around leader.  Jimmy is the head of information security at Netflix DVD where he secures data and systems from cyber threat while building resilient compliance programs across technology, financial services, and healthcare organizations.</p>
<p class="p1">Jimmy is here to talk about what we are worth in technology and cyber security.  He is always full of advice and knowledge and is always promoting positive change in our community. </p>
<p class="p1">To start this podcast, Jimmy shares a little about his background and how he came to the role he is in now for Netflix.  Along with his career background, he shares all the organizations he is involved with.</p>
<p class="p1">Jimmy talks briefly about what happened to him that encouraged him to go 120% and then some in this career choice.  He didn’t find his passion in technology until 12 years after graduating college.  You will hear how the possibility of never walking again affected his work ethic.  </p>
<p class="p1">Allan and Jimmy talk at length about those 12-years where Jimmy was stumbling, bouncing from college to college, to flunking out of college.  It took those years for him to discover how the absence of passion can truly feel.  </p>
<p class="p1">The show closes discussing knowing how to recognize opportunities and taking them.  In addition, they talk about how important it is to know your worth, recognize your value and that everything in life or work is negotiable.  You will only be better than your job description if you make it that way.</p>
<p class="p2"> </p>
<p class="p1">Key Takeaways:</p>
<p class="p2">0:00 Intro</p>
<p class="p1">1:27 Episode begins</p>
<p class="p1">2:28 Jimmy Sanders introduced</p>
<p class="p1">2:40 Jimmy shares his background</p>
<p class="p1">4:20 Jimmy shares how he made his way into cyber security</p>
<p class="p1">6:28 What happened to Jimmy that got him going headstrong into cyber security</p>
<p class="p1">8:57 For 12-years, Jimmy stumbled through life – what did he learn and do?</p>
<p class="p1">10:40 Journey into his career choice and how it skyrocketed</p>
<p class="p1">13:00 How does Jimmy stay fresh and on top of advancements</p>
<p class="p1">14:54 Jimmy shares his “superpower”</p>
<p class="p1">17:55 Making the most of opportunities and getting into that mindset</p>
<p class="p1">20:15 Jimmy shares how to know your worth and understand your value</p>
<p class="p1">23:35 Negotiations when looking for a job</p>
<p class="p1">25:10 Jimmy’s hopes and objectives for the Technology Collaborative Summit which Cyber Ranch is hosting</p>
<p class="p1">27:26 Advice to those questioning their value in their cyber security job</p>
<p class="p1">28:55 Thank you and how to keep in touch</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Sign up for the April 27th event 3:30 PM – 5:00 PM Pacific Time: <a href='http://www.techwc.org'>www.techwc.org</a></p>
<p class="p3"><a href='mailto:https%3A//www.linkedin.com/in/jimmy-s-cissp-crisc-cism/'>Jimmy Sanders</a> on LinkedIn</p>
<p class="p3">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>. Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>. </p>
<p class="p3">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter. </p>
<p class="p3">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p class="p3"><a href='https://vote.webbyawards.com/PublicVoting#/2021/podcasts/general-series/technology'>Vote for Hacker Valley Studio to win a Webby!</a></p>
<p class="p3"> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/tunn3i/Jimmy_Sanders_Final_Mix879a3.mp3" length="29107200" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In the studio today is Jimmy Sanders, a mentor, technician and all-around leader.  Jimmy is the head of information security at Netflix DVD where he secures data and systems from cyber threat while building resilient compliance programs across technology, financial services, and healthcare organizations.
Jimmy is here to talk about what we are worth in technology and cyber security.  He is always full of advice and knowledge and is always promoting positive change in our community. 
To start this podcast, Jimmy shares a little about his background and how he came to the role he is in now for Netflix.  Along with his career background, he shares all the organizations he is involved with.
Jimmy talks briefly about what happened to him that encouraged him to go 120% and then some in this career choice.  He didn’t find his passion in technology until 12 years after graduating college.  You will hear how the possibility of never walking again affected his work ethic.  
Allan and Jimmy talk at length about those 12-years where Jimmy was stumbling, bouncing from college to college, to flunking out of college.  It took those years for him to discover how the absence of passion can truly feel.  
The show closes discussing knowing how to recognize opportunities and taking them.  In addition, they talk about how important it is to know your worth, recognize your value and that everything in life or work is negotiable.  You will only be better than your job description if you make it that way.
 
Key Takeaways:
0:00 Intro
1:27 Episode begins
2:28 Jimmy Sanders introduced
2:40 Jimmy shares his background
4:20 Jimmy shares how he made his way into cyber security
6:28 What happened to Jimmy that got him going headstrong into cyber security
8:57 For 12-years, Jimmy stumbled through life – what did he learn and do?
10:40 Journey into his career choice and how it skyrocketed
13:00 How does Jimmy stay fresh and on top of advancements
14:54 Jimmy shares his “superpower”
17:55 Making the most of opportunities and getting into that mindset
20:15 Jimmy shares how to know your worth and understand your value
23:35 Negotiations when looking for a job
25:10 Jimmy’s hopes and objectives for the Technology Collaborative Summit which Cyber Ranch is hosting
27:26 Advice to those questioning their value in their cyber security job
28:55 Thank you and how to keep in touch
 
Links:
Sign up for the April 27th event 3:30 PM – 5:00 PM Pacific Time: www.techwc.org
Jimmy Sanders on LinkedIn
Support Hacker Valley Studio on Patreon. Follow Hacker Valley Studio on Twitter. 
Follow hosts Ron Eddings and Chris Cochran on Twitter. 
Learn more about our sponsor ByteChek. 
Vote for Hacker Valley Studio to win a Webby!
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1815</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>134</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Vote for Hacker Valley to Win a Webby Award!</title>
        <itunes:title>Vote for Hacker Valley to Win a Webby Award!</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/vote-for-hacker-valley-to-win-a-webby-award/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/vote-for-hacker-valley-to-win-a-webby-award/#comments</comments>        <pubDate>Mon, 26 Apr 2021 05:20:48 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/493f02a0-d75f-3824-b5de-480ae541c871</guid>
                                    <description><![CDATA[<p>In this special announcement, we talk about the Webby's, the incredible honor it is, and the stiff competition we are up against.</p>
<p> </p>
<p>Vote and help make our dream become reality here: https://hackervalley.com/vote</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this special announcement, we talk about the Webby's, the incredible honor it is, and the stiff competition we are up against.</p>
<p> </p>
<p>Vote and help make our dream become reality here: https://hackervalley.com/vote</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/68qy4b/Webbys_Announcement6rzu6.mp3" length="4802688" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this special announcement, we talk about the Webby's, the incredible honor it is, and the stiff competition we are up against.
 
Vote and help make our dream become reality here: https://hackervalley.com/vote]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>296</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>133</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 132 - Giving Back Through Technology with Gabriela Ariza</title>
        <itunes:title>Episode 132 - Giving Back Through Technology with Gabriela Ariza</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-132-giving-back-through-technology-with-gabriela-ariza/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-132-giving-back-through-technology-with-gabriela-ariza/#comments</comments>        <pubDate>Wed, 21 Apr 2021 07:21:07 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b538aacf-fd10-3958-bc7b-a5e51d5e2eb5</guid>
                                    <description><![CDATA[<p class="p1">In this episode, we welcome Gabriela Ariza, a cybersecurity practitioner, influence, and wealth builder.  We talk about her incredible story and how she got into social media influencing.  Gabi started her IT journey in web development and then decided to transition to cybersecurity.  She now works in protecting and analyzing government infrastructure for state and county governments across the United States.  In addition, Gabi has founded a non-profit called HaITian Common Space.</p>
<p class="p2"> </p>
<p class="p1" style="text-align:justify;">0:00 - Intro</p>
<p class="p1" style="text-align:justify;">1:04 - In this episode</p>
<p class="p1" style="text-align:justify;">2:03 - Gabi introduced</p>
<p class="p1" style="text-align:justify;">5:42 - The story of where Gabi felt the magic for cybersecurity</p>
<p class="p1" style="text-align:justify;">7:07 – Special segment on CNBC</p>
<p class="p1" style="text-align:justify;">9:10 – Mindset of earning and saving</p>
<p class="p1" style="text-align:justify;">12:28 – Influence of parents</p>
<p class="p1" style="text-align:justify;">14:54 – The launch of Gabi’s nonprofit</p>
<p class="p1" style="text-align:justify;">15:50 – Superpowers</p>
<p class="p1" style="text-align:justify;">17:34 – Goals</p>
<p class="p1" style="text-align:justify;">22:23 – What’s next</p>
<p class="p1" style="text-align:justify;">23:17 – The impact</p>
<p class="p1" style="text-align:justify;">24:39 – Thank you</p>
<p class="p1" style="text-align:justify;">24:52 – Connecting with Gabi</p>
 
Instagram: <a href='https://www.instagram.com/fab_millennial/'>fab_millennial</a>
Website: <a href='https://gabrielaariza.com/'>gabrielaariza.com</a>
Nonprofit: <a href='https://www.haitiancommonspace.org/'>haitiancommonspace.org</a>
Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.
Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.
Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.
Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>.
<a href='https://vote.webbyawards.com/PublicVoting#/2021/podcasts/general-series/technology'>Vote for Hacker Valley Studio to win a Webby!</a>]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode, we welcome Gabriela Ariza, a cybersecurity practitioner, influence, and wealth builder.  We talk about her incredible story and how she got into social media influencing.  Gabi started her IT journey in web development and then decided to transition to cybersecurity.  She now works in protecting and analyzing government infrastructure for state and county governments across the United States.  In addition, Gabi has founded a non-profit called HaITian Common Space.</p>
<p class="p2"> </p>
<p class="p1" style="text-align:justify;">0:00 - Intro</p>
<p class="p1" style="text-align:justify;">1:04 - In this episode</p>
<p class="p1" style="text-align:justify;">2:03 - Gabi introduced</p>
<p class="p1" style="text-align:justify;">5:42 - The story of where Gabi felt the magic for cybersecurity</p>
<p class="p1" style="text-align:justify;">7:07 – Special segment on CNBC</p>
<p class="p1" style="text-align:justify;">9:10 – Mindset of earning and saving</p>
<p class="p1" style="text-align:justify;">12:28 – Influence of parents</p>
<p class="p1" style="text-align:justify;">14:54 – The launch of Gabi’s nonprofit</p>
<p class="p1" style="text-align:justify;">15:50 – Superpowers</p>
<p class="p1" style="text-align:justify;">17:34 – Goals</p>
<p class="p1" style="text-align:justify;">22:23 – What’s next</p>
<p class="p1" style="text-align:justify;">23:17 – The impact</p>
<p class="p1" style="text-align:justify;">24:39 – Thank you</p>
<p class="p1" style="text-align:justify;">24:52 – Connecting with Gabi</p>
 
Instagram: <a href='https://www.instagram.com/fab_millennial/'>fab_millennial</a>
Website: <a href='https://gabrielaariza.com/'>gabrielaariza.com</a>
Nonprofit: <a href='https://www.haitiancommonspace.org/'>haitiancommonspace.org</a>
Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.
Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.
Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.
Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>.
<a href='https://vote.webbyawards.com/PublicVoting#/2021/podcasts/general-series/technology'>Vote for Hacker Valley Studio to win a Webby!</a>]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wq4hkz/HVS_132_Gabriela_Ariza_REV1.mp3" length="49297693" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we welcome Gabriela Ariza, a cybersecurity practitioner, influence, and wealth builder.  We talk about her incredible story and how she got into social media influencing.  Gabi started her IT journey in web development and then decided to transition to cybersecurity.  She now works in protecting and analyzing government infrastructure for state and county governments across the United States.  In addition, Gabi has founded a non-profit called HaITian Common Space.
 
0:00 - Intro
1:04 - In this episode
2:03 - Gabi introduced
5:42 - The story of where Gabi felt the magic for cybersecurity
7:07 – Special segment on CNBC
9:10 – Mindset of earning and saving
12:28 – Influence of parents
14:54 – The launch of Gabi’s nonprofit
15:50 – Superpowers
17:34 – Goals
22:23 – What’s next
23:17 – The impact
24:39 – Thank you
24:52 – Connecting with Gabi
 
Instagram: fab_millennial
Website: gabrielaariza.com
Nonprofit: haitiancommonspace.org
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek.
Vote for Hacker Valley Studio to win a Webby!]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1541</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>132</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 131 - Making the Most of Time Off with Sarah Groen</title>
        <itunes:title>Episode 131 - Making the Most of Time Off with Sarah Groen</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-131-making-the-most-of-time-off-with-sarah-groen/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-131-making-the-most-of-time-off-with-sarah-groen/#comments</comments>        <pubDate>Thu, 15 Apr 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/4c998d31-1129-3621-8658-2196a100e5e5</guid>
                                    <description><![CDATA[<p>In this featured episode of Hacker Valley Studio podcast, Ron and Chris are joined by Sarah Groen, founder and CEO of Bell & Bly Travel, a luxury travel advisory firm. Bell & Bly Travel helps executives, entrepreneurs, and their families take a holistic view of their vacation planning, allowing them to save time, enjoy amazing experiences they can't plan on their own, and make lasting memories with loved ones. Sarah is a contributing columnist for the CEOWORLD magazine and is the host for the Luxury Travel insider podcast.</p>
<p>In most of our episodes, we talk about work, the grind, and getting better every single day.  In this episode, we talk about something a little different; talking about taking time for yourself and maximizing vacations and time off, time with family, friends, and time for experiences.  </p>
<p>Sarah is no stranger to experiences; she has traveled the world and is an expert at planning vacations.  We brought her into the studio to talk about getting the most out of our time off.  </p>
<p>Her background is varied; she has an extremely random resume. She is from South Texas and lives in Houston.  She started in the financial world but wanted to get off the corporate rat race track because she didn’t enjoy what she was doing.  She went back to business school, not knowing what she wanted to do, but focused on entrepreneurship.  </p>
<p>After school, Sarah went back to Houston and did many things, such as investing in an energy software startup and being an accelerator that she co-founded.  She worked at Uber - launching and running UberEats in Houston and Phoenix.  Finally, Sarah realized that if she was going to put that much time and effort into a business, she wanted it to be her own and build her own equity.  So, she started looking into companies to invest in and buy.  She finally began to focus on her passion for travel.  </p>
<p>She describes herself as crazy about travel and shares how many countries she has visited and continents - and it’s a lot!  She is always thinking about where she is going next.  It all started due to her early experience where at 15 she went to Germany for an entire summer.  She loves planning travel for families who have kids at that age which is an impetus to loving travel.  This love led her to use all her free time for travel.</p>
<p>Sarah loves all her travel experiences for so many reasons.  Trips fulfill you in many different ways.  Her ability to share what she loves led to her acceptance at Stanford.  Travel reminds her that she is so small in the world.  There are so many other ways to think and live, that when she travels, she is reminded of that.  </p>
<p>As the episode progresses, Sarah describes how travel benefits the mind and health.  There is a lot of research that shows how vacations and travel is good for you.  People need it!  One example is neuroplasticity.  If something brand new happens, you will remember it more.  This keeps your brain more agile and to be more creative.  Travel puts you in a different environment and helps create new neuropathways.</p>
<p>It is a fact that Americans are skipping tons of vacation days; there are millions of vacation days left on the table.  As that number goes up, all sorts of things are happening such as anxiety, mental health issues and other things that are symptoms of working too hard.</p>
<p>In order to plan travel for groups, they bring people in and ask multiple questions to get to the bottom of what’s most important about this vacation and why.  What helps them relax.  This helps discover what is needed most by the travelers.  Making the most of the vacations is different for every person.  Some want to do everything, and some don’t want to do much at all.  </p>
<p>The needs are different for everybody!  Luxury travel means something different, however.  She hesitates to put the word “luxury” in marketing, etc.  Generations want different things and luxury means true customization.  People don’t want to feel like a number anymore.  She is catering toward personalized and customized things.  </p>
<p>What does customized mean?  How does it get specific?  What do people look at?  Sarah can do and plan things that are “ungoogleable.”  There are so many experiences that can be customized based on interests and passions.  These are “behind the scenes” and not amongst the packed tours that one encounters when on typical vacations.</p>
<p>Sarah shares how networking is important in the role as a luxury travel planner.  She specializes in clients’ needs and wants, and they plan the world.  That can only happen through fantastic networks and partnerships. They have worked with them and keep up with them on a regular basis.  They have vetted partners in every corner of the world, and are kept up-to-date and help curate these specific itineraries and ideas.  Doesn’t matter if it is art or basketball, they make it happen due to their network.</p>
<p>How people spend their money is personal, but don’t save it for a day you are never going to spend it.  If there is something you want to do, make a plan to make it happen.  Lay out what you want to achieve in your travel bucket list, and make a plan.  Pencil the experiences in that you want to have!</p>
<p>Travel has changed alot since Covid-19.  Don’t let it scare you off when you are planning travel.  Hotels and airlines and tour operators have adjusted to safety protocols.  Safety is different for all people and their wants in regard to the degree of risk they are willing to take. Booking and cancellation policies have flexed greatly.  Those dream trips can be planned almost risk-free right now.  </p>
<p>When it comes to food, it is trending to having more local cuisine experiences.  For instance, going to the market, following a local expert, going to different places and trying different things.  It is food combined with stories and history that is the trend.  </p>
<p>Sarah is planning our “Think Week”, and we were excited to hear what she had in store for us.  She has our interests and general information based on the forms sent to us.  The next step is a call to hear what changes from the form and speaking in person.  This gives a true vision of what might make sense and then talk about options and possibilities.  </p>
<p>

</p>
<p>Impactful Moments</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p> </p>
<p>1:26 - This episode features Sarah Groen</p>
<p> </p>
<p>2:25 - Where they met Sarah</p>
<p> </p>
<p>2:44 - Sarah’s background is extremely varied</p>
<p> </p>
<p>3:19 - Where the entrepreneurship started</p>
<p> </p>
<p>3:57 - Decided to start focusing on her passion - travel</p>
<p> </p>
<p>4:14 - Why travel?  What does it mean to her?</p>
<p> </p>
<p>5:19 - Most memorable travel experience?</p>
<p> </p>
<p>7:40 - How good travel is for you</p>
<p> </p>
<p>10:35 - How people get the most out of time off?</p>
<p> </p>
<p>13:04 - What does luxury travel mean for clients?</p>
<p> </p>
<p>17:57 - How important is networking in this type of role?</p>
<p> </p>
<p>20:23 - What would you say to our listeners who want to dip their toes in luxury travel?</p>
<p> </p>
<p>22:08 - How travel has changed due to Covid-19.</p>
<p> </p>
<p>25:36 - How food fits into travel</p>
<p> </p>
<p> 27:58 - What’s in store for our “Think Week”</p>
<p> </p>
<p>29:29 - Best ways to stay in or get in touch with Sarah</p>
<p>


</p>
<p>Links:</p>
<p> </p>
<p>Learn more about <a href='http://www.belleandblytravel.com'>BelleAndBlyTravel</a></p>
<p> </p>
<p><a href='https://bellandblytravel.com/luxury-travel-insider/'>Luxury Travel Insider Podcast</a> on all platforms</p>
<p> </p>
<p><a href='https://www.instagram.com/sarahgoesglobal/'>@Sarahgoesglobal</a> on Instagram</p>
<p> </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p> </p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p> </p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p> </p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>
Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this featured episode of Hacker Valley Studio podcast, Ron and Chris are joined by Sarah Groen, founder and CEO of Bell & Bly Travel, a luxury travel advisory firm. Bell & Bly Travel helps executives, entrepreneurs, and their families take a holistic view of their vacation planning, allowing them to save time, enjoy amazing experiences they can't plan on their own, and make lasting memories with loved ones. Sarah is a contributing columnist for the CEOWORLD magazine and is the host for the Luxury Travel insider podcast.</p>
<p>In most of our episodes, we talk about work, the grind, and getting better every single day.  In this episode, we talk about something a little different; talking about taking time for yourself and maximizing vacations and time off, time with family, friends, and time for experiences.  </p>
<p>Sarah is no stranger to experiences; she has traveled the world and is an expert at planning vacations.  We brought her into the studio to talk about getting the most out of our time off.  </p>
<p>Her background is varied; she has an extremely random resume. She is from South Texas and lives in Houston.  She started in the financial world but wanted to get off the corporate rat race track because she didn’t enjoy what she was doing.  She went back to business school, not knowing what she wanted to do, but focused on entrepreneurship.  </p>
<p>After school, Sarah went back to Houston and did many things, such as investing in an energy software startup and being an accelerator that she co-founded.  She worked at Uber - launching and running UberEats in Houston and Phoenix.  Finally, Sarah realized that if she was going to put that much time and effort into a business, she wanted it to be her own and build her own equity.  So, she started looking into companies to invest in and buy.  She finally began to focus on her passion for travel.  </p>
<p>She describes herself as crazy about travel and shares how many countries she has visited and continents - and it’s a lot!  She is always thinking about where she is going next.  It all started due to her early experience where at 15 she went to Germany for an entire summer.  She loves planning travel for families who have kids at that age which is an impetus to loving travel.  This love led her to use all her free time for travel.</p>
<p>Sarah loves all her travel experiences for so many reasons.  Trips fulfill you in many different ways.  Her ability to share what she loves led to her acceptance at Stanford.  Travel reminds her that she is so small in the world.  There are so many other ways to think and live, that when she travels, she is reminded of that.  </p>
<p>As the episode progresses, Sarah describes how travel benefits the mind and health.  There is a lot of research that shows how vacations and travel is good for you.  People need it!  One example is neuroplasticity.  If something brand new happens, you will remember it more.  This keeps your brain more agile and to be more creative.  Travel puts you in a different environment and helps create new neuropathways.</p>
<p>It is a fact that Americans are skipping tons of vacation days; there are millions of vacation days left on the table.  As that number goes up, all sorts of things are happening such as anxiety, mental health issues and other things that are symptoms of working too hard.</p>
<p>In order to plan travel for groups, they bring people in and ask multiple questions to get to the bottom of what’s most important about this vacation and why.  What helps them relax.  This helps discover what is needed most by the travelers.  Making the most of the vacations is different for every person.  Some want to do everything, and some don’t want to do much at all.  </p>
<p>The needs are different for everybody!  Luxury travel means something different, however.  She hesitates to put the word “luxury” in marketing, etc.  Generations want different things and luxury means true customization.  People don’t want to feel like a number anymore.  She is catering toward personalized and customized things.  </p>
<p>What does customized mean?  How does it get specific?  What do people look at?  Sarah can do and plan things that are “ungoogleable.”  There are so many experiences that can be customized based on interests and passions.  These are “behind the scenes” and not amongst the packed tours that one encounters when on typical vacations.</p>
<p>Sarah shares how networking is important in the role as a luxury travel planner.  She specializes in clients’ needs and wants, and they plan the world.  That can only happen through fantastic networks and partnerships. They have worked with them and keep up with them on a regular basis.  They have vetted partners in every corner of the world, and are kept up-to-date and help curate these specific itineraries and ideas.  Doesn’t matter if it is art or basketball, they make it happen due to their network.</p>
<p>How people spend their money is personal, but don’t save it for a day you are never going to spend it.  If there is something you want to do, make a plan to make it happen.  Lay out what you want to achieve in your travel bucket list, and make a plan.  Pencil the experiences in that you want to have!</p>
<p>Travel has changed alot since Covid-19.  Don’t let it scare you off when you are planning travel.  Hotels and airlines and tour operators have adjusted to safety protocols.  Safety is different for all people and their wants in regard to the degree of risk they are willing to take. Booking and cancellation policies have flexed greatly.  Those dream trips can be planned almost risk-free right now.  </p>
<p>When it comes to food, it is trending to having more local cuisine experiences.  For instance, going to the market, following a local expert, going to different places and trying different things.  It is food combined with stories and history that is the trend.  </p>
<p>Sarah is planning our “Think Week”, and we were excited to hear what she had in store for us.  She has our interests and general information based on the forms sent to us.  The next step is a call to hear what changes from the form and speaking in person.  This gives a true vision of what might make sense and then talk about options and possibilities.  </p>
<p><br>
<br>
</p>
<p>Impactful Moments</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p> </p>
<p>1:26 - This episode features Sarah Groen</p>
<p> </p>
<p>2:25 - Where they met Sarah</p>
<p> </p>
<p>2:44 - Sarah’s background is extremely varied</p>
<p> </p>
<p>3:19 - Where the entrepreneurship started</p>
<p> </p>
<p>3:57 - Decided to start focusing on her passion - travel</p>
<p> </p>
<p>4:14 - Why travel?  What does it mean to her?</p>
<p> </p>
<p>5:19 - Most memorable travel experience?</p>
<p> </p>
<p>7:40 - How good travel is for you</p>
<p> </p>
<p>10:35 - How people get the most out of time off?</p>
<p> </p>
<p>13:04 - What does luxury travel mean for clients?</p>
<p> </p>
<p>17:57 - How important is networking in this type of role?</p>
<p> </p>
<p>20:23 - What would you say to our listeners who want to dip their toes in luxury travel?</p>
<p> </p>
<p>22:08 - How travel has changed due to Covid-19.</p>
<p> </p>
<p>25:36 - How food fits into travel</p>
<p> </p>
<p> 27:58 - What’s in store for our “Think Week”</p>
<p> </p>
<p>29:29 - Best ways to stay in or get in touch with Sarah</p>
<p><br>
<br>
<br>
</p>
<p>Links:</p>
<p> </p>
<p>Learn more about <a href='http://www.belleandblytravel.com'>BelleAndBlyTravel</a></p>
<p> </p>
<p><a href='https://bellandblytravel.com/luxury-travel-insider/'>Luxury Travel Insider Podcast</a> on all platforms</p>
<p> </p>
<p><a href='https://www.instagram.com/sarahgoesglobal/'>@Sarahgoesglobal</a> on Instagram</p>
<p> </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p> </p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p> </p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p> </p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p><br>
Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/yw4dck/HVS_131_Sarah_Groen_REV.mp3" length="58971168" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this featured episode of Hacker Valley Studio podcast, Ron and Chris are joined by Sarah Groen, founder and CEO of Bell & Bly Travel, a luxury travel advisory firm. Bell & Bly Travel helps executives, entrepreneurs, and their families take a holistic view of their vacation planning, allowing them to save time, enjoy amazing experiences they can't plan on their own, and make lasting memories with loved ones. Sarah is a contributing columnist for the CEOWORLD magazine and is the host for the Luxury Travel insider podcast.
In most of our episodes, we talk about work, the grind, and getting better every single day.  In this episode, we talk about something a little different; talking about taking time for yourself and maximizing vacations and time off, time with family, friends, and time for experiences.  
Sarah is no stranger to experiences; she has traveled the world and is an expert at planning vacations.  We brought her into the studio to talk about getting the most out of our time off.  
Her background is varied; she has an extremely random resume. She is from South Texas and lives in Houston.  She started in the financial world but wanted to get off the corporate rat race track because she didn’t enjoy what she was doing.  She went back to business school, not knowing what she wanted to do, but focused on entrepreneurship.  
After school, Sarah went back to Houston and did many things, such as investing in an energy software startup and being an accelerator that she co-founded.  She worked at Uber - launching and running UberEats in Houston and Phoenix.  Finally, Sarah realized that if she was going to put that much time and effort into a business, she wanted it to be her own and build her own equity.  So, she started looking into companies to invest in and buy.  She finally began to focus on her passion for travel.  
She describes herself as crazy about travel and shares how many countries she has visited and continents - and it’s a lot!  She is always thinking about where she is going next.  It all started due to her early experience where at 15 she went to Germany for an entire summer.  She loves planning travel for families who have kids at that age which is an impetus to loving travel.  This love led her to use all her free time for travel.
Sarah loves all her travel experiences for so many reasons.  Trips fulfill you in many different ways.  Her ability to share what she loves led to her acceptance at Stanford.  Travel reminds her that she is so small in the world.  There are so many other ways to think and live, that when she travels, she is reminded of that.  
As the episode progresses, Sarah describes how travel benefits the mind and health.  There is a lot of research that shows how vacations and travel is good for you.  People need it!  One example is neuroplasticity.  If something brand new happens, you will remember it more.  This keeps your brain more agile and to be more creative.  Travel puts you in a different environment and helps create new neuropathways.
It is a fact that Americans are skipping tons of vacation days; there are millions of vacation days left on the table.  As that number goes up, all sorts of things are happening such as anxiety, mental health issues and other things that are symptoms of working too hard.
In order to plan travel for groups, they bring people in and ask multiple questions to get to the bottom of what’s most important about this vacation and why.  What helps them relax.  This helps discover what is needed most by the travelers.  Making the most of the vacations is different for every person.  Some want to do everything, and some don’t want to do much at all.  
The needs are different for everybody!  Luxury travel means something different, however.  She hesitates to put the word “luxury” in marketing, etc.  Generations want different things and luxury means true customization.  People don’t want to feel like a number anymore.  She is catering toward personaliz]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1842</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>131</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 130 - Fighting for Others with Anne Marie Zettlemoyer</title>
        <itunes:title>Episode 130 - Fighting for Others with Anne Marie Zettlemoyer</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-130-fighting-for-others-with-anne-marie-zettlemoyer/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-130-fighting-for-others-with-anne-marie-zettlemoyer/#comments</comments>        <pubDate>Wed, 07 Apr 2021 04:04:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ddccd5dc-dc1e-316e-8267-ce8ba9b57e55</guid>
                                    <description><![CDATA[<p>Anne Marie Zettlemoyer is Vice President of Security Engineering and Divisional Security Officer at MasterCard. She’s a mentor to many cybersecurity practitioners and a visiting fellow at the National Security Institute at George Mason University</p>
<p>As far back as elementary school, making sure everyone was treated properly and respected was important for Anne. In college, despite not knowing the first thing about cycling Anne’s determination to do the right thing led her to participate in a 600-mile charity ride to raise money for research towards a vaccine against HIV. </p>
<p>Anne Marie started in Business and holds an MBA in Organizational Behavior and Corporate Strategy, she started on the business side and worked under many titles like Analyst, Controller, Auditor, and Strategist. About 12 or 13 years ago she fell in love with Security because it speaks to her mission of protecting and defending others.  </p>
<p>Ron shares about how mentors have helped him learn cybersecurity and asks Anne Marie about when she’s helped others climb the security mountain. Anne Marie recalls being the only woman presenter at a Cybersecurity conference and receiving a certain lack of respect until she demonstrated exactly how much expertise and experience she had. She spoke to some other women in attendance and encouraged them to apply themselves in the same field assuring them that they could also succeed, two years later one of the people she encouraged had become Senior Security Engineer.</p>
<p>Chris asks about what it means to her to be able to show up with others now and whether she had someone like that for her own journey. Anne Marie shares about having to fight for everything herself. She expands that talent, grit, and many things are distributed throughout humanity but opportunity isn’t equally distributed. Anne Marie believes that those with the capability to find those who simply need an opportunity and lift them up have a certain responsibility to do so. That they can lift up those who will also lift up others. Ron asks Anne Marie about what it takes to make a great leader and supporter today. Anne Marie speaks a bit about leading from quiet influence and measures success more by effectiveness. The conversation shifts to how trust is needed when working to communicate risk and security decisions depending on who you’re working with as not everyone will share the same perspectives and backgrounds. Chris asks Anne Marie for a piece of advice for someone who may need someone to show up and protect them and she urges us to try new things, learn new things, expand our own possibilities. Anne Marie speaks about how showing up and trying to reach out can be enough to open new doors.</p>
<p>

</p>
<p>1:01 — Welcome back to the Hacker Valley Studio our guest this episode is Anne Marie Zettlemoyer.</p>
<p>2:43 —  Anne’s amazing fluency in business and how she fell in love with security.</p>
<p>4:37 — The call Anne feels to respect others and make sure they’re respected. </p>
<p>6:48 — The causes to fight for even without complete preparation for the journey ahead.</p>
<p>8:58 — The extremes of a ride to do the right thing, and a helping hand to get you up a mountain.</p>
<p>11:30 — How you can never know the power of showing up for yourself.</p>
<p>13:30 — The power of showing up for others and being the only woman there.</p>
<p>15:34 — Two years after being the only woman cybersecurity presenter at a conference</p>
<p>19:04 — Anne shares about having to fight for everything herself. </p>
<p>20:30 — The responsibility for those that have the heart to find and uplift others.</p>
<p>22:00 — The conversation moves to topics about networking and great leadership.</p>
<p>24:00 — Why having a sense of humility is necessary for a leader and building a network.</p>
<p>25:30 — Learning to not re-invent the wheel.</p>
<p>27:20 — Creating a rounded perspective to build comprehensive solutions.</p>
<p>28:50 — Why you need trust from the folks you’re trying to protect.</p>
<p>31:00 — Advice for someone listening that needs someone to protect or stand up for them.</p>
<p>32:45 — Trying new things one step at a time can be enough.

</p>
<p>Links</p>
<p>
You can find Anne Marie Zettlemoyer on her Linkedin or her T<a href='https://twitter.com/solvingcyber'>witter </a></p>
<p> </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a> and enroll in The AttackIQ <a href='https://academy.attackiq.com/'>Academy</a>!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Anne Marie Zettlemoyer is Vice President of Security Engineering and Divisional Security Officer at MasterCard. She’s a mentor to many cybersecurity practitioners and a visiting fellow at the National Security Institute at George Mason University</p>
<p>As far back as elementary school, making sure everyone was treated properly and respected was important for Anne. In college, despite not knowing the first thing about cycling Anne’s determination to do the right thing led her to participate in a 600-mile charity ride to raise money for research towards a vaccine against HIV. </p>
<p>Anne Marie started in Business and holds an MBA in Organizational Behavior and Corporate Strategy, she started on the business side and worked under many titles like Analyst, Controller, Auditor, and Strategist. About 12 or 13 years ago she fell in love with Security because it speaks to her mission of protecting and defending others.  </p>
<p>Ron shares about how mentors have helped him learn cybersecurity and asks Anne Marie about when she’s helped others climb the security mountain. Anne Marie recalls being the only woman presenter at a Cybersecurity conference and receiving a certain lack of respect until she demonstrated exactly how much expertise and experience she had. She spoke to some other women in attendance and encouraged them to apply themselves in the same field assuring them that they could also succeed, two years later one of the people she encouraged had become Senior Security Engineer.</p>
<p>Chris asks about what it means to her to be able to show up with others now and whether she had someone like that for her own journey. Anne Marie shares about having to fight for everything herself. She expands that talent, grit, and many things are distributed throughout humanity but opportunity isn’t equally distributed. Anne Marie believes that those with the capability to find those who simply need an opportunity and lift them up have a certain responsibility to do so. That they can lift up those who will also lift up others. Ron asks Anne Marie about what it takes to make a great leader and supporter today. Anne Marie speaks a bit about leading from quiet influence and measures success more by effectiveness. The conversation shifts to how trust is needed when working to communicate risk and security decisions depending on who you’re working with as not everyone will share the same perspectives and backgrounds. Chris asks Anne Marie for a piece of advice for someone who may need someone to show up and protect them and she urges us to try new things, learn new things, expand our own possibilities. Anne Marie speaks about how showing up and trying to reach out can be enough to open new doors.</p>
<p><br>
<br>
</p>
<p>1:01 — Welcome back to the Hacker Valley Studio our guest this episode is Anne Marie Zettlemoyer.</p>
<p>2:43 —  Anne’s amazing fluency in business and how she fell in love with security.</p>
<p>4:37 — The call Anne feels to respect others and make sure they’re respected. </p>
<p>6:48 — The causes to fight for even without complete preparation for the journey ahead.</p>
<p>8:58 — The extremes of a ride to do the right thing, and a helping hand to get you up a mountain.</p>
<p>11:30 — How you can never know the power of showing up for yourself.</p>
<p>13:30 — The power of showing up for others and being the only woman there.</p>
<p>15:34 — Two years after being the only woman cybersecurity presenter at a conference</p>
<p>19:04 — Anne shares about having to fight for everything herself. </p>
<p>20:30 — The responsibility for those that have the heart to find and uplift others.</p>
<p>22:00 — The conversation moves to topics about networking and great leadership.</p>
<p>24:00 — Why having a sense of humility is necessary for a leader and building a network.</p>
<p>25:30 — Learning to not re-invent the wheel.</p>
<p>27:20 — Creating a rounded perspective to build comprehensive solutions.</p>
<p>28:50 — Why you need trust from the folks you’re trying to protect.</p>
<p>31:00 — Advice for someone listening that needs someone to protect or stand up for them.</p>
<p>32:45 — Trying new things one step at a time can be enough.<br>
<br>
</p>
<p>Links</p>
<p><br>
You can find Anne Marie Zettlemoyer on her Linkedin or her T<a href='https://twitter.com/solvingcyber'>witter </a></p>
<p> </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a> and enroll in The AttackIQ <a href='https://academy.attackiq.com/'>Academy</a>!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/a86m4v/HVS_-_AMZb8sy8.mp3" length="33563936" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Anne Marie Zettlemoyer is Vice President of Security Engineering and Divisional Security Officer at MasterCard. She’s a mentor to many cybersecurity practitioners and a visiting fellow at the National Security Institute at George Mason University
As far back as elementary school, making sure everyone was treated properly and respected was important for Anne. In college, despite not knowing the first thing about cycling Anne’s determination to do the right thing led her to participate in a 600-mile charity ride to raise money for research towards a vaccine against HIV. 
Anne Marie started in Business and holds an MBA in Organizational Behavior and Corporate Strategy, she started on the business side and worked under many titles like Analyst, Controller, Auditor, and Strategist. About 12 or 13 years ago she fell in love with Security because it speaks to her mission of protecting and defending others.  
Ron shares about how mentors have helped him learn cybersecurity and asks Anne Marie about when she’s helped others climb the security mountain. Anne Marie recalls being the only woman presenter at a Cybersecurity conference and receiving a certain lack of respect until she demonstrated exactly how much expertise and experience she had. She spoke to some other women in attendance and encouraged them to apply themselves in the same field assuring them that they could also succeed, two years later one of the people she encouraged had become Senior Security Engineer.
Chris asks about what it means to her to be able to show up with others now and whether she had someone like that for her own journey. Anne Marie shares about having to fight for everything herself. She expands that talent, grit, and many things are distributed throughout humanity but opportunity isn’t equally distributed. Anne Marie believes that those with the capability to find those who simply need an opportunity and lift them up have a certain responsibility to do so. That they can lift up those who will also lift up others. Ron asks Anne Marie about what it takes to make a great leader and supporter today. Anne Marie speaks a bit about leading from quiet influence and measures success more by effectiveness. The conversation shifts to how trust is needed when working to communicate risk and security decisions depending on who you’re working with as not everyone will share the same perspectives and backgrounds. Chris asks Anne Marie for a piece of advice for someone who may need someone to show up and protect them and she urges us to try new things, learn new things, expand our own possibilities. Anne Marie speaks about how showing up and trying to reach out can be enough to open new doors.

1:01 — Welcome back to the Hacker Valley Studio our guest this episode is Anne Marie Zettlemoyer.
2:43 —  Anne’s amazing fluency in business and how she fell in love with security.
4:37 — The call Anne feels to respect others and make sure they’re respected. 
6:48 — The causes to fight for even without complete preparation for the journey ahead.
8:58 — The extremes of a ride to do the right thing, and a helping hand to get you up a mountain.
11:30 — How you can never know the power of showing up for yourself.
13:30 — The power of showing up for others and being the only woman there.
15:34 — Two years after being the only woman cybersecurity presenter at a conference
19:04 — Anne shares about having to fight for everything herself. 
20:30 — The responsibility for those that have the heart to find and uplift others.
22:00 — The conversation moves to topics about networking and great leadership.
24:00 — Why having a sense of humility is necessary for a leader and building a network.
25:30 — Learning to not re-invent the wheel.
27:20 — Creating a rounded perspective to build comprehensive solutions.
28:50 — Why you need trust from the folks you’re trying to protect.
31:00 — Advice for someone listening that needs someone to protect or stand up for them.
32:45 — Trying ne]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2097</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>130</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 129 - Seeing the Value in Everything with Saam Motamedi</title>
        <itunes:title>Episode 129 - Seeing the Value in Everything with Saam Motamedi</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-129-seeing-the-value-in-everything-with-saam-motamedi/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-129-seeing-the-value-in-everything-with-saam-motamedi/#comments</comments>        <pubDate>Thu, 01 Apr 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/982a2730-bbf7-3c71-9842-4a7d290939c1</guid>
                                    <description><![CDATA[<p>Saam Motamedi is a General Partner at Greylock, a Silicon Valley venture capital firm. Saam has  always found joy in finding individuals with the ideas and perspectives needed to become leaders and seeing them grow. As a student, Saam built student led organizations and nurtured the talent in his peers so they could grow as leaders. Saam started his professional journey on the product side of the industry working for a startup company, BladeIQ. The organization was an early adopter of machine learning and made innovations in the Customer Relationship Management solution market. The company was later acquired by Salesforce and their technology was integrated into the Salesforce CRM solutions. </p>
<p>Saam shares that he enjoys helping entrepreneurs go from technical insight to an initial product. His superpower is leveraging his insight into how products and software solutions fit into the larger economic ecosystem. Saam also has success with helping companies continue to develop their products while bring new offerings using planned strategy. Ron asks Saam how he sorts through companies that are focused on artificial intelligence or machine learning in order to find great opportunities and people. Saam elaborates that he is focused less on the theoretical applications of these tools and more on how they are used to solve problems for customers. Saam provides perspective on the value of end user input in improving the quality of machine learning itself.</p>
<p>Chris asks Saam about advice about product market fit and how to ensure the company has the right timing. Saam shares that timing varies across customer segments. It is important to not only understand what customers want but be able to see what customers should want or what they’re going to want. The conversation touches upon how COVID-19 has shifted the venture capital landscape. Saam tells us that the amount of interesting ideas and products has actually increased, and that entrepreneurs need to understand what their own story is and how it is even more relevant today than perhaps two years ago. Ron asks Saam about the most exciting technology to him today. Saam remains enthusiastic about machine learning technology helping better decisions being made as well as automation helping free up time and more of the workforce to focus on higher valued tasks. Saam lets us know that it’s never too early to talk to Greylock and that some of the most impactful investments have been based on an idea and an understanding of the market the entrepreneur was aiming to disrupt. </p>
<p> </p>
<p>0:00 — Intro</p>
<p>01:21 — Welcome Back to Hacker Valley today in the Studio, Saam Motamedi.</p>
<p>04:30 — Saam’s superpowers: understanding products, markets and people.</p>
<p>06:30 — Saam’s experience with the product innovation side</p>
<p>08:13 — Network building and finding talent</p>
<p>10:28 — Seeing the entrepreneur in people even before they see it in themselves</p>
<p>12:37 — Investing in solutions to important problems and not the technology they’re using.</p>
<p>14:17 — Creating a learning engine that actually learns over time</p>
<p>15:55 — Advice on having the right team and the right idea at the right time.</p>
<p>18:37 — Timing requires predicting what customers are going to want</p>
<p>20:09 — How the pandemic has shifted the entrepreneurial and VC landscapes</p>
<p>23:05 — Customer interactions and brand ambassadors shifting to digital channels</p>
<p>25:00 — Crawl before you walk before you run: how to grow a company</p>
<p>27:04 — Getting the right attention, standing out in a digital sales landscape</p>
<p>29:00 — Showing off your product and continuing to grow without high touch interactions </p>
<p>31:34 — Saam shares how security is more relevant than ever</p>
<p>33:10 — If you’ve got an idea and imagination it’s never too early to start talking to Greylock.</p>
<p>35:32 — Understanding your own story to build your own company.</p>
<p>

</p>
<p>If you want to stay up to date with what’s going on with Saam you can follow him on twitter <a href='https://twitter.com/saammotamedi'>Saam Motamedi (@saammotamedi)</a> or find him on linkedin <a href='https://www.linkedin.com/in/saammotamedi'>Saam Motamedi - General Partner - Greylock Partners</a>. Check out <a href='https://greylock.com/'>Greylock Partners</a> to find out more about this venture capital firm and <a href='https://greylock.com/blog/'>read their blog</a> to learn more about what they’re doing.</p>
<p> </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Saam Motamedi is a General Partner at Greylock, a Silicon Valley venture capital firm. Saam has  always found joy in finding individuals with the ideas and perspectives needed to become leaders and seeing them grow. As a student, Saam built student led organizations and nurtured the talent in his peers so they could grow as leaders. Saam started his professional journey on the product side of the industry working for a startup company, BladeIQ. The organization was an early adopter of machine learning and made innovations in the Customer Relationship Management solution market. The company was later acquired by Salesforce and their technology was integrated into the Salesforce CRM solutions. </p>
<p>Saam shares that he enjoys helping entrepreneurs go from technical insight to an initial product. His superpower is leveraging his insight into how products and software solutions fit into the larger economic ecosystem. Saam also has success with helping companies continue to develop their products while bring new offerings using planned strategy. Ron asks Saam how he sorts through companies that are focused on artificial intelligence or machine learning in order to find great opportunities and people. Saam elaborates that he is focused less on the theoretical applications of these tools and more on how they are used to solve problems for customers. Saam provides perspective on the value of end user input in improving the quality of machine learning itself.</p>
<p>Chris asks Saam about advice about product market fit and how to ensure the company has the right timing. Saam shares that timing varies across customer segments. It is important to not only understand what customers want but be able to see what customers should want or what they’re going to want. The conversation touches upon how COVID-19 has shifted the venture capital landscape. Saam tells us that the amount of interesting ideas and products has actually increased, and that entrepreneurs need to understand what their own story is and how it is even more relevant today than perhaps two years ago. Ron asks Saam about the most exciting technology to him today. Saam remains enthusiastic about machine learning technology helping better decisions being made as well as automation helping free up time and more of the workforce to focus on higher valued tasks. Saam lets us know that it’s never too early to talk to Greylock and that some of the most impactful investments have been based on an idea and an understanding of the market the entrepreneur was aiming to disrupt. </p>
<p> </p>
<p>0:00 — Intro</p>
<p>01:21 — Welcome Back to Hacker Valley today in the Studio, Saam Motamedi.</p>
<p>04:30 — Saam’s superpowers: understanding products, markets and people.</p>
<p>06:30 — Saam’s experience with the product innovation side</p>
<p>08:13 — Network building and finding talent</p>
<p>10:28 — Seeing the entrepreneur in people even before they see it in themselves</p>
<p>12:37 — Investing in solutions to important problems and not the technology they’re using.</p>
<p>14:17 — Creating a learning engine that actually learns over time</p>
<p>15:55 — Advice on having the right team and the right idea at the right time.</p>
<p>18:37 — Timing requires predicting what customers are going to want</p>
<p>20:09 — How the pandemic has shifted the entrepreneurial and VC landscapes</p>
<p>23:05 — Customer interactions and brand ambassadors shifting to digital channels</p>
<p>25:00 — Crawl before you walk before you run: how to grow a company</p>
<p>27:04 — Getting the right attention, standing out in a digital sales landscape</p>
<p>29:00 — Showing off your product and continuing to grow without high touch interactions </p>
<p>31:34 — Saam shares how security is more relevant than ever</p>
<p>33:10 — If you’ve got an idea and imagination it’s never too early to start talking to Greylock.</p>
<p>35:32 — Understanding your own story to build your own company.</p>
<p><br>
<br>
</p>
<p>If you want to stay up to date with what’s going on with Saam you can follow him on twitter <a href='https://twitter.com/saammotamedi'>Saam Motamedi (@saammotamedi)</a> or find him on linkedin <a href='https://www.linkedin.com/in/saammotamedi'>Saam Motamedi - General Partner - Greylock Partners</a>. Check out <a href='https://greylock.com/'>Greylock Partners</a> to find out more about this venture capital firm and <a href='https://greylock.com/blog/'>read their blog</a> to learn more about what they’re doing.</p>
<p> </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5z4ahg/HVS_-_Saambtk83.mp3" length="35550841" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Saam Motamedi is a General Partner at Greylock, a Silicon Valley venture capital firm. Saam has  always found joy in finding individuals with the ideas and perspectives needed to become leaders and seeing them grow. As a student, Saam built student led organizations and nurtured the talent in his peers so they could grow as leaders. Saam started his professional journey on the product side of the industry working for a startup company, BladeIQ. The organization was an early adopter of machine learning and made innovations in the Customer Relationship Management solution market. The company was later acquired by Salesforce and their technology was integrated into the Salesforce CRM solutions. 
Saam shares that he enjoys helping entrepreneurs go from technical insight to an initial product. His superpower is leveraging his insight into how products and software solutions fit into the larger economic ecosystem. Saam also has success with helping companies continue to develop their products while bring new offerings using planned strategy. Ron asks Saam how he sorts through companies that are focused on artificial intelligence or machine learning in order to find great opportunities and people. Saam elaborates that he is focused less on the theoretical applications of these tools and more on how they are used to solve problems for customers. Saam provides perspective on the value of end user input in improving the quality of machine learning itself.
Chris asks Saam about advice about product market fit and how to ensure the company has the right timing. Saam shares that timing varies across customer segments. It is important to not only understand what customers want but be able to see what customers should want or what they’re going to want. The conversation touches upon how COVID-19 has shifted the venture capital landscape. Saam tells us that the amount of interesting ideas and products has actually increased, and that entrepreneurs need to understand what their own story is and how it is even more relevant today than perhaps two years ago. Ron asks Saam about the most exciting technology to him today. Saam remains enthusiastic about machine learning technology helping better decisions being made as well as automation helping free up time and more of the workforce to focus on higher valued tasks. Saam lets us know that it’s never too early to talk to Greylock and that some of the most impactful investments have been based on an idea and an understanding of the market the entrepreneur was aiming to disrupt. 
 
0:00 — Intro
01:21 — Welcome Back to Hacker Valley today in the Studio, Saam Motamedi.
04:30 — Saam’s superpowers: understanding products, markets and people.
06:30 — Saam’s experience with the product innovation side
08:13 — Network building and finding talent
10:28 — Seeing the entrepreneur in people even before they see it in themselves
12:37 — Investing in solutions to important problems and not the technology they’re using.
14:17 — Creating a learning engine that actually learns over time
15:55 — Advice on having the right team and the right idea at the right time.
18:37 — Timing requires predicting what customers are going to want
20:09 — How the pandemic has shifted the entrepreneurial and VC landscapes
23:05 — Customer interactions and brand ambassadors shifting to digital channels
25:00 — Crawl before you walk before you run: how to grow a company
27:04 — Getting the right attention, standing out in a digital sales landscape
29:00 — Showing off your product and continuing to grow without high touch interactions 
31:34 — Saam shares how security is more relevant than ever
33:10 — If you’ve got an idea and imagination it’s never too early to start talking to Greylock.
35:32 — Understanding your own story to build your own company.

If you want to stay up to date with what’s going on with Saam you can follow him on twitter Saam Motamedi (@saammotamedi) or find him on linkedin Saam Motamedi - General Partn]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2220</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>129</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 128 - A Masterclass on Being Yourself with Ashish Rajan</title>
        <itunes:title>Episode 128 - A Masterclass on Being Yourself with Ashish Rajan</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-128-a-masterclass-on-being-yourself-with-ashish-rajan/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-128-a-masterclass-on-being-yourself-with-ashish-rajan/#comments</comments>        <pubDate>Wed, 24 Mar 2021 05:46:58 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/a21c75b5-900d-3cb8-9975-3b9cb5c5d2ba</guid>
                                    <description><![CDATA[<p>Ashish Rajan is a Cloud Security leader, podcaster, investor and fashion expert. He’s the Melbourne chapter leader of the OWASP Foundation and the Head of Security & Compliance. Ashish makes full use of his expertise and shares his knowledge as founder of a Cloud Security academy as well as in his weekly Coffee with Ashish which streams on Twitch, linkedin and YouTube. </p>
<p>Ashish shares that while doing his weekly cloud security livestreams from the streets of Melbourne he became a recognizable person. Dressing with the intention of presenting something different to people Ashish began changing the way people look at him as a cybersecurity person. Ron asks Ashish about people understanding his value and how that can be conveyed through being confident with self image and comfortable in your own skin. Ashish speaks about the difference that presenting a new image of a security expert makes in his own career, that sometimes folks in the industry don’t necessarily communicate enough with people who don’t already have that knowledge base and so there can be a gap.</p>
<p>The conversation moves to how Ashish’s interests overlap and have grown throughout his cybersecurity practice and professional growth, he began meeting people more into sales over coffee in order to make more connections with other forward thinking professionals. Ashish’s mindset is that goals have to evolve especially when you’re able to meet them ahead of schedule, he applies this successfully to his Coffee with Ashish weekly show. Chris asks Ashish about his innovative mindset and a time he’s had to overcome an obstacle. His journey overcoming that is inspiring, after being let go from a job Ashish still believed there was reason to invest in the ideas and company. From there he began putting his time and energy into the cloud security academy and cloud security podcast using the motivation gained after that setback put in front of him as motivation to teach others how to fish in the cyber ocean. Ron and Chris talk with Ashish about legacy and Ashish shares that planting seeds will be the legacy he hopes for. Ashish hopes that making significant impact on other people’s lives in a positive way will become his. Ashish shares that finding mentors aligned with the goals that you have, starting on your goals will pay dividends. </p>
<p>


</p>
<p>Impactful Moments</p>
<p>0:00 — Intro</p>
<p>2:05 — Welcome to Hacker Valley Studio with Ashish.</p>
<p>4:15 — Origin story of a Tinkerer and mastering the cheat codes.</p>
<p>6:10 — Trying new things and trying to innovate them creatively.</p>
<p>7:45 — Unintentionally stumbling into the fashion world.</p>
<p>9:00 — Transforming into an extroverted Security person.</p>
<p>10:33 — Diversifying Cybersecurity with fashion and putting yourself out there.</p>
<p>12:40 — Being comfortable in your own skin after putting yourself out there.</p>
<p>13:33 — Following in the footsteps of your parents.</p>
<p>16:00 — Discovering more than just security and learning how to sell.</p>
<p>18:00 — The organic origins of Coffee with Ashish.</p>
<p>20:00 — Overcoming obstacles and teaching others to fish. </p>
<p>22:10 — Making the right investments in helping other people.</p>
<p>24:10 — Ashish leveling up constantly and what’s next.</p>
<p>26:20 — Ashish’s advice for stepping into your own personal strength.</p>
<p>28:00 — The very online future and making your own media hub.</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ashish on <a href='https://www.linkedin.com/in/ashishrajan/'>LinkedIn</a> and check out his podcast <a href='https://www.cloudsecuritypodcast.tv/'>Coffee with Ashish</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>If your experience with compliance has sucked, check out our friends at <a href='https://www.bytechek.com/'>ByteChek</a> and see what they can do for you.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ashish Rajan is a Cloud Security leader, podcaster, investor and fashion expert. He’s the Melbourne chapter leader of the OWASP Foundation and the Head of Security & Compliance. Ashish makes full use of his expertise and shares his knowledge as founder of a Cloud Security academy as well as in his weekly Coffee with Ashish which streams on Twitch, linkedin and YouTube. </p>
<p>Ashish shares that while doing his weekly cloud security livestreams from the streets of Melbourne he became a recognizable person. Dressing with the intention of presenting something different to people Ashish began changing the way people look at him as a cybersecurity person. Ron asks Ashish about people understanding his value and how that can be conveyed through being confident with self image and comfortable in your own skin. Ashish speaks about the difference that presenting a new image of a security expert makes in his own career, that sometimes folks in the industry don’t necessarily communicate enough with people who don’t already have that knowledge base and so there can be a gap.</p>
<p>The conversation moves to how Ashish’s interests overlap and have grown throughout his cybersecurity practice and professional growth, he began meeting people more into sales over coffee in order to make more connections with other forward thinking professionals. Ashish’s mindset is that goals have to evolve especially when you’re able to meet them ahead of schedule, he applies this successfully to his Coffee with Ashish weekly show. Chris asks Ashish about his innovative mindset and a time he’s had to overcome an obstacle. His journey overcoming that is inspiring, after being let go from a job Ashish still believed there was reason to invest in the ideas and company. From there he began putting his time and energy into the cloud security academy and cloud security podcast using the motivation gained after that setback put in front of him as motivation to teach others how to fish in the cyber ocean. Ron and Chris talk with Ashish about legacy and Ashish shares that planting seeds will be the legacy he hopes for. Ashish hopes that making significant impact on other people’s lives in a positive way will become his. Ashish shares that finding mentors aligned with the goals that you have, starting on your goals will pay dividends. </p>
<p><br>
<br>
<br>
</p>
<p>Impactful Moments</p>
<p>0:00 — Intro</p>
<p>2:05 — Welcome to Hacker Valley Studio with Ashish.</p>
<p>4:15 — Origin story of a Tinkerer and mastering the cheat codes.</p>
<p>6:10 — Trying new things and trying to innovate them creatively.</p>
<p>7:45 — Unintentionally stumbling into the fashion world.</p>
<p>9:00 — Transforming into an extroverted Security person.</p>
<p>10:33 — Diversifying Cybersecurity with fashion and putting yourself out there.</p>
<p>12:40 — Being comfortable in your own skin after putting yourself out there.</p>
<p>13:33 — Following in the footsteps of your parents.</p>
<p>16:00 — Discovering more than just security and learning how to sell.</p>
<p>18:00 — The organic origins of Coffee with Ashish.</p>
<p>20:00 — Overcoming obstacles and teaching others to fish. </p>
<p>22:10 — Making the right investments in helping other people.</p>
<p>24:10 — Ashish leveling up constantly and what’s next.</p>
<p>26:20 — Ashish’s advice for stepping into your own personal strength.</p>
<p>28:00 — The very online future and making your own media hub.</p>
<p> </p>
<p>Links:</p>
<p>Connect with Ashish on <a href='https://www.linkedin.com/in/ashishrajan/'>LinkedIn</a> and check out his podcast <a href='https://www.cloudsecuritypodcast.tv/'>Coffee with Ashish</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>If your experience with compliance has sucked, check out our friends at <a href='https://www.bytechek.com/'>ByteChek</a> and see what they can do for you.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kv4utc/HVS_-_ASHISH_RAJAN6l0wn.mp3" length="30416342" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ashish Rajan is a Cloud Security leader, podcaster, investor and fashion expert. He’s the Melbourne chapter leader of the OWASP Foundation and the Head of Security & Compliance. Ashish makes full use of his expertise and shares his knowledge as founder of a Cloud Security academy as well as in his weekly Coffee with Ashish which streams on Twitch, linkedin and YouTube. 
Ashish shares that while doing his weekly cloud security livestreams from the streets of Melbourne he became a recognizable person. Dressing with the intention of presenting something different to people Ashish began changing the way people look at him as a cybersecurity person. Ron asks Ashish about people understanding his value and how that can be conveyed through being confident with self image and comfortable in your own skin. Ashish speaks about the difference that presenting a new image of a security expert makes in his own career, that sometimes folks in the industry don’t necessarily communicate enough with people who don’t already have that knowledge base and so there can be a gap.
The conversation moves to how Ashish’s interests overlap and have grown throughout his cybersecurity practice and professional growth, he began meeting people more into sales over coffee in order to make more connections with other forward thinking professionals. Ashish’s mindset is that goals have to evolve especially when you’re able to meet them ahead of schedule, he applies this successfully to his Coffee with Ashish weekly show. Chris asks Ashish about his innovative mindset and a time he’s had to overcome an obstacle. His journey overcoming that is inspiring, after being let go from a job Ashish still believed there was reason to invest in the ideas and company. From there he began putting his time and energy into the cloud security academy and cloud security podcast using the motivation gained after that setback put in front of him as motivation to teach others how to fish in the cyber ocean. Ron and Chris talk with Ashish about legacy and Ashish shares that planting seeds will be the legacy he hopes for. Ashish hopes that making significant impact on other people’s lives in a positive way will become his. Ashish shares that finding mentors aligned with the goals that you have, starting on your goals will pay dividends. 

Impactful Moments
0:00 — Intro
2:05 — Welcome to Hacker Valley Studio with Ashish.
4:15 — Origin story of a Tinkerer and mastering the cheat codes.
6:10 — Trying new things and trying to innovate them creatively.
7:45 — Unintentionally stumbling into the fashion world.
9:00 — Transforming into an extroverted Security person.
10:33 — Diversifying Cybersecurity with fashion and putting yourself out there.
12:40 — Being comfortable in your own skin after putting yourself out there.
13:33 — Following in the footsteps of your parents.
16:00 — Discovering more than just security and learning how to sell.
18:00 — The organic origins of Coffee with Ashish.
20:00 — Overcoming obstacles and teaching others to fish. 
22:10 — Making the right investments in helping other people.
24:10 — Ashish leveling up constantly and what’s next.
26:20 — Ashish’s advice for stepping into your own personal strength.
28:00 — The very online future and making your own media hub.
 
Links:
Connect with Ashish on LinkedIn and check out his podcast Coffee with Ashish.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
If your experience with compliance has sucked, check out our friends at ByteChek and see what they can do for you.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1899</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>128</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 127 - Finding Comfort in Being Uncomfortable with Paul Rivera</title>
        <itunes:title>Episode 127 - Finding Comfort in Being Uncomfortable with Paul Rivera</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-127-finding-comfort-in-being-uncomfortable-with-paul-rivera/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-127-finding-comfort-in-being-uncomfortable-with-paul-rivera/#comments</comments>        <pubDate>Wed, 17 Mar 2021 04:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d9bd69c4-2eee-38fb-89eb-5d9a6f14238d</guid>
                                    <description><![CDATA[<p>Paul Rivera is the president and CEO of Def Logix, he built his own company from the ground up. Paul was born in the Bronx, NYC and grew up in both Queens, New York and Dallas/Fort Worth area of Texas. </p>
<p>The two areas he grew up in couldn’t be more different and he faced a lot of social anxiety. In middle and high school Paul felt there was a difference between the things he worried about and the concerns of his peers. Young Paul would rather figure out how to improve himself than impress others with something more material.  Eventually at the age of fifteen Paul quit school and instead began going to the library. There he spent time reading on his own. He went from reading science fiction to learning about the physics, chemistry and math behind it.</p>
<p>In his twenties Paul moved back to New York for college and was working while attending school. Following in his hero Mr. Spock’s footsteps he took classes in: Logic, Philosophy and Computer Science. Paul fell in love with programming after building his own calculator application by using coding. Programming was a way to use computers to build things from his own imagination and engaging his creative side. He got his Computer Science degree in his mid twenties.</p>
<p>Paul speaks about the difference between New York City and the Dallas Fort Worth Area and some of the interpersonal differences moving to a less diverse area and not fitting in. Ron asks Paul what the missing puzzle piece that led him on the education path he chose. The conversation between Paul, Ron and Chris touches on different ways of learning and thinking. Paul shares about the school of hard knocks and researching, he shares about having to research excessively can lead to potential missed opportunities. </p>
<p>Chris asks about a challenge he faced building Def Logix. Paul talks about finding his way as a significant contract closed out, dealing with employees being discontent and having to conceptualize Def-Logix 2.0. Our hosts Ron and Chris speak about the burnout that can happen when tasks aren’t aligned with purpose. Paul shares that he enjoys creating solutions more than other tasks that are typically aligned with being at the top of a company. Paul had to learn to delegate more in order to grow the company. Towards the end of our conversation Paul shares some of his experiences with public speaking, something he was very uncomfortable with at first. It was necessary for him to get out of his comfort zone in order to keep growing.</p>
<p>

</p>
<p>Impactful Moments During the Show</p>
<p>00:00 — Intro</p>
<p>01:35 — Welcome back to the Hacker Valley Studio and welcome to Paul Rivera.</p>
<p>03:05 — Learning the science behind the sci-fi.</p>
<p>04:25 — Why Paul quit school at 15 and his path back to education.</p>
<p>06:00 — Calculators and falling in love with programming.</p>
<p>07:40 — Thinking differently about clothing.</p>
<p>09:05 — Thinking outside the box with logic AND intuition instead of logic OR intuition.</p>
<p>10:31 — Paul’s key way of learning.</p>
<p>12:20 — Paul on building his own company and challenges faced.</p>
<p>14:20 — What would change if he closed shop and started again?</p>
<p>16:30 — The harebrained ideas, creating solutions and finding joy.</p>
<p>18:30 — Growth and getting out of your comfort zone</p>
<p>

</p>
<p>Links</p>
<p>You can find <a href='https://www.linkedin.com/in/paul-rivera-5890545/'>Paul Rivera</a> on LinkedIn</p>
<p>Check out <a href='https://def-logix.com/'>Def-Logix</a> a cybersecurity company that does research and development, software development and secure networks. </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter. </p>
<p>Check out <a href='https://www.bytechek.com/'>ByteChek</a> they can help you establish your security program, automate your readiness assessment, and complete your SOC 2 audit faster.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Paul Rivera is the president and CEO of Def Logix, he built his own company from the ground up. Paul was born in the Bronx, NYC and grew up in both Queens, New York and Dallas/Fort Worth area of Texas. </p>
<p>The two areas he grew up in couldn’t be more different and he faced a lot of social anxiety. In middle and high school Paul felt there was a difference between the things he worried about and the concerns of his peers. Young Paul would rather figure out how to improve himself than impress others with something more material.  Eventually at the age of fifteen Paul quit school and instead began going to the library. There he spent time reading on his own. He went from reading science fiction to learning about the physics, chemistry and math behind it.</p>
<p>In his twenties Paul moved back to New York for college and was working while attending school. Following in his hero Mr. Spock’s footsteps he took classes in: Logic, Philosophy and Computer Science. Paul fell in love with programming after building his own calculator application by using coding. Programming was a way to use computers to build things from his own imagination and engaging his creative side. He got his Computer Science degree in his mid twenties.</p>
<p>Paul speaks about the difference between New York City and the Dallas Fort Worth Area and some of the interpersonal differences moving to a less diverse area and not fitting in. Ron asks Paul what the missing puzzle piece that led him on the education path he chose. The conversation between Paul, Ron and Chris touches on different ways of learning and thinking. Paul shares about the school of hard knocks and researching, he shares about having to research excessively can lead to potential missed opportunities. </p>
<p>Chris asks about a challenge he faced building Def Logix. Paul talks about finding his way as a significant contract closed out, dealing with employees being discontent and having to conceptualize Def-Logix 2.0. Our hosts Ron and Chris speak about the burnout that can happen when tasks aren’t aligned with purpose. Paul shares that he enjoys creating solutions more than other tasks that are typically aligned with being at the top of a company. Paul had to learn to delegate more in order to grow the company. Towards the end of our conversation Paul shares some of his experiences with public speaking, something he was very uncomfortable with at first. It was necessary for him to get out of his comfort zone in order to keep growing.</p>
<p><br>
<br>
</p>
<p>Impactful Moments During the Show</p>
<p>00:00 — Intro</p>
<p>01:35 — Welcome back to the Hacker Valley Studio and welcome to Paul Rivera.</p>
<p>03:05 — Learning the science behind the sci-fi.</p>
<p>04:25 — Why Paul quit school at 15 and his path back to education.</p>
<p>06:00 — Calculators and falling in love with programming.</p>
<p>07:40 — Thinking differently about clothing.</p>
<p>09:05 — Thinking outside the box with logic AND intuition instead of logic OR intuition.</p>
<p>10:31 — Paul’s key way of learning.</p>
<p>12:20 — Paul on building his own company and challenges faced.</p>
<p>14:20 — What would change if he closed shop and started again?</p>
<p>16:30 — The harebrained ideas, creating solutions and finding joy.</p>
<p>18:30 — Growth and getting out of your comfort zone</p>
<p><br>
<br>
</p>
<p>Links</p>
<p>You can find <a href='https://www.linkedin.com/in/paul-rivera-5890545/'>Paul Rivera</a> on LinkedIn</p>
<p>Check out <a href='https://def-logix.com/'>Def-Logix</a> a cybersecurity company that does research and development, software development and secure networks. </p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter. </p>
<p>Check out <a href='https://www.bytechek.com/'>ByteChek</a> they can help you establish your security program, automate your readiness assessment, and complete your SOC 2 audit faster.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3ixyy7/Hacker_Valley_Studio_-_Paul_Rivera_rev19ygzr.mp3" length="19813818" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Paul Rivera is the president and CEO of Def Logix, he built his own company from the ground up. Paul was born in the Bronx, NYC and grew up in both Queens, New York and Dallas/Fort Worth area of Texas. 
The two areas he grew up in couldn’t be more different and he faced a lot of social anxiety. In middle and high school Paul felt there was a difference between the things he worried about and the concerns of his peers. Young Paul would rather figure out how to improve himself than impress others with something more material.  Eventually at the age of fifteen Paul quit school and instead began going to the library. There he spent time reading on his own. He went from reading science fiction to learning about the physics, chemistry and math behind it.
In his twenties Paul moved back to New York for college and was working while attending school. Following in his hero Mr. Spock’s footsteps he took classes in: Logic, Philosophy and Computer Science. Paul fell in love with programming after building his own calculator application by using coding. Programming was a way to use computers to build things from his own imagination and engaging his creative side. He got his Computer Science degree in his mid twenties.
Paul speaks about the difference between New York City and the Dallas Fort Worth Area and some of the interpersonal differences moving to a less diverse area and not fitting in. Ron asks Paul what the missing puzzle piece that led him on the education path he chose. The conversation between Paul, Ron and Chris touches on different ways of learning and thinking. Paul shares about the school of hard knocks and researching, he shares about having to research excessively can lead to potential missed opportunities. 
Chris asks about a challenge he faced building Def Logix. Paul talks about finding his way as a significant contract closed out, dealing with employees being discontent and having to conceptualize Def-Logix 2.0. Our hosts Ron and Chris speak about the burnout that can happen when tasks aren’t aligned with purpose. Paul shares that he enjoys creating solutions more than other tasks that are typically aligned with being at the top of a company. Paul had to learn to delegate more in order to grow the company. Towards the end of our conversation Paul shares some of his experiences with public speaking, something he was very uncomfortable with at first. It was necessary for him to get out of his comfort zone in order to keep growing.

Impactful Moments During the Show
00:00 — Intro
01:35 — Welcome back to the Hacker Valley Studio and welcome to Paul Rivera.
03:05 — Learning the science behind the sci-fi.
04:25 — Why Paul quit school at 15 and his path back to education.
06:00 — Calculators and falling in love with programming.
07:40 — Thinking differently about clothing.
09:05 — Thinking outside the box with logic AND intuition instead of logic OR intuition.
10:31 — Paul’s key way of learning.
12:20 — Paul on building his own company and challenges faced.
14:20 — What would change if he closed shop and started again?
16:30 — The harebrained ideas, creating solutions and finding joy.
18:30 — Growth and getting out of your comfort zone

Links
You can find Paul Rivera on LinkedIn
Check out Def-Logix a cybersecurity company that does research and development, software development and secure networks. 
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter. 
Check out ByteChek they can help you establish your security program, automate your readiness assessment, and complete your SOC 2 audit faster.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1237</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>127</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 126 - The Grit of Being World Champion Part 2 with Lee Kemp</title>
        <itunes:title>Episode 126 - The Grit of Being World Champion Part 2 with Lee Kemp</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-126-the-grit-of-being-world-champion-part-2-with-lee-kemp/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-126-the-grit-of-being-world-champion-part-2-with-lee-kemp/#comments</comments>        <pubDate>Fri, 12 Mar 2021 12:25:01 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/adc777bc-3be5-309d-bc2c-33b11935918c</guid>
                                    <description><![CDATA[<p>In this episode we continue our conversation with Lee Kemp, a three time World Champion in Wrestling (1978, 1979 and 1982 all in the 74 kg weight class) and held the record for being the youngest World Champion. In addition to being a champion wrestler, Lee is a father, a wrestling coach, a public speaker, and an author. He learned many of the skill sets needed to navigate his life on the mat. A child of the 60’s, he was adopted at the age of 5, before adoption learned how to find his own contentment in the situation he was in. From a young age Lee learned how to focus on what’s important and tackle whatever he needed to get done.</p>
<p>Our conversation with Lee Kemp resumes with Chris asking Lee a question about representation. Lee shares that there were other Black wrestlers that were successful before him and while Dan Gable was a direct inspiration he saw additional championship inspiration in Black wrestlers. Lee found representation and inspiration to one day own his own business working for Tom Burrell of Burrow Communications. He shares tremendous insight about race relations in the USA being further complicated by suppression of stories, like that of the mathematicians from Hidden Figures.</p>
<p>When Lee’s family left Cleveland in 1968 they moved to Chardon, Ohio; this was almost an entirely White community. Growing up there Lee saw his family being accepted into this community and learned that mutual respect was possible. We ask Lee about what someone who wants to be a champion needs. Lee explains that putting your focus on someone else that is successful can help and that finding inspiration is a truly important thing. Listening is important, if someone like Lee tells you the steps that you need to take to truly become a champion it’s important to take the advice as a whole. </p>
<p>Being the best isn’t the only measure of achievement, for Lee going for something with all your heart is meaningful. After winning World Championships and global competitions two years running Lee was on track mentally and physically to become an Olympic champion, but in March of 1980 President Jimmy Carter announced that the USA would not be participating at the Olympics. Lee explains how that opportunity being taken away impacts him even now. 40 years later the 2020 Summer Games have been delayed and Lee speaks a bit about that showing how the grit to be world champion endures.</p>
<p> </p>
<p>Impactful Moments During The Episode</p>
<p>00:00 — Intro</p>
<p>01:00 — Welcome back to Part 2 our conversation with Lee Kemp.</p>
<p>01:33 — Looking at what types of representation mattered to Lee.</p>
<p>03:49 — Representation making a difference on a professional level.</p>
<p>05:50 — Lee speaks about Tom Burrell, advertising and race.</p>
<p>06:59 — Seeing your own value and everyone seeing each other’s humanity. </p>
<p>07:53 — We’re all the same race.</p>
<p>08:39 — The examples that parents set. </p>
<p>10:10 — Leaving Cleveland and moving to Chardon in 1968.</p>
<p>12:09 — The respect Lee’s father received from his community.</p>
<p>13:24 — Lee speaks about the importance of listening and empathy.</p>
<p>15:22 — Putting yourself in the right environment to be a champion.</p>
<p>17:07 — Taking advice and finding motivations.</p>
<p>18:31 — Going for something with all your heart. </p>
<p>19:50 — A story of “Things not happening.” </p>
<p>21:04 — Resiliency and the Tokyo Olympics, lessons learned.</p>
<p>22:25 — Thanks to Lee Kemp and for listening to Part 2 of the Grit of Being World Champion</p>
<p>

</p>
<p>Links:</p>
<p>Learn more about <a href='https://www.leekemp.com/'>Lee Kemp</a> and pick up his book <a href='https://amzn.to/3qwJhET'>Winning Gold</a>. </p>
<p>Watch the great documentary <a href='https://www.amazon.com/Wrestled-Away-Lee-Kemp-Story/dp/B07WVF79PP'>Watch Wrestled Away: The Lee Kemp Story | Prime Video</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we continue our conversation with Lee Kemp, a three time World Champion in Wrestling (1978, 1979 and 1982 all in the 74 kg weight class) and held the record for being the youngest World Champion. In addition to being a champion wrestler, Lee is a father, a wrestling coach, a public speaker, and an author. He learned many of the skill sets needed to navigate his life on the mat. A child of the 60’s, he was adopted at the age of 5, before adoption learned how to find his own contentment in the situation he was in. From a young age Lee learned how to focus on what’s important and tackle whatever he needed to get done.</p>
<p>Our conversation with Lee Kemp resumes with Chris asking Lee a question about representation. Lee shares that there were other Black wrestlers that were successful before him and while Dan Gable was a direct inspiration he saw additional championship inspiration in Black wrestlers. Lee found representation and inspiration to one day own his own business working for Tom Burrell of Burrow Communications. He shares tremendous insight about race relations in the USA being further complicated by suppression of stories, like that of the mathematicians from <em>Hidden Figures</em>.</p>
<p>When Lee’s family left Cleveland in 1968 they moved to Chardon, Ohio; this was almost an entirely White community. Growing up there Lee saw his family being accepted into this community and learned that mutual respect was possible. We ask Lee about what someone who wants to be a champion needs. Lee explains that putting your focus on someone else that is successful can help and that finding inspiration is a truly important thing. Listening is important, if someone like Lee tells you the steps that you need to take to truly become a champion it’s important to take the advice as a whole. </p>
<p>Being the best isn’t the only measure of achievement, for Lee going for something with all your heart is meaningful. After winning World Championships and global competitions two years running Lee was on track mentally and physically to become an Olympic champion, but in March of 1980 President Jimmy Carter announced that the USA would not be participating at the Olympics. Lee explains how that opportunity being taken away impacts him even now. 40 years later the 2020 Summer Games have been delayed and Lee speaks a bit about that showing how the grit to be world champion endures.</p>
<p> </p>
<p>Impactful Moments During The Episode</p>
<p>00:00 — Intro</p>
<p>01:00 — Welcome back to Part 2 our conversation with Lee Kemp.</p>
<p>01:33 — Looking at what types of representation mattered to Lee.</p>
<p>03:49 — Representation making a difference on a professional level.</p>
<p>05:50 — Lee speaks about Tom Burrell, advertising and race.</p>
<p>06:59 — Seeing your own value and everyone seeing each other’s humanity. </p>
<p>07:53 — We’re all the same race.</p>
<p>08:39 — The examples that parents set. </p>
<p>10:10 — Leaving Cleveland and moving to Chardon in 1968.</p>
<p>12:09 — The respect Lee’s father received from his community.</p>
<p>13:24 — Lee speaks about the importance of listening and empathy.</p>
<p>15:22 — Putting yourself in the right environment to be a champion.</p>
<p>17:07 — Taking advice and finding motivations.</p>
<p>18:31 — Going for something with all your heart. </p>
<p>19:50 — A story of “Things not happening.” </p>
<p>21:04 — Resiliency and the Tokyo Olympics, lessons learned.</p>
<p>22:25 — Thanks to Lee Kemp and for listening to Part 2 of the Grit of Being World Champion</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Learn more about <a href='https://www.leekemp.com/'>Lee Kemp</a> and pick up his book <a href='https://amzn.to/3qwJhET'>Winning Gold</a>. </p>
<p>Watch the great documentary <a href='https://www.amazon.com/Wrestled-Away-Lee-Kemp-Story/dp/B07WVF79PP'>Watch Wrestled Away: The Lee Kemp Story | Prime Video</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jesmej/Lee_Kemp_pt_2_Final_Mix89sgk.mp3" length="22727040" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we continue our conversation with Lee Kemp, a three time World Champion in Wrestling (1978, 1979 and 1982 all in the 74 kg weight class) and held the record for being the youngest World Champion. In addition to being a champion wrestler, Lee is a father, a wrestling coach, a public speaker, and an author. He learned many of the skill sets needed to navigate his life on the mat. A child of the 60’s, he was adopted at the age of 5, before adoption learned how to find his own contentment in the situation he was in. From a young age Lee learned how to focus on what’s important and tackle whatever he needed to get done.
Our conversation with Lee Kemp resumes with Chris asking Lee a question about representation. Lee shares that there were other Black wrestlers that were successful before him and while Dan Gable was a direct inspiration he saw additional championship inspiration in Black wrestlers. Lee found representation and inspiration to one day own his own business working for Tom Burrell of Burrow Communications. He shares tremendous insight about race relations in the USA being further complicated by suppression of stories, like that of the mathematicians from Hidden Figures.
When Lee’s family left Cleveland in 1968 they moved to Chardon, Ohio; this was almost an entirely White community. Growing up there Lee saw his family being accepted into this community and learned that mutual respect was possible. We ask Lee about what someone who wants to be a champion needs. Lee explains that putting your focus on someone else that is successful can help and that finding inspiration is a truly important thing. Listening is important, if someone like Lee tells you the steps that you need to take to truly become a champion it’s important to take the advice as a whole. 
Being the best isn’t the only measure of achievement, for Lee going for something with all your heart is meaningful. After winning World Championships and global competitions two years running Lee was on track mentally and physically to become an Olympic champion, but in March of 1980 President Jimmy Carter announced that the USA would not be participating at the Olympics. Lee explains how that opportunity being taken away impacts him even now. 40 years later the 2020 Summer Games have been delayed and Lee speaks a bit about that showing how the grit to be world champion endures.
 
Impactful Moments During The Episode
00:00 — Intro
01:00 — Welcome back to Part 2 our conversation with Lee Kemp.
01:33 — Looking at what types of representation mattered to Lee.
03:49 — Representation making a difference on a professional level.
05:50 — Lee speaks about Tom Burrell, advertising and race.
06:59 — Seeing your own value and everyone seeing each other’s humanity. 
07:53 — We’re all the same race.
08:39 — The examples that parents set. 
10:10 — Leaving Cleveland and moving to Chardon in 1968.
12:09 — The respect Lee’s father received from his community.
13:24 — Lee speaks about the importance of listening and empathy.
15:22 — Putting yourself in the right environment to be a champion.
17:07 — Taking advice and finding motivations.
18:31 — Going for something with all your heart. 
19:50 — A story of “Things not happening.” 
21:04 — Resiliency and the Tokyo Olympics, lessons learned.
22:25 — Thanks to Lee Kemp and for listening to Part 2 of the Grit of Being World Champion

Links:
Learn more about Lee Kemp and pick up his book Winning Gold. 
Watch the great documentary Watch Wrestled Away: The Lee Kemp Story | Prime Video.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek. ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1416</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>126</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 125 - The Grit of Being World Champion with Lee Kemp</title>
        <itunes:title>Episode 125 - The Grit of Being World Champion with Lee Kemp</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-125-the-grit-of-being-world-champion-with-lee-kemp/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-125-the-grit-of-being-world-champion-with-lee-kemp/#comments</comments>        <pubDate>Tue, 09 Mar 2021 08:42:20 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/aa68f5ce-20d9-3fb2-a84c-9efa02fc7c92</guid>
                                    <description><![CDATA[<p>Our special guest this episode is Lee Kemp, a three time World Champion in Wrestling (1978, 1979 and 1982 all in the 74 kg weight class) and held the record for being the youngest World Champion. In addition to being a champion wrestler, Lee is a father, a wrestling coach, a public speaker, and an author. He learned many of the skill sets needed to navigate his life on the mat. A child of the 60’s, he was adopted at the age of 5, before adoption learned how to find his own contentment in the situation he was in. From a young age Lee learned how to focus on what’s important and tackle whatever he needed to get done.</p>
<p>Lee’s childhood with his adoptive family involved a lot of hard work. His family moved from the city to a rural neighborhood and he worked on a farm. There was a certain strictness his father held, if farm work needed to get done it had to get done. Over the summers of Lee’s youth, he learned about finding contentment in hard work and became comfortable being uncomfortable. Lee started wrestling in high school in the 9th grade and made the varsity team in the 10th grade, his first season in varsity he won as many matches as he lost. The summer between the 10th and the 11th grade year was the turning point for young Lee. He attended a Wrestling Camp that the wrestler Dan Gable was at right before the Olympic games of 1972, what he learned from Dan Gable at that camp became the catalyst for Lee becoming a different wrestler and different person. Lee gained a new mindset from that wrestling camp with Dan Gable. Coach Lee went on to win the state championship as a junior in high school, defeating the defending state champion. </p>
<p>As the episode progresses, Ron and Chris ask Lee about his philosophies on consistency. Lee describes that at each point in his journey to be a champion wrestler he took every opportunity to learn more about his game and his opponents. While Lee was in wrestling camp with Dan Gable, he was the only willing volunteer that would allow Dan to try out wrestling moves on him. Lee knew that if he could understand how one of the greatest wrestlers performed offensively and defensively he could at a minimum learn something new and potentially incorporate it into his style. Lee’s determination has always been contagious and a positive influence to his community. An example that Lee shares is the story of his wrestling teammate Pat Christenson. Before defeating Dan Gable, Wisconsin had a drought of national champions in wrestling. Pat Christenson shared with Lee after defeating Gable he realized he could aspire to become a world champion also.</p>
<p>Impactful Moments During The Episode</p>
<p>01:30 - Welcome back to the Hacker Valley Studio.</p>
<p>01:56 - Introducing the three time world champion Lee Kemp.</p>
<p>03:04 - A child of the sixties and learning how to give back.</p>
<p>04:18 - Understanding where you come from and learning to be content.</p>
<p>07:01 - Characteristics of grit.</p>
<p>08:43 - Overcoming the biggest roadblock to success.</p>
<p>11:08 - Finding a worthwhile goal as a high school wrestler and learning from the best. </p>
<p>12:26 - The inflection point towards success for wrestler Lee Kemp</p>
<p>14:24 - The fateful wrestling camp experience of 1972.</p>
<p>16:25 - Watching your camp coach from the summer with Olympic Gold.</p>
<p>17:28 - Lee Kemp finds the opportunity to wrestle against his former wrestling camp Coach, the gold medal winner Dan Gable.</p>
<p>19:05 - How Lee stayed focused on wrestling Gable despite detractors and distractions.</p>
<p>21:20 - Finding a different mindset, finding a different Lee Kemp.</p>
<p>22:51 - Taking little steps of confidence towards goals.</p>
<p>24:11 - Lee Kemp being in the moment wrestling in the last 30 seconds against Gable.</p>
<p>25:53 - From being in the moment to being part of the moment. </p>
<p>27:30 - The reaction to breaking expectations</p>
<p>29:00 - A rivalry that couldn’t be played out in competition, an unofficial match between Kemp and Gable</p>
<p>31:00 - Moving mountains</p>
<p>32:57 - Inspiring future wrestling champions at University of Wisconsin</p>
<p>34:30 - Having a mindset and attitude for making things possible</p>
<p>36:30 - Thank you for listening to Part 1 of Lee Kemp on Hacker Valley.</p>
<p> </p>
<p>Links:</p>
<p>Learn more about <a href='https://www.leekemp.com/'>Lee Kemp</a> and pick up his book <a href='https://amzn.to/3qwJhET'>Wrestled Away</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Our special guest this episode is Lee Kemp, a three time World Champion in Wrestling (1978, 1979 and 1982 all in the 74 kg weight class) and held the record for being the youngest World Champion. In addition to being a champion wrestler, Lee is a father, a wrestling coach, a public speaker, and an author. He learned many of the skill sets needed to navigate his life on the mat. A child of the 60’s, he was adopted at the age of 5, before adoption learned how to find his own contentment in the situation he was in. From a young age Lee learned how to focus on what’s important and tackle whatever he needed to get done.</p>
<p>Lee’s childhood with his adoptive family involved a lot of hard work. His family moved from the city to a rural neighborhood and he worked on a farm. There was a certain strictness his father held, if farm work needed to get done it had to get done. Over the summers of Lee’s youth, he learned about finding contentment in hard work and became comfortable being uncomfortable. Lee started wrestling in high school in the 9th grade and made the varsity team in the 10th grade, his first season in varsity he won as many matches as he lost. The summer between the 10th and the 11th grade year was the turning point for young Lee. He attended a Wrestling Camp that the wrestler Dan Gable was at right before the Olympic games of 1972, what he learned from Dan Gable at that camp became the catalyst for Lee becoming a different wrestler and different person. Lee gained a new mindset from that wrestling camp with Dan Gable. Coach Lee went on to win the state championship as a junior in high school, defeating the defending state champion. </p>
<p>As the episode progresses, Ron and Chris ask Lee about his philosophies on consistency. Lee describes that at each point in his journey to be a champion wrestler he took every opportunity to learn more about his game and his opponents. While Lee was in wrestling camp with Dan Gable, he was the only willing volunteer that would allow Dan to try out wrestling moves on him. Lee knew that if he could understand how one of the greatest wrestlers performed offensively and defensively he could at a minimum learn something new and potentially incorporate it into his style. Lee’s determination has always been contagious and a positive influence to his community. An example that Lee shares is the story of his wrestling teammate Pat Christenson. Before defeating Dan Gable, Wisconsin had a drought of national champions in wrestling. Pat Christenson shared with Lee after defeating Gable he realized he could aspire to become a world champion also.</p>
<p>Impactful Moments During The Episode</p>
<p>01:30 - Welcome back to the Hacker Valley Studio.</p>
<p>01:56 - Introducing the three time world champion Lee Kemp.</p>
<p>03:04 - A child of the sixties and learning how to give back.</p>
<p>04:18 - Understanding where you come from and learning to be content.</p>
<p>07:01 - Characteristics of grit.</p>
<p>08:43 - Overcoming the biggest roadblock to success.</p>
<p>11:08 - Finding a worthwhile goal as a high school wrestler and learning from the best. </p>
<p>12:26 - The inflection point towards success for wrestler Lee Kemp</p>
<p>14:24 - The fateful wrestling camp experience of 1972.</p>
<p>16:25 - Watching your camp coach from the summer with Olympic Gold.</p>
<p>17:28 - Lee Kemp finds the opportunity to wrestle against his former wrestling camp Coach, the gold medal winner Dan Gable.</p>
<p>19:05 - How Lee stayed focused on wrestling Gable despite detractors and distractions.</p>
<p>21:20 - Finding a different mindset, finding a different Lee Kemp.</p>
<p>22:51 - Taking little steps of confidence towards goals.</p>
<p>24:11 - Lee Kemp being in the moment wrestling in the last 30 seconds against Gable.</p>
<p>25:53 - From being in the moment to being part of the moment. </p>
<p>27:30 - The reaction to breaking expectations</p>
<p>29:00 - A rivalry that couldn’t be played out in competition, an unofficial match between Kemp and Gable</p>
<p>31:00 - Moving mountains</p>
<p>32:57 - Inspiring future wrestling champions at University of Wisconsin</p>
<p>34:30 - Having a mindset and attitude for making things possible</p>
<p>36:30 - Thank you for listening to Part 1 of Lee Kemp on Hacker Valley.</p>
<p> </p>
<p>Links:</p>
<p>Learn more about <a href='https://www.leekemp.com/'>Lee Kemp</a> and pick up his book <a href='https://amzn.to/3qwJhET'>Wrestled Away</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/k63rym/Lee_Kemp_Part_1_Final_Mix9orqy.mp3" length="35728512" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Our special guest this episode is Lee Kemp, a three time World Champion in Wrestling (1978, 1979 and 1982 all in the 74 kg weight class) and held the record for being the youngest World Champion. In addition to being a champion wrestler, Lee is a father, a wrestling coach, a public speaker, and an author. He learned many of the skill sets needed to navigate his life on the mat. A child of the 60’s, he was adopted at the age of 5, before adoption learned how to find his own contentment in the situation he was in. From a young age Lee learned how to focus on what’s important and tackle whatever he needed to get done.
Lee’s childhood with his adoptive family involved a lot of hard work. His family moved from the city to a rural neighborhood and he worked on a farm. There was a certain strictness his father held, if farm work needed to get done it had to get done. Over the summers of Lee’s youth, he learned about finding contentment in hard work and became comfortable being uncomfortable. Lee started wrestling in high school in the 9th grade and made the varsity team in the 10th grade, his first season in varsity he won as many matches as he lost. The summer between the 10th and the 11th grade year was the turning point for young Lee. He attended a Wrestling Camp that the wrestler Dan Gable was at right before the Olympic games of 1972, what he learned from Dan Gable at that camp became the catalyst for Lee becoming a different wrestler and different person. Lee gained a new mindset from that wrestling camp with Dan Gable. Coach Lee went on to win the state championship as a junior in high school, defeating the defending state champion. 
As the episode progresses, Ron and Chris ask Lee about his philosophies on consistency. Lee describes that at each point in his journey to be a champion wrestler he took every opportunity to learn more about his game and his opponents. While Lee was in wrestling camp with Dan Gable, he was the only willing volunteer that would allow Dan to try out wrestling moves on him. Lee knew that if he could understand how one of the greatest wrestlers performed offensively and defensively he could at a minimum learn something new and potentially incorporate it into his style. Lee’s determination has always been contagious and a positive influence to his community. An example that Lee shares is the story of his wrestling teammate Pat Christenson. Before defeating Dan Gable, Wisconsin had a drought of national champions in wrestling. Pat Christenson shared with Lee after defeating Gable he realized he could aspire to become a world champion also.
Impactful Moments During The Episode
01:30 - Welcome back to the Hacker Valley Studio.
01:56 - Introducing the three time world champion Lee Kemp.
03:04 - A child of the sixties and learning how to give back.
04:18 - Understanding where you come from and learning to be content.
07:01 - Characteristics of grit.
08:43 - Overcoming the biggest roadblock to success.
11:08 - Finding a worthwhile goal as a high school wrestler and learning from the best. 
12:26 - The inflection point towards success for wrestler Lee Kemp
14:24 - The fateful wrestling camp experience of 1972.
16:25 - Watching your camp coach from the summer with Olympic Gold.
17:28 - Lee Kemp finds the opportunity to wrestle against his former wrestling camp Coach, the gold medal winner Dan Gable.
19:05 - How Lee stayed focused on wrestling Gable despite detractors and distractions.
21:20 - Finding a different mindset, finding a different Lee Kemp.
22:51 - Taking little steps of confidence towards goals.
24:11 - Lee Kemp being in the moment wrestling in the last 30 seconds against Gable.
25:53 - From being in the moment to being part of the moment. 
27:30 - The reaction to breaking expectations
29:00 - A rivalry that couldn’t be played out in competition, an unofficial match between Kemp and Gable
31:00 - Moving mountains
32:57 - Inspiring future wrestling champions at University of Wisconsin
34:]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2228</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>125</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 124 - The Learning Leader with Allan Alford</title>
        <itunes:title>Episode 124 - The Learning Leader with Allan Alford</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-124-the-learning-leader-with-allan-alford/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-124-the-learning-leader-with-allan-alford/#comments</comments>        <pubDate>Tue, 02 Mar 2021 08:13:41 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f79be4c3-214e-3b20-ae13-d620aade1b37</guid>
                                    <description><![CDATA[<p>Introducing the Cyber Ranch Podcast and Allan Alford!</p>
<p>Allan Alford is currently the Chief Technology Officer/Chief Information Security Officer at TrustMAPP. Allan Alford is a member of the Hacker Valley family and has launched a new show called the Cyber Ranch Podcast. Allan has been a CISO at a number of different companies and has a wealth of knowledge in Cybersecurity. Has about 20 years of Cybersecurity and has a background in product security. </p>
<p>Allan is a tinkerer and a second generation information security practitioner. His father was a systems operator/administrator who specialized in Systems Security, his father brought their first IBM PC into the house while Allan was in middle school. Since that moment, Allan has always been interested in technology and had a group of friends who had the brand new tools of the time like the TI-99, TRS-80, IBM PC and Apple IIe. He and his friends were porting and writing games, hacking and war dialing. Allan’s mother was a school teacher and had house rules about television time, and so with an hour of TV a week Allan’s primary form of entertainment was reading.</p>
<p>In high school Allan took a creative writing class where he found a passion for storytelling and reading novels. Before entering college Allan was confident in his technology skills and decided that studying Humanities would make a greater impact for him. While studying, Allan learned that there were many parallels between the study of humanities and technology. There was a vocabulary, grammar, and structure by which things operated that had a consistent set of rules. Allan learned that the correct application of grammar and vocabulary helped all things work properly. </p>
<p>As the episode progresses, Allan shares while reading books, articles or other word based sources there’s a sort of internal voice that is within his mind that reads the words ‘out loud,’ however once he’s immersed in the book or text that the subvocalization fades and there’s a much more immediate type of onboarding of the information, the non-conscious reading voice. Chris shares that he describes this as the <a href='https://en.wikipedia.org/wiki/Flow_(psychology)'>flow</a> of learning. Allan also speaks of lucking into a prime slot on the KTCU college radio station and how he found his groove djing by deconstructing threads of music. He would put together his set by starting with a popular song and tracing it back from influence and inspirations. </p>
<p>Allan also shares his thoughts on the importance of networking - And not all networking starting points being equal. With his success now he tries to create bridges and conversations through his network that promote the exchange of ideas and further conversations for people, Allan is hoping to do the same with his podcast - The Cyber Ranch. Professionally he’s embarking on a new journey as the Chief Technology Officer at TrustMapp and is currently learning how to be a great producer of Security technologies. </p>
<p> </p>
<p>Impactful Moments During the Show</p>
<p>0:00 - Welcome back to the Hacker Valley Studio!</p>
<p>01:30 - Welcome back to the Hacker Valley studio and welcome to the Cyber Ranch podcast</p>
<p>02:30 - Allan’s Professional Adventuring Card</p>
<p>03:00 - Allan’s tinkering background and a second generation info security professional</p>
<p>04:30 - Writing and porting video games as a youth, growing up as a STEM kid</p>
<p>05:35 - Creative writing opening the world to storytelling</p>
<p>06:50 - Going to college already knowing about Computer Science</p>
<p>08:40 - Practices and techniques for learning rapidly and staying sharp</p>
<p>10:30 - Understanding the fields of vocabulary and grammar</p>
<p>11:56 - Conscious reading voice, non-conscious reading voice and flow</p>
<p>14:14 - From reading to producing work that people could consume</p>
<p>16:00 - DJ Deconstruction, how Allan put together a primetime radio set on KTCU</p>
<p>17:00 - Networking without inherited connections</p>
<p>19:20 - How networking works for Allan now</p>
<p>22:20 - Networking misunderstood, the traps of the output side</p>
<p>24:00 - Allan’s 70/30 rule for career advancement</p>
<p>25:30 - CISO and CTO parallels</p>
<p>27:30 - What motivated Allan to start his own cyber security podcast</p>
<p>29:30 - For someone entering the Cybersecurity world from a non-technical background</p>
Links
<p>Connect with Allan on LinkedIn <a href='https://www.linkedin.com/in/allanalford/'>Allan Alford - CISO & CTO - TrustMAPP</a></p>
<p>Check out <a href='https://hackervalley.com/cyberranch/'>The Cyber Ranch Podcast</a>!</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a> and enroll in The AttackIQ <a href='https://academy.attackiq.com/'>Academy</a>!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Introducing the Cyber Ranch Podcast and Allan Alford!</p>
<p>Allan Alford is currently the Chief Technology Officer/Chief Information Security Officer at TrustMAPP. Allan Alford is a member of the Hacker Valley family and has launched a new show called the Cyber Ranch Podcast. Allan has been a CISO at a number of different companies and has a wealth of knowledge in Cybersecurity. Has about 20 years of Cybersecurity and has a background in product security. </p>
<p>Allan is a tinkerer and a second generation information security practitioner. His father was a systems operator/administrator who specialized in Systems Security, his father brought their first IBM PC into the house while Allan was in middle school. Since that moment, Allan has always been interested in technology and had a group of friends who had the brand new tools of the time like the TI-99, TRS-80, IBM PC and Apple IIe. He and his friends were porting and writing games, hacking and war dialing. Allan’s mother was a school teacher and had house rules about television time, and so with an hour of TV a week Allan’s primary form of entertainment was reading.</p>
<p>In high school Allan took a creative writing class where he found a passion for storytelling and reading novels. Before entering college Allan was confident in his technology skills and decided that studying Humanities would make a greater impact for him. While studying, Allan learned that there were many parallels between the study of humanities and technology. There was a vocabulary, grammar, and structure by which things operated that had a consistent set of rules. Allan learned that the correct application of grammar and vocabulary helped all things work properly. </p>
<p>As the episode progresses, Allan shares while reading books, articles or other word based sources there’s a sort of internal voice that is within his mind that reads the words ‘out loud,’ however once he’s immersed in the book or text that the subvocalization fades and there’s a much more immediate type of onboarding of the information, the non-conscious reading voice. Chris shares that he describes this as the <a href='https://en.wikipedia.org/wiki/Flow_(psychology)'>flow</a> of learning. Allan also speaks of lucking into a prime slot on the KTCU college radio station and how he found his groove djing by deconstructing threads of music. He would put together his set by starting with a popular song and tracing it back from influence and inspirations. </p>
<p>Allan also shares his thoughts on the importance of networking - And not all networking starting points being equal. With his success now he tries to create bridges and conversations through his network that promote the exchange of ideas and further conversations for people, Allan is hoping to do the same with his podcast - The Cyber Ranch. Professionally he’s embarking on a new journey as the Chief Technology Officer at TrustMapp and is currently learning how to be a great producer of Security technologies. </p>
<p> </p>
<p>Impactful Moments During the Show</p>
<p>0:00 - Welcome back to the Hacker Valley Studio!</p>
<p>01:30 - Welcome back to the Hacker Valley studio and welcome to the Cyber Ranch podcast</p>
<p>02:30 - Allan’s Professional Adventuring Card</p>
<p>03:00 - Allan’s tinkering background and a second generation info security professional</p>
<p>04:30 - Writing and porting video games as a youth, growing up as a STEM kid</p>
<p>05:35 - Creative writing opening the world to storytelling</p>
<p>06:50 - Going to college already knowing about Computer Science</p>
<p>08:40 - Practices and techniques for learning rapidly and staying sharp</p>
<p>10:30 - Understanding the fields of vocabulary and grammar</p>
<p>11:56 - Conscious reading voice, non-conscious reading voice and flow</p>
<p>14:14 - From reading to producing work that people could consume</p>
<p>16:00 - DJ Deconstruction, how Allan put together a primetime radio set on KTCU</p>
<p>17:00 - Networking without inherited connections</p>
<p>19:20 - How networking works for Allan now</p>
<p>22:20 - Networking misunderstood, the traps of the output side</p>
<p>24:00 - Allan’s 70/30 rule for career advancement</p>
<p>25:30 - CISO and CTO parallels</p>
<p>27:30 - What motivated Allan to start his own cyber security podcast</p>
<p>29:30 - For someone entering the Cybersecurity world from a non-technical background</p>
Links
<p>Connect with Allan on LinkedIn <a href='https://www.linkedin.com/in/allanalford/'>Allan Alford - CISO & CTO - TrustMAPP</a></p>
<p>Check out <a href='https://hackervalley.com/cyberranch/'>The Cyber Ranch Podcast</a>!</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a> and enroll in The AttackIQ <a href='https://academy.attackiq.com/'>Academy</a>!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3qsvck/Allan_Alford_Final_Mix6qhrf.mp3" length="31103232" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Introducing the Cyber Ranch Podcast and Allan Alford!
Allan Alford is currently the Chief Technology Officer/Chief Information Security Officer at TrustMAPP. Allan Alford is a member of the Hacker Valley family and has launched a new show called the Cyber Ranch Podcast. Allan has been a CISO at a number of different companies and has a wealth of knowledge in Cybersecurity. Has about 20 years of Cybersecurity and has a background in product security. 
Allan is a tinkerer and a second generation information security practitioner. His father was a systems operator/administrator who specialized in Systems Security, his father brought their first IBM PC into the house while Allan was in middle school. Since that moment, Allan has always been interested in technology and had a group of friends who had the brand new tools of the time like the TI-99, TRS-80, IBM PC and Apple IIe. He and his friends were porting and writing games, hacking and war dialing. Allan’s mother was a school teacher and had house rules about television time, and so with an hour of TV a week Allan’s primary form of entertainment was reading.
In high school Allan took a creative writing class where he found a passion for storytelling and reading novels. Before entering college Allan was confident in his technology skills and decided that studying Humanities would make a greater impact for him. While studying, Allan learned that there were many parallels between the study of humanities and technology. There was a vocabulary, grammar, and structure by which things operated that had a consistent set of rules. Allan learned that the correct application of grammar and vocabulary helped all things work properly. 
As the episode progresses, Allan shares while reading books, articles or other word based sources there’s a sort of internal voice that is within his mind that reads the words ‘out loud,’ however once he’s immersed in the book or text that the subvocalization fades and there’s a much more immediate type of onboarding of the information, the non-conscious reading voice. Chris shares that he describes this as the flow of learning. Allan also speaks of lucking into a prime slot on the KTCU college radio station and how he found his groove djing by deconstructing threads of music. He would put together his set by starting with a popular song and tracing it back from influence and inspirations. 
Allan also shares his thoughts on the importance of networking - And not all networking starting points being equal. With his success now he tries to create bridges and conversations through his network that promote the exchange of ideas and further conversations for people, Allan is hoping to do the same with his podcast - The Cyber Ranch. Professionally he’s embarking on a new journey as the Chief Technology Officer at TrustMapp and is currently learning how to be a great producer of Security technologies. 
 
Impactful Moments During the Show
0:00 - Welcome back to the Hacker Valley Studio!
01:30 - Welcome back to the Hacker Valley studio and welcome to the Cyber Ranch podcast
02:30 - Allan’s Professional Adventuring Card
03:00 - Allan’s tinkering background and a second generation info security professional
04:30 - Writing and porting video games as a youth, growing up as a STEM kid
05:35 - Creative writing opening the world to storytelling
06:50 - Going to college already knowing about Computer Science
08:40 - Practices and techniques for learning rapidly and staying sharp
10:30 - Understanding the fields of vocabulary and grammar
11:56 - Conscious reading voice, non-conscious reading voice and flow
14:14 - From reading to producing work that people could consume
16:00 - DJ Deconstruction, how Allan put together a primetime radio set on KTCU
17:00 - Networking without inherited connections
19:20 - How networking works for Allan now
22:20 - Networking misunderstood, the traps of the output side
24:00 - Allan’s 70/30 rule for career advancement
25:30 - CISO an]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1939</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>124</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 123 - Adventures in Venture Capital with Lindsay Lee</title>
        <itunes:title>Episode 123 - Adventures in Venture Capital with Lindsay Lee</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-123-adventures-in-venture-capital-with-lindsay-lee/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-123-adventures-in-venture-capital-with-lindsay-lee/#comments</comments>        <pubDate>Thu, 25 Feb 2021 15:43:39 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/93211fcc-da81-3e17-9123-206b3e7247e7</guid>
                                    <description><![CDATA[<p>Lindsay Lee is the founder and managing member of Authentic Ventures. Authentic Ventures is an early stage VC firm based in Oakland CA. Lindsay has worked many years in the investment industries as well as venture capital and ran a direct investment fund. Authentic ventures is a new kind of firm focused primarily on women and under-represented minority founders. Authentic Ventures is focused on building its own network of women founders of more diverse backgrounds and entrepreneurs who really want to see success translate into more opportunities for their communities.</p>
<p>Coming from modest beginnings and raised by immigrant parents from the West Indies, his parents really solidified the importance of education. Lindsay has worked in investment banking as an analyst alongside graduates of Ivy League schools, there he learned about his own determination to excel even in tough working conditions while learning as much as possible. After graduating from graduate school Lindsay started an ill-fated technology start up in 1999; funding was hard to find in the early naughts (00’s) especially for Black founders.</p>
<p>After pivoting to working in asset management companies Lindsay joined a family office where he built and managed a portfolio. He reached a turning point there where he was able to look at public and private investments and assess the landscape. Lindsay decided he wanted to differentiate himself and focus efforts on really approaching investment in his own way, to invest in “early stage companies,” as opposed to series A or series B companies. A peer at another firm told him that it was going to be double the effort and twice the financing to get it off the ground. Lindsay’s drive and the network he was a part of propelled him through the challenges. </p>
<p>The conversation touches upon the “rules of the game” for galvanizing new ideas and bringing new products and companies into the market. He speaks about the roles that entrepreneurs, lawyers and investors have in capital markets. Lindsay found his calling as an investor was one where he was a coach, rather than an entrepreneur who is trying to score goals all the time. Lindsay describes how his focus was on cultivating relationships and community in order to grow an interconnected network that would allow for long lasting impact in the landscape while also bringing success to his firm. </p>
<p>He shares that the one thing he’s had to get right is finding A+ people to work with. In his approach as an investor he is trying to set the table for women of color and reserve, or build, a seat at the table that allows for success to be shared.  Lindsay believes this focus will lead to more opportunities for more diverse teams. For folks interested in becoming an investor or entrepreneur Lindsay speaks about the importance of team building and utilizing the connections they already have as capital. He also urges people to not ignore the skills they’ve gained by applying themselves and that those skills plus knowledge of the space they’re focused on can create something that’s meaningful. </p>
Impactful Moments During Podcast
<p>00:00 - Welcome back to the Hacker Valley Studio, introducing Lindsay Lee of Authentic Ventures, a VC firm that invests in seed and early stage companies.</p>
<p>02:30 - Building a more diverse inclusive VC network and culture. </p>
<p>04:30 - What the exploration of VC was like for Lindsay and what were some of the motivations for moving in this way in that sphere.</p>
<p>06:45  - Why it’s important for diversity that a firm like Authentic Ventures exists in Silicon Valley and the tech community.</p>
<p>07:20 - How VC firms can help create more wealth across communities of color and gender.</p>
<p>09:30 - The journey to VC and what exploring that world looked like for Lindsay.</p>
<p>10:00 - Entrepreneurship as a sport: who are players, rule-makers and play callers.</p>
<p>11:45 - Taking the long view on cultivating good investments and finding the right people.</p>
<p>12:20 - Starting his own thing in VC, differentiating himself and dealing with uncertainty</p>
<p>14:27 - What immersion in VC is like, navigating changing landscapes</p>
<p>15:15 - If you’re looking for a challenge, investing is a good field; things not going to plan.</p>
<p>15:45 - Why you need to find A+ people.</p>
<p>17:20 - Staying humble and grounded in VC</p>
<p>18:14 - What creates success in entrepreneurial endeavors</p>
<p>19:30 - Why Authentic Ventures has a culture of good energy</p>
<p>20:45 - Studying and data in VC, compounding experience and knowledge, the value of having a community</p>
<p>22:40 - Trying to find ideas and company with momentum</p>
<p>23:20 - No free lunch in investing? What does a margin of error mean in this VC world.</p>
<p>24:45 - Why VC firms learn about the founders, how to scrutinize the methodology</p>
<p>26:00 - If you’re an entrepreneur why you should get to know a VC fund outside of funding events.</p>
<p>27:00 - Being an early believer in trailblazers</p>
<p>28:00 - Authentic Ventures tries to win together, with the right people</p>
<p>29:25 - Lindsay talks about not starting out on First or Second Base and making an impact that helps his community.</p>
<p>30:35 - Having something to prove as an analyst at investment banks</p>
<p>31:45 - The best lesson to learn as an investor, understanding the people, connecting with people that share your values.</p>
<p>33:30 - Why there’s no substitute for excellence or hard work.</p>
<p>37:23 - Staying power and determination: “Get your money right.”</p>
<p>38:30 - Staying in touch with Lindsay Lee and Authentic Ventures</p>
<p> </p>
<p>Stay connected with Lindsay Lee by checking out <a href='http://www.authentic-ventures.com'>Authentic Ventures</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Lindsay Lee is the founder and managing member of Authentic Ventures. Authentic Ventures is an <em>early stage</em> VC firm based in Oakland CA. Lindsay has worked many years in the investment industries as well as venture capital and ran a direct investment fund. Authentic ventures is a new kind of firm focused primarily on women and under-represented minority founders. Authentic Ventures is focused on building its own network of women founders of more diverse backgrounds and entrepreneurs who really want to see success translate into more opportunities for their communities.</p>
<p>Coming from modest beginnings and raised by immigrant parents from the West Indies, his parents really solidified the importance of education. Lindsay has worked in investment banking as an analyst alongside graduates of Ivy League schools, there he learned about his own determination to excel even in tough working conditions while learning as much as possible. After graduating from graduate school Lindsay started an ill-fated technology start up in 1999; funding was hard to find in the early naughts (00’s) especially for Black founders.</p>
<p>After pivoting to working in asset management companies Lindsay joined a family office where he built and managed a portfolio. He reached a turning point there where he was able to look at public and private investments and assess the landscape. Lindsay decided he wanted to differentiate himself and focus efforts on really approaching investment in his own way, to invest in “early stage companies,” as opposed to series A or series B companies. A peer at another firm told him that it was going to be double the effort and twice the financing to get it off the ground. Lindsay’s drive and the network he was a part of propelled him through the challenges. </p>
<p>The conversation touches upon the “rules of the game” for galvanizing new ideas and bringing new products and companies into the market. He speaks about the roles that entrepreneurs, lawyers and investors have in capital markets. Lindsay found his calling as an investor was one where he was a coach, rather than an entrepreneur who is trying to score goals all the time. Lindsay describes how his focus was on cultivating relationships and community in order to grow an interconnected network that would allow for long lasting impact in the landscape while also bringing success to his firm. </p>
<p>He shares that the one thing he’s had to get right is finding A+ people to work with. In his approach as an investor he is trying to set the table for women of color and reserve, or build, a seat at the table that allows for success to be shared.  Lindsay believes this focus will lead to more opportunities for more diverse teams. For folks interested in becoming an investor or entrepreneur Lindsay speaks about the importance of team building and utilizing the connections they already have as capital. He also urges people to not ignore the skills they’ve gained by applying themselves and that those skills plus knowledge of the space they’re focused on can create something that’s meaningful. </p>
Impactful Moments During Podcast
<p>00:00 - Welcome back to the Hacker Valley Studio, introducing Lindsay Lee of Authentic Ventures, a VC firm that invests in seed and early stage companies.</p>
<p>02:30 - Building a more diverse inclusive VC network and culture. </p>
<p>04:30 - What the exploration of VC was like for Lindsay and what were some of the motivations for moving in this way in that sphere.</p>
<p>06:45  - Why it’s important for diversity that a firm like Authentic Ventures exists in Silicon Valley and the tech community.</p>
<p>07:20 - How VC firms can help create more wealth across communities of color and gender.</p>
<p>09:30 - The journey to VC and what exploring that world looked like for Lindsay.</p>
<p>10:00 - Entrepreneurship as a sport: who are players, rule-makers and play callers.</p>
<p>11:45 - Taking the long view on cultivating good investments and finding the right people.</p>
<p>12:20 - Starting his own thing in VC, differentiating himself and dealing with uncertainty</p>
<p>14:27 - What immersion in VC is like, navigating changing landscapes</p>
<p>15:15 - If you’re looking for a challenge, investing is a good field; things not going to plan.</p>
<p>15:45 - Why you need to find A+ people.</p>
<p>17:20 - Staying humble and grounded in VC</p>
<p>18:14 - What creates success in entrepreneurial endeavors</p>
<p>19:30 - Why Authentic Ventures has a culture of good energy</p>
<p>20:45 - Studying and data in VC, compounding experience and knowledge, the value of having a community</p>
<p>22:40 - Trying to find ideas and company with momentum</p>
<p>23:20 - No free lunch in investing? What does a margin of error mean in this VC world.</p>
<p>24:45 - Why VC firms learn about the founders, how to scrutinize the methodology</p>
<p>26:00 - If you’re an entrepreneur why you should get to know a VC fund outside of funding events.</p>
<p>27:00 - Being an early believer in trailblazers</p>
<p>28:00 - Authentic Ventures tries to win together, with the right people</p>
<p>29:25 - Lindsay talks about not starting out on First or Second Base and making an impact that helps his community.</p>
<p>30:35 - Having something to prove as an analyst at investment banks</p>
<p>31:45 - The best lesson to learn as an investor, understanding the people, connecting with people that share your values.</p>
<p>33:30 - Why there’s no substitute for excellence or hard work.</p>
<p>37:23 - Staying power and determination: “Get your money right.”</p>
<p>38:30 - Staying in touch with Lindsay Lee and Authentic Ventures</p>
<p> </p>
<p>Stay connected with Lindsay Lee by checking out <a href='http://www.authentic-ventures.com'>Authentic Ventures</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dckkyd/Lindsay_Lee_Final_Mixafhi1.mp3" length="39792000" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Lindsay Lee is the founder and managing member of Authentic Ventures. Authentic Ventures is an early stage VC firm based in Oakland CA. Lindsay has worked many years in the investment industries as well as venture capital and ran a direct investment fund. Authentic ventures is a new kind of firm focused primarily on women and under-represented minority founders. Authentic Ventures is focused on building its own network of women founders of more diverse backgrounds and entrepreneurs who really want to see success translate into more opportunities for their communities.
Coming from modest beginnings and raised by immigrant parents from the West Indies, his parents really solidified the importance of education. Lindsay has worked in investment banking as an analyst alongside graduates of Ivy League schools, there he learned about his own determination to excel even in tough working conditions while learning as much as possible. After graduating from graduate school Lindsay started an ill-fated technology start up in 1999; funding was hard to find in the early naughts (00’s) especially for Black founders.
After pivoting to working in asset management companies Lindsay joined a family office where he built and managed a portfolio. He reached a turning point there where he was able to look at public and private investments and assess the landscape. Lindsay decided he wanted to differentiate himself and focus efforts on really approaching investment in his own way, to invest in “early stage companies,” as opposed to series A or series B companies. A peer at another firm told him that it was going to be double the effort and twice the financing to get it off the ground. Lindsay’s drive and the network he was a part of propelled him through the challenges. 
The conversation touches upon the “rules of the game” for galvanizing new ideas and bringing new products and companies into the market. He speaks about the roles that entrepreneurs, lawyers and investors have in capital markets. Lindsay found his calling as an investor was one where he was a coach, rather than an entrepreneur who is trying to score goals all the time. Lindsay describes how his focus was on cultivating relationships and community in order to grow an interconnected network that would allow for long lasting impact in the landscape while also bringing success to his firm. 
He shares that the one thing he’s had to get right is finding A+ people to work with. In his approach as an investor he is trying to set the table for women of color and reserve, or build, a seat at the table that allows for success to be shared.  Lindsay believes this focus will lead to more opportunities for more diverse teams. For folks interested in becoming an investor or entrepreneur Lindsay speaks about the importance of team building and utilizing the connections they already have as capital. He also urges people to not ignore the skills they’ve gained by applying themselves and that those skills plus knowledge of the space they’re focused on can create something that’s meaningful. 
Impactful Moments During Podcast
00:00 - Welcome back to the Hacker Valley Studio, introducing Lindsay Lee of Authentic Ventures, a VC firm that invests in seed and early stage companies.
02:30 - Building a more diverse inclusive VC network and culture. 
04:30 - What the exploration of VC was like for Lindsay and what were some of the motivations for moving in this way in that sphere.
06:45  - Why it’s important for diversity that a firm like Authentic Ventures exists in Silicon Valley and the tech community.
07:20 - How VC firms can help create more wealth across communities of color and gender.
09:30 - The journey to VC and what exploring that world looked like for Lindsay.
10:00 - Entrepreneurship as a sport: who are players, rule-makers and play callers.
11:45 - Taking the long view on cultivating good investments and finding the right people.
12:20 - Starting his own thing in VC, differentiating h]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2482</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>123</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>We Are Here Finale: Rep. Yvette Clarke</title>
        <itunes:title>We Are Here Finale: Rep. Yvette Clarke</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/we-are-here-finale-rep-yvette-clarke/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/we-are-here-finale-rep-yvette-clarke/#comments</comments>        <pubDate>Tue, 23 Feb 2021 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/36b5e57c-66ce-378b-ad19-4f029acd8f7e</guid>
                                    <description><![CDATA[<p>Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in technology and cybersecurity. In part three of this series, Ron and Chris interview Congresswoman Yvette Clarke, serving as the U.S. Representative for New York's 9th congressional district since 2013. </p>
<p>Congresswoman Clarke’s parents immigrated to Brooklyn, New York in the 1950s from Jamaica. Being born from immigrant parents and witnessing the transformation of the country during the civil rights movement helped shape her worldview. Congresswoman Clarke mentions that the nurture from her family and community sparked her interest in public service at an early age. Congresswoman Clarke recalls being a child and looking up to her pediatrician, Dr. Thompson. Congresswoman Clarke could see herself being like Dr. Thompson and that led her to pursue her interests in STEM in grade school and college. When Congresswoman Clarke went away to college she made a commitment to come back to Brooklyn and use her education to help others</p>
<p>As the episode progresses, Congresswoman Clarke mentions her parents were engaged in the community out of necessity. They wanted to be able to navigate the United States and create community for her and her brother. Congresswoman Clarke’s mother started her community outreach at Parent Teacher Association meetings and was encouraged to run for political office after some time. In fact, Congresswoman Clarke became the first and only child to succeed a parent in political office. </p>
<p>Congresswoman Clarke describes community as essential and building communities is done through education. Digital transformation has enabled all generations to collaborate on common causes that they previously wouldn’t have had the opportunity to. An example that Congresswoman Clarke provides is narrowing the education gap for children of color. Through technology, parents have been working with government agencies and private organizations to provide more resources to schools in need.  </p>
<p> </p>
<p>Impactful Moments:</p>
<p>0:00 - Hacker Valley Studio presents We Are Here Pt 3</p>
<p>0:52 - Congresswoman Yvette Clarke on Hacker Valley Studio!</p>
<p>1:56 - Early life and how Congresswoman Clarke made it into office</p>
<p>3:38 - What inspired Congresswoman Clarke to help others</p>
<p>7:21 - Surprises while in office and servicing the public</p>
<p>13:35 - Congresswoman Clarke’s story of perseverance</p>
<p>16:36 - The importance of community and how to influence yours</p>
<p>24:40 - Education and mentorship</p>
<p>27:51 - Using technology to course correct and amplify your voice</p>
<p>31:59 - Sage wisdom for embarking on your personal journey</p>
<p> </p>
<p> </p>
<p>Follow Congresswoman Yvette Clarke on <a href='https://www.linkedin.com/in/yvette-clarke-9b3aa810/'>LinkedIn</a>, <a href='https://www.instagram.com/repyvetteclarke/'>Instagram</a>, and <a href='https://twitter.com/RepYvetteClarke'>Twitter</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in technology and cybersecurity. In part three of this series, Ron and Chris interview Congresswoman Yvette Clarke, serving as the U.S. Representative for New York's 9th congressional district since 2013. </p>
<p>Congresswoman Clarke’s parents immigrated to Brooklyn, New York in the 1950s from Jamaica. Being born from immigrant parents and witnessing the transformation of the country during the civil rights movement helped shape her worldview. Congresswoman Clarke mentions that the nurture from her family and community sparked her interest in public service at an early age. Congresswoman Clarke recalls being a child and looking up to her pediatrician, Dr. Thompson. Congresswoman Clarke could see herself being like Dr. Thompson and that led her to pursue her interests in STEM in grade school and college. When Congresswoman Clarke went away to college she made a commitment to come back to Brooklyn and use her education to help others</p>
<p>As the episode progresses, Congresswoman Clarke mentions her parents were engaged in the community out of necessity. They wanted to be able to navigate the United States and create community for her and her brother. Congresswoman Clarke’s mother started her community outreach at Parent Teacher Association meetings and was encouraged to run for political office after some time. In fact, Congresswoman Clarke became the first and only child to succeed a parent in political office. </p>
<p>Congresswoman Clarke describes community as essential and building communities is done through education. Digital transformation has enabled all generations to collaborate on common causes that they previously wouldn’t have had the opportunity to. An example that Congresswoman Clarke provides is narrowing the education gap for children of color. Through technology, parents have been working with government agencies and private organizations to provide more resources to schools in need.  </p>
<p> </p>
<p>Impactful Moments:</p>
<p>0:00 - Hacker Valley Studio presents We Are Here Pt 3</p>
<p>0:52 - Congresswoman Yvette Clarke on Hacker Valley Studio!</p>
<p>1:56 - Early life and how Congresswoman Clarke made it into office</p>
<p>3:38 - What inspired Congresswoman Clarke to help others</p>
<p>7:21 - Surprises while in office and servicing the public</p>
<p>13:35 - Congresswoman Clarke’s story of perseverance</p>
<p>16:36 - The importance of community and how to influence yours</p>
<p>24:40 - Education and mentorship</p>
<p>27:51 - Using technology to course correct and amplify your voice</p>
<p>31:59 - Sage wisdom for embarking on your personal journey</p>
<p> </p>
<p> </p>
<p>Follow Congresswoman Yvette Clarke on <a href='https://www.linkedin.com/in/yvette-clarke-9b3aa810/'>LinkedIn</a>, <a href='https://www.instagram.com/repyvetteclarke/'>Instagram</a>, and <a href='https://twitter.com/RepYvetteClarke'>Twitter</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/u8qri6/We_are_here_part_3_Final_Mixa2ijt.mp3" length="35442147" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in technology and cybersecurity. In part three of this series, Ron and Chris interview Congresswoman Yvette Clarke, serving as the U.S. Representative for New York's 9th congressional district since 2013. 
Congresswoman Clarke’s parents immigrated to Brooklyn, New York in the 1950s from Jamaica. Being born from immigrant parents and witnessing the transformation of the country during the civil rights movement helped shape her worldview. Congresswoman Clarke mentions that the nurture from her family and community sparked her interest in public service at an early age. Congresswoman Clarke recalls being a child and looking up to her pediatrician, Dr. Thompson. Congresswoman Clarke could see herself being like Dr. Thompson and that led her to pursue her interests in STEM in grade school and college. When Congresswoman Clarke went away to college she made a commitment to come back to Brooklyn and use her education to help others
As the episode progresses, Congresswoman Clarke mentions her parents were engaged in the community out of necessity. They wanted to be able to navigate the United States and create community for her and her brother. Congresswoman Clarke’s mother started her community outreach at Parent Teacher Association meetings and was encouraged to run for political office after some time. In fact, Congresswoman Clarke became the first and only child to succeed a parent in political office. 
Congresswoman Clarke describes community as essential and building communities is done through education. Digital transformation has enabled all generations to collaborate on common causes that they previously wouldn’t have had the opportunity to. An example that Congresswoman Clarke provides is narrowing the education gap for children of color. Through technology, parents have been working with government agencies and private organizations to provide more resources to schools in need.  
 
Impactful Moments:
0:00 - Hacker Valley Studio presents We Are Here Pt 3
0:52 - Congresswoman Yvette Clarke on Hacker Valley Studio!
1:56 - Early life and how Congresswoman Clarke made it into office
3:38 - What inspired Congresswoman Clarke to help others
7:21 - Surprises while in office and servicing the public
13:35 - Congresswoman Clarke’s story of perseverance
16:36 - The importance of community and how to influence yours
24:40 - Education and mentorship
27:51 - Using technology to course correct and amplify your voice
31:59 - Sage wisdom for embarking on your personal journey
 
 
Follow Congresswoman Yvette Clarke on LinkedIn, Instagram, and Twitter
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2211</itunes:duration>
        <itunes:season>4</itunes:season>
        <itunes:episode>122</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 121 - What Is Your IP Address with Chris Parker</title>
        <itunes:title>Episode 121 - What Is Your IP Address with Chris Parker</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-121-what-is-your-ip-address-with-chris-parker/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-121-what-is-your-ip-address-with-chris-parker/#comments</comments>        <pubDate>Sat, 20 Feb 2021 04:09:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/53cd26c8-b7e4-3891-bd5a-99277fd43f1b</guid>
                                    <description><![CDATA[<p>In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Chris Parker, creator of WhatIsMyIPAddress. His website now reaches six million monthly visitors and began as a necessity to solve a technical problem, which you can probably guess, determine his IP Address.</p>
<p>WhatIsMyIPAddress predates Google and was often found through the search engine AltaVista. For years, the site was simple, straightforward and didn’t have any graphics or markup (HTML). At some point, Chris stumbled upon a Content Management System (CMS) called Geek Log but quickly learned with the amount of traffic that it was best for him to manually code each page on his website. For quite some time Chris maintained the website, answered questions from users about IP Addresses, and created more content without receiving any monetary compensation. The advent of Google AdSense led Chris to realize that he could make a profit for hosting his website.</p>
<p>Chris’s website is in the top 3,000 websites on the Internet and was managed out of his home office for over 8 years. As you can imagine, he received traffic from users across the world and was even the target of some cybersecurity attacks. However, keeping the functionality on his website simple, the biggest threat Chris faced was Denial of Service (DoS). After moving his website from his home to a CDN provider that blocks malicious traffic and bots, Chris saw a 90% reduction in web traffic to his website. This led Chris down the path of creating content about security and configuration.</p>
<p>With such a large audience, Chris decided to start the Easy Pray podcast and help listeners learn how to avoid becoming easy targets for scammers and fraudsters online and in the real world. Chris recalls a story of a fraud group that scammed victims by telling the victim that they’ve won the lottery in their country but are unable to withdraw the winnings because of citizenship. This scam is not uncommon and has caused hopeful individuals to lose thousands and sometimes their entire life savings. Chris has set out on a mission to inform others of these scams and create awareness about online safety.</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p>1:44 - Introducing Chris Parker, Creator of WhatIsMyIPAddress</p>
<p>5:11 - Was the naming of the website intentional or was it incidental?</p>
<p>6:04 - Adapting and digital transformation</p>
<p>7:29 - Malicious traffic and cyber attacks</p>
<p>10:39 - Creating a more safe Internet with the Easy Pray podcast</p>
<p>12:43 - Unfortunate spam and scamming stories</p>
<p>15:18 - More about Chris’s goal to provide education to his listeners</p>
<p>18:40 - Learnings and takeaways to avoid being scammed</p>
<p>24:02 - Tools that Chris is using to grow and scale his business</p>
<p>26:51 - How to stay up to date with Chris Parker</p>
<p> </p>
<p>Links:</p>
<p>Learn more about Chris Parker and visit his <a href='https://whatismyipaddress.com/'>website</a> and <a href='https://www.easyprey.com/'>podcast</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Chris Parker, creator of WhatIsMyIPAddress. His website now reaches six million monthly visitors and began as a necessity to solve a technical problem, which you can probably guess, determine his IP Address.</p>
<p>WhatIsMyIPAddress predates Google and was often found through the search engine AltaVista. For years, the site was simple, straightforward and didn’t have any graphics or markup (HTML). At some point, Chris stumbled upon a Content Management System (CMS) called Geek Log but quickly learned with the amount of traffic that it was best for him to manually code each page on his website. For quite some time Chris maintained the website, answered questions from users about IP Addresses, and created more content without receiving any monetary compensation. The advent of Google AdSense led Chris to realize that he could make a profit for hosting his website.</p>
<p>Chris’s website is in the top 3,000 websites on the Internet and was managed out of his home office for over 8 years. As you can imagine, he received traffic from users across the world and was even the target of some cybersecurity attacks. However, keeping the functionality on his website simple, the biggest threat Chris faced was Denial of Service (DoS). After moving his website from his home to a CDN provider that blocks malicious traffic and bots, Chris saw a 90% reduction in web traffic to his website. This led Chris down the path of creating content about security and configuration.</p>
<p>With such a large audience, Chris decided to start the Easy Pray podcast and help listeners learn how to avoid becoming easy targets for scammers and fraudsters online and in the real world. Chris recalls a story of a fraud group that scammed victims by telling the victim that they’ve won the lottery in their country but are unable to withdraw the winnings because of citizenship. This scam is not uncommon and has caused hopeful individuals to lose thousands and sometimes their entire life savings. Chris has set out on a mission to inform others of these scams and create awareness about online safety.</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p>1:44 - Introducing Chris Parker, Creator of WhatIsMyIPAddress</p>
<p>5:11 - Was the naming of the website intentional or was it incidental?</p>
<p>6:04 - Adapting and digital transformation</p>
<p>7:29 - Malicious traffic and cyber attacks</p>
<p>10:39 - Creating a more safe Internet with the Easy Pray podcast</p>
<p>12:43 - Unfortunate spam and scamming stories</p>
<p>15:18 - More about Chris’s goal to provide education to his listeners</p>
<p>18:40 - Learnings and takeaways to avoid being scammed</p>
<p>24:02 - Tools that Chris is using to grow and scale his business</p>
<p>26:51 - How to stay up to date with Chris Parker</p>
<p> </p>
<p>Links:</p>
<p>Learn more about Chris Parker and visit his <a href='https://whatismyipaddress.com/'>website</a> and <a href='https://www.easyprey.com/'>podcast</a>.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4rfmuz/Chris_Parker_Final_Mix90nlx.mp3" length="26788224" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Chris Parker, creator of WhatIsMyIPAddress. His website now reaches six million monthly visitors and began as a necessity to solve a technical problem, which you can probably guess, determine his IP Address.
WhatIsMyIPAddress predates Google and was often found through the search engine AltaVista. For years, the site was simple, straightforward and didn’t have any graphics or markup (HTML). At some point, Chris stumbled upon a Content Management System (CMS) called Geek Log but quickly learned with the amount of traffic that it was best for him to manually code each page on his website. For quite some time Chris maintained the website, answered questions from users about IP Addresses, and created more content without receiving any monetary compensation. The advent of Google AdSense led Chris to realize that he could make a profit for hosting his website.
Chris’s website is in the top 3,000 websites on the Internet and was managed out of his home office for over 8 years. As you can imagine, he received traffic from users across the world and was even the target of some cybersecurity attacks. However, keeping the functionality on his website simple, the biggest threat Chris faced was Denial of Service (DoS). After moving his website from his home to a CDN provider that blocks malicious traffic and bots, Chris saw a 90% reduction in web traffic to his website. This led Chris down the path of creating content about security and configuration.
With such a large audience, Chris decided to start the Easy Pray podcast and help listeners learn how to avoid becoming easy targets for scammers and fraudsters online and in the real world. Chris recalls a story of a fraud group that scammed victims by telling the victim that they’ve won the lottery in their country but are unable to withdraw the winnings because of citizenship. This scam is not uncommon and has caused hopeful individuals to lose thousands and sometimes their entire life savings. Chris has set out on a mission to inform others of these scams and create awareness about online safety.
 
Impactful Moments
0:00 - Welcome back to the Hacker Valley Studio
1:44 - Introducing Chris Parker, Creator of WhatIsMyIPAddress
5:11 - Was the naming of the website intentional or was it incidental?
6:04 - Adapting and digital transformation
7:29 - Malicious traffic and cyber attacks
10:39 - Creating a more safe Internet with the Easy Pray podcast
12:43 - Unfortunate spam and scamming stories
15:18 - More about Chris’s goal to provide education to his listeners
18:40 - Learnings and takeaways to avoid being scammed
24:02 - Tools that Chris is using to grow and scale his business
26:51 - How to stay up to date with Chris Parker
 
Links:
Learn more about Chris Parker and visit his website and podcast.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek. 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1670</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>121</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 120 - Bishops, Black Belts, and Business with Jeff Cook</title>
        <itunes:title>Episode 120 - Bishops, Black Belts, and Business with Jeff Cook</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-120-bishops-black-belts-and-business-with-jeff-cook/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-120-bishops-black-belts-and-business-with-jeff-cook/#comments</comments>        <pubDate>Tue, 16 Feb 2021 16:09:30 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/05ed9f9e-e4ed-37fc-99d3-91b5868bb5aa</guid>
                                    <description><![CDATA[<p>In this featured episode of Hacker Valley Studio podcast, Ron and Chris are joined by Jeff Cook, Co-Founder, and CFO of ByteChek. Jeff has over 10 years of experience in both accounting and auditing and has set out a mission to “make compliance suck less”</p>
<p>Jeff began his career at accounting firm, Arthur Andersen. In 2002, the firm surrendered it’s license to practice as a CPA which forced Jeff to consider working at other firms. This surprise turned out to be a blessing as it made him transition from New York to Washington DC. After his transition, Jeff worked in public accounting and auditing for 12 years and began starting IT auditing practices and SOC practices at large accounting firms. </p>
<p>While working at a cybersecurity firm, Jeff met his co-founder AJ Yawn. The two worked on numerous SOC engagements together - which gave them the confidence to scale their ideas and efforts to make compliance suck less. Despite 2020 being the beginning of a global pandemic, the two decided to persevere and form their company ByteChek.</p>
<p>As the episode progresses, Jeff describes his partnership with AJ as dynamic and fluid. Jeff brings to the table a deep understanding of accounting and auditing challenges and solutions. Jeff admires AJ’s ability to be a leader and rally the troops to ensure everyone is moving in the right direction. Besides complimenting each other’s strengths and weaknesses, Jeff and AJ are also great friends and check-in together to help each other grow personally outside of work.</p>
<p>Jeff describes his superpower as his ability to work under pressure. When there’s deadlines and a surplus of work, Jeff leans on his experience as an accountant. While working as an accountant, each year in January through April (tax season) Jeff had to practice his discipline of working under pressure with clear deadlines from his clients and the government. Additionally, Jeff has spent years practicing martial arts, and describes it as a great technique to use to clear his mind in all situations.</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p>1:41 - This episode features Jeff Cook, Co-Founder, and CFO of ByteChek</p>
<p>2:26 - Jeff’s background and start in accounting and auditing</p>
<p>5:08 - Thriving in business as a founder during a global pandemic</p>
<p>8:31 - Jeff’s superpower and where it began</p>
<p>11:16 - How to overcome your kryptonite and core emotional challenge</p>
<p>13:58 - How martial arts has helped Jeff as a practitioner</p>
<p>17:48 - Parallels between cybersecurity, chess, and martial arts</p>
<p>21:21 - Getting comfortable with discomfort</p>
<p>28:14 - Wisdom from Jeff for leveling up as a entrepreneur and practitioner</p>
<p> </p>
<p>Links:</p>
<p>Learn more about <a href='https://www.linkedin.com/in/jeffcookcpa/'>Jeff Cook</a> and connect with him on LinkedIn.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this featured episode of Hacker Valley Studio podcast, Ron and Chris are joined by Jeff Cook, Co-Founder, and CFO of ByteChek. Jeff has over 10 years of experience in both accounting and auditing and has set out a mission to “make compliance suck less”</p>
<p>Jeff began his career at accounting firm, Arthur Andersen. In 2002, the firm surrendered it’s license to practice as a CPA which forced Jeff to consider working at other firms. This surprise turned out to be a blessing as it made him transition from New York to Washington DC. After his transition, Jeff worked in public accounting and auditing for 12 years and began starting IT auditing practices and SOC practices at large accounting firms. </p>
<p>While working at a cybersecurity firm, Jeff met his co-founder AJ Yawn. The two worked on numerous SOC engagements together - which gave them the confidence to scale their ideas and efforts to make compliance suck less. Despite 2020 being the beginning of a global pandemic, the two decided to persevere and form their company ByteChek.</p>
<p>As the episode progresses, Jeff describes his partnership with AJ as dynamic and fluid. Jeff brings to the table a deep understanding of accounting and auditing challenges and solutions. Jeff admires AJ’s ability to be a leader and rally the troops to ensure everyone is moving in the right direction. Besides complimenting each other’s strengths and weaknesses, Jeff and AJ are also great friends and check-in together to help each other grow personally outside of work.</p>
<p>Jeff describes his superpower as his ability to work under pressure. When there’s deadlines and a surplus of work, Jeff leans on his experience as an accountant. While working as an accountant, each year in January through April (tax season) Jeff had to practice his discipline of working under pressure with clear deadlines from his clients and the government. Additionally, Jeff has spent years practicing martial arts, and describes it as a great technique to use to clear his mind in all situations.</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - Welcome back to the Hacker Valley Studio</p>
<p>1:41 - This episode features Jeff Cook, Co-Founder, and CFO of ByteChek</p>
<p>2:26 - Jeff’s background and start in accounting and auditing</p>
<p>5:08 - Thriving in business as a founder during a global pandemic</p>
<p>8:31 - Jeff’s superpower and where it began</p>
<p>11:16 - How to overcome your kryptonite and core emotional challenge</p>
<p>13:58 - How martial arts has helped Jeff as a practitioner</p>
<p>17:48 - Parallels between cybersecurity, chess, and martial arts</p>
<p>21:21 - Getting comfortable with discomfort</p>
<p>28:14 - Wisdom from Jeff for leveling up as a entrepreneur and practitioner</p>
<p> </p>
<p>Links:</p>
<p>Learn more about <a href='https://www.linkedin.com/in/jeffcookcpa/'>Jeff Cook</a> and connect with him on LinkedIn.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3b48k3/Jeff_Cook_Final_Mixv29o6pz.mp3" length="33096142" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this featured episode of Hacker Valley Studio podcast, Ron and Chris are joined by Jeff Cook, Co-Founder, and CFO of ByteChek. Jeff has over 10 years of experience in both accounting and auditing and has set out a mission to “make compliance suck less”
Jeff began his career at accounting firm, Arthur Andersen. In 2002, the firm surrendered it’s license to practice as a CPA which forced Jeff to consider working at other firms. This surprise turned out to be a blessing as it made him transition from New York to Washington DC. After his transition, Jeff worked in public accounting and auditing for 12 years and began starting IT auditing practices and SOC practices at large accounting firms. 
While working at a cybersecurity firm, Jeff met his co-founder AJ Yawn. The two worked on numerous SOC engagements together - which gave them the confidence to scale their ideas and efforts to make compliance suck less. Despite 2020 being the beginning of a global pandemic, the two decided to persevere and form their company ByteChek.
As the episode progresses, Jeff describes his partnership with AJ as dynamic and fluid. Jeff brings to the table a deep understanding of accounting and auditing challenges and solutions. Jeff admires AJ’s ability to be a leader and rally the troops to ensure everyone is moving in the right direction. Besides complimenting each other’s strengths and weaknesses, Jeff and AJ are also great friends and check-in together to help each other grow personally outside of work.
Jeff describes his superpower as his ability to work under pressure. When there’s deadlines and a surplus of work, Jeff leans on his experience as an accountant. While working as an accountant, each year in January through April (tax season) Jeff had to practice his discipline of working under pressure with clear deadlines from his clients and the government. Additionally, Jeff has spent years practicing martial arts, and describes it as a great technique to use to clear his mind in all situations.
 
Impactful Moments
0:00 - Welcome back to the Hacker Valley Studio
1:41 - This episode features Jeff Cook, Co-Founder, and CFO of ByteChek
2:26 - Jeff’s background and start in accounting and auditing
5:08 - Thriving in business as a founder during a global pandemic
8:31 - Jeff’s superpower and where it began
11:16 - How to overcome your kryptonite and core emotional challenge
13:58 - How martial arts has helped Jeff as a practitioner
17:48 - Parallels between cybersecurity, chess, and martial arts
21:21 - Getting comfortable with discomfort
28:14 - Wisdom from Jeff for leveling up as a entrepreneur and practitioner
 
Links:
Learn more about Jeff Cook and connect with him on LinkedIn.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek. ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2068</itunes:duration>
        <itunes:season>5</itunes:season>
        <itunes:episode>120</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>We Are Here Part 2: A Cyber Masterminds Discussion</title>
        <itunes:title>We Are Here Part 2: A Cyber Masterminds Discussion</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/we-are-here-part-2-a-cyber-masterminds-discussion/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/we-are-here-part-2-a-cyber-masterminds-discussion/#comments</comments>        <pubDate>Wed, 10 Feb 2021 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c5c4228f-cae8-3d86-b4e6-7e48959cab77</guid>
                                    <description><![CDATA[<p>Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in cybersecurity. In part two of this series, Ron and Chris host a mastermind conversation with Tia Hopkins, Charles Nwatu, AJ Yawn, and Kelvin Coleman. In this special conversation, we discuss ExIST, a framework to promote excellence in the pursuit of human endeavors like hobbies, careers, and finding purpose.</p>
Explore
<p>As humans, we’re always on the brink of discovery. Watching a documentary, witnessing someone perform a piece of art or a eureka moment might be all that it takes to pull you in a new direction to explore a new topic. Learning something new can be like stepping into a new world that you’ve never experienced. This leap can be exciting, scary, or even uneventful but always leads to discovery.</p>
<p> </p>
<p>Tia Hopkins began exploring technology since she can remember. One of her first memories of her interest in technology was when she noticed her mom stopped buying her toys because she would take them apart to understand how they worked. Tia took a giant leap into the new world of technology when she took apart her family and realized that she had to put it back together before her mom found out. Tia has explored many facets of technology from working with Internet Service Providers, IT teams, and Managed Detection and Response teams.</p>
Immerse
<p>After deciding which world to ExIST in, the next step to understanding and mastery is immersion. This is surrounding yourself in a new topic or idea and learning what it means to succeed in that arena. In sports, this might be watching a professional game and learning more about the rules. In cybersecurity, immersion may be reading blogs on the topic or watching YouTube videos that explain a focus area. While immersing yourself in this world you’ll identify the mindset needed to remain there and grow.</p>
<p> </p>
<p>Charles Nwatu’s advice on immersion is to not be afraid to fail - It's the only way you succeed. Not giving yourself the opportunity to take the shot is even worse than failure itself. Learn how to consume content in any way that works best for you - read, listen, watch everything you possibly can. Identify ways that help you articulate what you’ve learned to others.</p>
Study
<p>After learning the rules and where the boundaries exist in the new world, the next step is to study. Using tools, knowledge, examples and mentors to improve your capabilities. If you’re learning about a topic with subtopics, you may need to re-immerse yourself in areas that you’re weak on. In this phase of the framework, you're using your new capabilities to rapidly learn and improve.</p>
<p> </p>
<p>AJ Yawn provides the advice of staying focused and ignoring the results. To Focus AJ often implements the  90-90-1 rule. And it's taking 90 days spending the first 90 minutes of your day, focusing on ONE thing. Whenever AJ is trying out a new endeavour he ignores the results for the first 90 days, even if there’s no visible improvements. When picking up anything new the focus should be on the attempt rather than the outcome.</p>
Translate / Transform 
<p>Translation is expressing the sense of wisdom into language. During this part of the ExIST framework, you’re using the collection of experience and wisdom to create, innovate, or teach. Taking your developed ability and bettering the lives of others.</p>
<p> </p>
<p>Kelvin Coleman has always been an advocate of teaching others and promoting the people in the cybersecurity industry. Kelvin can recall researching and reciting state capitals that he’d take to his meetings to build a rapport with city and state government stakeholders. While the name of a state capital or mascot may not seem critical, it helped his customers understand that he does the research and cares about doing what is best for everyone.</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - We Are Here a series exploring black excellence in cybersecurity</p>
<p>1:13 - Kelvin Coleman, the strategic mastermind</p>
<p>1:50 - Tia Hopkins, the technical juggernaut</p>
<p>2:25 - Charles Nwatu, the wise warrior</p>
<p>3:00 - AJ Yawn, the empathetic CEO</p>
<p>4:28 - ExIST, a framework to promote excellence</p>
<p>5:40 - Explore</p>
<p>22:14 - Immerse</p>
<p>56:09 - Study</p>
<p>1:10:10 - Translate/Transform</p>
<p>1:20:12 - Sage wisdom from our mastermind group</p>
<p>1:25:20 - How to keep in touch with our amazing guests</p>
<p> </p>
<p>Stay In Touch Kelvin Coleman on <a href='https://www.linkedin.com/in/kelvin-coleman/'>LinkedIn</a></p>
<p>Connect with Tia Hopkins on <a href='https://www.linkedin.com/in/yatiahopkins/'>LinkedIn</a> and <a href='https://www.empowhercybersecurity.org/'>Empow(her) Cybersecurity</a></p>
<p>Follow Charles Nwatu on <a href='https://www.linkedin.com/in/cnwatu/'>LinkedIn</a></p>
<p>Stay connected with AJ Yawn on <a href='https://www.linkedin.com/in/ajyawn/'>LinkedIn</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p> </p>
<p>Get your start in cybersecurity with SANS through their Diversity Cyber Academy!
Applications are now open, and SANS is looking for the best and brightest to diversify the field! The
SANS ICMCP Diversity Cyber Academy is available for current college students, college graduates, and
career changers who are not already working in cybersecurity.
Those interested can go to sans.org/dca or if you’d like to learn more about what SANS is doing on the
Diversity and Inclusion front please visit https://www.sans.org/about/diversity</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in cybersecurity. In part two of this series, Ron and Chris host a mastermind conversation with Tia Hopkins, Charles Nwatu, AJ Yawn, and Kelvin Coleman. In this special conversation, we discuss ExIST, a framework to promote excellence in the pursuit of human endeavors like hobbies, careers, and finding purpose.</p>
Explore
<p>As humans, we’re always on the brink of discovery. Watching a documentary, witnessing someone perform a piece of art or a eureka moment might be all that it takes to pull you in a new direction to explore a new topic. Learning something new can be like stepping into a new world that you’ve never experienced. This leap can be exciting, scary, or even uneventful but always leads to discovery.</p>
<p> </p>
<p>Tia Hopkins began exploring technology since she can remember. One of her first memories of her interest in technology was when she noticed her mom stopped buying her toys because she would take them apart to understand how they worked. Tia took a giant leap into the new world of technology when she took apart her family and realized that she had to put it back together before her mom found out. Tia has explored many facets of technology from working with Internet Service Providers, IT teams, and Managed Detection and Response teams.</p>
Immerse
<p>After deciding which world to ExIST in, the next step to understanding and mastery is immersion. This is surrounding yourself in a new topic or idea and learning what it means to succeed in that arena. In sports, this might be watching a professional game and learning more about the rules. In cybersecurity, immersion may be reading blogs on the topic or watching YouTube videos that explain a focus area. While immersing yourself in this world you’ll identify the mindset needed to remain there and grow.</p>
<p> </p>
<p>Charles Nwatu’s advice on immersion is to not be afraid to fail - It's the only way you succeed. Not giving yourself the opportunity to take the shot is even worse than failure itself. Learn how to consume content in any way that works best for you - read, listen, watch everything you possibly can. Identify ways that help you articulate what you’ve learned to others.</p>
Study
<p>After learning the rules and where the boundaries exist in the new world, the next step is to study. Using tools, knowledge, examples and mentors to improve your capabilities. If you’re learning about a topic with subtopics, you may need to re-immerse yourself in areas that you’re weak on. In this phase of the framework, you're using your new capabilities to rapidly learn and improve.</p>
<p> </p>
<p>AJ Yawn provides the advice of staying focused and ignoring the results. To Focus AJ often implements the  90-90-1 rule. And it's taking 90 days spending the first 90 minutes of your day, focusing on ONE thing. Whenever AJ is trying out a new endeavour he ignores the results for the first 90 days, even if there’s no visible improvements. When picking up anything new the focus should be on the attempt rather than the outcome.</p>
Translate / Transform 
<p>Translation is expressing the sense of wisdom into language. During this part of the ExIST framework, you’re using the collection of experience and wisdom to create, innovate, or teach. Taking your developed ability and bettering the lives of others.</p>
<p> </p>
<p>Kelvin Coleman has always been an advocate of teaching others and promoting the people in the cybersecurity industry. Kelvin can recall researching and reciting state capitals that he’d take to his meetings to build a rapport with city and state government stakeholders. While the name of a state capital or mascot may not seem critical, it helped his customers understand that he does the research and cares about doing what is best for everyone.</p>
<p> </p>
<p>Impactful Moments</p>
<p>0:00 - We Are Here a series exploring black excellence in cybersecurity</p>
<p>1:13 - Kelvin Coleman, the strategic mastermind</p>
<p>1:50 - Tia Hopkins, the technical juggernaut</p>
<p>2:25 - Charles Nwatu, the wise warrior</p>
<p>3:00 - AJ Yawn, the empathetic CEO</p>
<p>4:28 - ExIST, a framework to promote excellence</p>
<p>5:40 - Explore</p>
<p>22:14 - Immerse</p>
<p>56:09 - Study</p>
<p>1:10:10 - Translate/Transform</p>
<p>1:20:12 - Sage wisdom from our mastermind group</p>
<p>1:25:20 - How to keep in touch with our amazing guests</p>
<p> </p>
<p>Stay In Touch Kelvin Coleman on <a href='https://www.linkedin.com/in/kelvin-coleman/'>LinkedIn</a></p>
<p>Connect with Tia Hopkins on <a href='https://www.linkedin.com/in/yatiahopkins/'>LinkedIn</a> and <a href='https://www.empowhercybersecurity.org/'>Empow(her) Cybersecurity</a></p>
<p>Follow Charles Nwatu on <a href='https://www.linkedin.com/in/cnwatu/'>LinkedIn</a></p>
<p>Stay connected with AJ Yawn on <a href='https://www.linkedin.com/in/ajyawn/'>LinkedIn</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p> </p>
<p>Get your start in cybersecurity with SANS through their Diversity Cyber Academy!<br>
Applications are now open, and SANS is looking for the best and brightest to diversify the field! The<br>
SANS ICMCP Diversity Cyber Academy is available for current college students, college graduates, and<br>
career changers who are not already working in cybersecurity.<br>
Those interested can go to sans.org/dca or if you’d like to learn more about what SANS is doing on the<br>
Diversity and Inclusion front please visit https://www.sans.org/about/diversity</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7485qc/We_Are_Here_Part_2_Final_Mix_Revisedblmfd.mp3" length="84177024" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in cybersecurity. In part two of this series, Ron and Chris host a mastermind conversation with Tia Hopkins, Charles Nwatu, AJ Yawn, and Kelvin Coleman. In this special conversation, we discuss ExIST, a framework to promote excellence in the pursuit of human endeavors like hobbies, careers, and finding purpose.
Explore
As humans, we’re always on the brink of discovery. Watching a documentary, witnessing someone perform a piece of art or a eureka moment might be all that it takes to pull you in a new direction to explore a new topic. Learning something new can be like stepping into a new world that you’ve never experienced. This leap can be exciting, scary, or even uneventful but always leads to discovery.
 
Tia Hopkins began exploring technology since she can remember. One of her first memories of her interest in technology was when she noticed her mom stopped buying her toys because she would take them apart to understand how they worked. Tia took a giant leap into the new world of technology when she took apart her family and realized that she had to put it back together before her mom found out. Tia has explored many facets of technology from working with Internet Service Providers, IT teams, and Managed Detection and Response teams.
Immerse
After deciding which world to ExIST in, the next step to understanding and mastery is immersion. This is surrounding yourself in a new topic or idea and learning what it means to succeed in that arena. In sports, this might be watching a professional game and learning more about the rules. In cybersecurity, immersion may be reading blogs on the topic or watching YouTube videos that explain a focus area. While immersing yourself in this world you’ll identify the mindset needed to remain there and grow.
 
Charles Nwatu’s advice on immersion is to not be afraid to fail - It's the only way you succeed. Not giving yourself the opportunity to take the shot is even worse than failure itself. Learn how to consume content in any way that works best for you - read, listen, watch everything you possibly can. Identify ways that help you articulate what you’ve learned to others.
Study
After learning the rules and where the boundaries exist in the new world, the next step is to study. Using tools, knowledge, examples and mentors to improve your capabilities. If you’re learning about a topic with subtopics, you may need to re-immerse yourself in areas that you’re weak on. In this phase of the framework, you're using your new capabilities to rapidly learn and improve.
 
AJ Yawn provides the advice of staying focused and ignoring the results. To Focus AJ often implements the  90-90-1 rule. And it's taking 90 days spending the first 90 minutes of your day, focusing on ONE thing. Whenever AJ is trying out a new endeavour he ignores the results for the first 90 days, even if there’s no visible improvements. When picking up anything new the focus should be on the attempt rather than the outcome.
Translate / Transform 
Translation is expressing the sense of wisdom into language. During this part of the ExIST framework, you’re using the collection of experience and wisdom to create, innovate, or teach. Taking your developed ability and bettering the lives of others.
 
Kelvin Coleman has always been an advocate of teaching others and promoting the people in the cybersecurity industry. Kelvin can recall researching and reciting state capitals that he’d take to his meetings to build a rapport with city and state government stakeholders. While the name of a state capital or mascot may not seem critical, it helped his customers understand that he does the research and cares about doing what is best for everyone.
 
Impactful Moments
0:00 - We Are Here a series exploring black excellence in cybersecurity
1:13 - Kelvin Coleman, the strategic mastermind
1:50 - Tia Hopkins, the technical juggernaut
2:25 - Cha]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>5256</itunes:duration>
        <itunes:season>4</itunes:season>
        <itunes:episode>119</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>We Are Here Part 1: Patrice Washington</title>
        <itunes:title>We Are Here Part 1: Patrice Washington</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/we-are-here-part-1-patrice-washington/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/we-are-here-part-1-patrice-washington/#comments</comments>        <pubDate>Mon, 08 Feb 2021 10:03:05 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f5562a75-ce99-3e13-9d78-d7f47b8794cb</guid>
                                    <description><![CDATA[<p>Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in cybersecurity. in part one of this series, Ron and Chris interview Patrice Washington, one of the world's most popular podcasters and authors. This episode in the series is a story of ascension.</p>
<p>As we begin the episode Patrice mentions although she has a background in education, she’s here because of the hard work she put in during uncertain times and stepping into the unknown. </p>
<p>In 2009, Patrice was in her mid 20s and graduated from the University of Southern California with a business degree emphasizing entrepreneurial studies. During her senior year she started a real estate and mortgage brokerage and grew it to a seven figure business by 25. Everything changed for Patrice after becoming a mother and experiencing the housing crisis shortly after experiencing so much success. Between ages 25 to 28 years old, she went from seven figure business owner to being on the bathroom floor, bawling and snotting and crying scraping up change in couch cushions.</p>
<p>Patrice describes that “doing all the things”, “checking all the boxes”, or “being the one” is not the path to professional or financial success. From following her faith and reading scripture she was reminded, “What good is money in the hands of a fool if they have no desire to seek wisdom?”</p>
<p>Patrice had a lot of knowledge, information, education but I didn't have wisdom. Which is how to apply knowledge, when to apply education, and with whom to apply education. Since March, 2009 Patrice has been on a mission to go everywhere she can and teach others that the journey is not just about chasing money, it’s about seeking wisdom.</p>
<p>What helped turn around Patrice’s life was an unlikely encounter with blogging mothers at Starbucks that gave her the idea of sharing her story through blogs. She was instantly reminded of her first grade teacher. Patrice recalled Ms. Boynton saying, “Miss Cunningham, you know something, you have a responsibility. To share with your friends is not enough. You have to share what you know to everyone, so that everybody moves forward”. That’s what Patrice started to do with the blog, she began commitment to share everything that she has learned.</p>
<p>When Patrice began writing and speaking she began embracing her gifts. At the start of her career she was writing, speaking and educating others with real estate but later realized that her gift was in sharing information and teaching others in a broader way. Patrice began asking herself, “How can I feel the same joy I felt to help others get to the aha moment when buying a home but without the real estate transaction?”. She searched for answers and found examples but none done by a black woman. Though this was discouraging, there was enough supporting information to let her know that if she stepped into the unknown she’d define her own success.</p>
<p>Redefining your wealth and life is done through being intentional. It starts by doing what you adore and not being too tied with how much it pays. Setting intentions through your day, calendar, and time is a great place to start to begin understanding what you enjoy and what you can make into a career. Your career is not the only aspect of your life that generates wealth, your well-being is the vessel that guides you to wealth. Redefining your wealth and life means that you’re putting your health as a top priority.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>0:00 - Intro</p>
<p>0:52 - Patrice Washington on Hacker Valley Studio!</p>
<p>1:55 - Patrice’s background and dedication to hard work</p>
<p>6:04 - Going from seven figure business to zero and redefining wealth</p>
<p>9:47 - Identifying and applying purpose</p>
<p>15:08 - Dissolving the need for validation from others</p>
<p>20:32 - What others can do to disassociate their purpose from money</p>
<p>26:36 - Investing in your health NOW, not when you’re sick</p>
<p>31:15 - Advice for embarking on the journey of redefining wealth</p>
<p> </p>
<p>Pre-order <a href='https://www.amazon.com/dp/B08RSNZQ7M/ref=cm_sw_em_r_mt_dp_A206M6FFJ4JMHFCTXZ3D'>Redefine Wealth for Yourself: How to Stop Chasing Money and Finally Live Your Life's Purpose</a></p>
<p>Connect with Patrice Washington on <a href='https://www.linkedin.com/in/patricecunninghamwashington'>LinkedIn</a> and <a href='https://twitter.com/SeekWisdomPCW'>Twitter</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in cybersecurity. in part one of this series, Ron and Chris interview Patrice Washington, one of the world's most popular podcasters and authors. This episode in the series is a story of ascension.</p>
<p>As we begin the episode Patrice mentions although she has a background in education, she’s here because of the hard work she put in during uncertain times and stepping into the unknown. </p>
<p>In 2009, Patrice was in her mid 20s and graduated from the University of Southern California with a business degree emphasizing entrepreneurial studies. During her senior year she started a real estate and mortgage brokerage and grew it to a seven figure business by 25. Everything changed for Patrice after becoming a mother and experiencing the housing crisis shortly after experiencing so much success. Between ages 25 to 28 years old, she went from seven figure business owner to being on the bathroom floor, bawling and snotting and crying scraping up change in couch cushions.</p>
<p>Patrice describes that “doing all the things”, “checking all the boxes”, or “being the one” is not the path to professional or financial success. From following her faith and reading scripture she was reminded, “What good is money in the hands of a fool if they have no desire to seek wisdom?”</p>
<p>Patrice had a lot of knowledge, information, education but I didn't have wisdom. Which is how to apply knowledge, when to apply education, and with whom to apply education. Since March, 2009 Patrice has been on a mission to go everywhere she can and teach others that the journey is not just about chasing money, it’s about seeking wisdom.</p>
<p>What helped turn around Patrice’s life was an unlikely encounter with blogging mothers at Starbucks that gave her the idea of sharing her story through blogs. She was instantly reminded of her first grade teacher. Patrice recalled Ms. Boynton saying, “Miss Cunningham, you know something, you have a responsibility. To share with your friends is not enough. You have to share what you know to everyone, so that everybody moves forward”. That’s what Patrice started to do with the blog, she began commitment to share everything that she has learned.</p>
<p>When Patrice began writing and speaking she began embracing her gifts. At the start of her career she was writing, speaking and educating others with real estate but later realized that her gift was in sharing information and teaching others in a broader way. Patrice began asking herself, “How can I feel the same joy I felt to help others get to the aha moment when buying a home but without the real estate transaction?”. She searched for answers and found examples but none done by a black woman. Though this was discouraging, there was enough supporting information to let her know that if she stepped into the unknown she’d define her own success.</p>
<p>Redefining your wealth and life is done through being intentional. It starts by doing what you adore and not being too tied with how much it pays. Setting intentions through your day, calendar, and time is a great place to start to begin understanding what you enjoy and what you can make into a career. Your career is not the only aspect of your life that generates wealth, your well-being is the vessel that guides you to wealth. Redefining your wealth and life means that you’re putting your health as a top priority.</p>
<p> </p>
<p>Impactful Moments:</p>
<p>0:00 - Intro</p>
<p>0:52 - Patrice Washington on Hacker Valley Studio!</p>
<p>1:55 - Patrice’s background and dedication to hard work</p>
<p>6:04 - Going from seven figure business to zero and redefining wealth</p>
<p>9:47 - Identifying and applying purpose</p>
<p>15:08 - Dissolving the need for validation from others</p>
<p>20:32 - What others can do to disassociate their purpose from money</p>
<p>26:36 - Investing in your health NOW, not when you’re sick</p>
<p>31:15 - Advice for embarking on the journey of redefining wealth</p>
<p> </p>
<p>Pre-order <a href='https://www.amazon.com/dp/B08RSNZQ7M/ref=cm_sw_em_r_mt_dp_A206M6FFJ4JMHFCTXZ3D'>Redefine Wealth for Yourself: How to Stop Chasing Money and Finally Live Your Life's Purpose</a></p>
<p>Connect with Patrice Washington on <a href='https://www.linkedin.com/in/patricecunninghamwashington'>LinkedIn</a> and <a href='https://twitter.com/SeekWisdomPCW'>Twitter</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/inp7ve/Patrice_Final_Mix_We_Are_Here9d5e1.mp3" length="32225533" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hacker Valley Studio presents: We Are Here - an audio journey and series exploring black excellence in cybersecurity. in part one of this series, Ron and Chris interview Patrice Washington, one of the world's most popular podcasters and authors. This episode in the series is a story of ascension.
As we begin the episode Patrice mentions although she has a background in education, she’s here because of the hard work she put in during uncertain times and stepping into the unknown. 
In 2009, Patrice was in her mid 20s and graduated from the University of Southern California with a business degree emphasizing entrepreneurial studies. During her senior year she started a real estate and mortgage brokerage and grew it to a seven figure business by 25. Everything changed for Patrice after becoming a mother and experiencing the housing crisis shortly after experiencing so much success. Between ages 25 to 28 years old, she went from seven figure business owner to being on the bathroom floor, bawling and snotting and crying scraping up change in couch cushions.
Patrice describes that “doing all the things”, “checking all the boxes”, or “being the one” is not the path to professional or financial success. From following her faith and reading scripture she was reminded, “What good is money in the hands of a fool if they have no desire to seek wisdom?”
Patrice had a lot of knowledge, information, education but I didn't have wisdom. Which is how to apply knowledge, when to apply education, and with whom to apply education. Since March, 2009 Patrice has been on a mission to go everywhere she can and teach others that the journey is not just about chasing money, it’s about seeking wisdom.
What helped turn around Patrice’s life was an unlikely encounter with blogging mothers at Starbucks that gave her the idea of sharing her story through blogs. She was instantly reminded of her first grade teacher. Patrice recalled Ms. Boynton saying, “Miss Cunningham, you know something, you have a responsibility. To share with your friends is not enough. You have to share what you know to everyone, so that everybody moves forward”. That’s what Patrice started to do with the blog, she began commitment to share everything that she has learned.
When Patrice began writing and speaking she began embracing her gifts. At the start of her career she was writing, speaking and educating others with real estate but later realized that her gift was in sharing information and teaching others in a broader way. Patrice began asking herself, “How can I feel the same joy I felt to help others get to the aha moment when buying a home but without the real estate transaction?”. She searched for answers and found examples but none done by a black woman. Though this was discouraging, there was enough supporting information to let her know that if she stepped into the unknown she’d define her own success.
Redefining your wealth and life is done through being intentional. It starts by doing what you adore and not being too tied with how much it pays. Setting intentions through your day, calendar, and time is a great place to start to begin understanding what you enjoy and what you can make into a career. Your career is not the only aspect of your life that generates wealth, your well-being is the vessel that guides you to wealth. Redefining your wealth and life means that you’re putting your health as a top priority.
 
Impactful Moments:
0:00 - Intro
0:52 - Patrice Washington on Hacker Valley Studio!
1:55 - Patrice’s background and dedication to hard work
6:04 - Going from seven figure business to zero and redefining wealth
9:47 - Identifying and applying purpose
15:08 - Dissolving the need for validation from others
20:32 - What others can do to disassociate their purpose from money
26:36 - Investing in your health NOW, not when you’re sick
31:15 - Advice for embarking on the journey of redefining wealth
 
Pre-order Redefine Wealth for Yourself: How to Stop Chasing Mo]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2009</itunes:duration>
        <itunes:season>4</itunes:season>
        <itunes:episode>118</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 117 - Technically Unstoppable with Tia Hopkins</title>
        <itunes:title>Episode 117 - Technically Unstoppable with Tia Hopkins</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-117-technically-unstoppable-with-tia-hopkins/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-117-technically-unstoppable-with-tia-hopkins/#comments</comments>        <pubDate>Mon, 01 Feb 2021 12:20:24 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/de634a3f-3841-3484-8563-c40b119aa777</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Tia Hopkins, Founder of Empow(H)er Cybersecurity with the focus of empowering mentoring, educating, and providing opportunities for women of color. Tia is also VP, Global Solutions Engineering at eSentire.</p>
<p>The episode begins by Tia describing her early interests in technology. She began exploring her interest by taking apart her family computer - After her mom found out that she disassembled the computer, she quickly learned that she had to reassemble it before there were consequences. Early in Tia’s career she worked at phone companies installing DSL, IT operations, and managing technology focused teams. Tia has always been a doer and problem solver which led to resistance when first being called to become a leader. She was initially concerned that if she wasn’t hands-on with technical issues that she wouldn’t be as effective as a leader. However, she discovered that as a leader she can leverage her experience to have a broader impact through her team. </p>
<p>As the episode progresses, the cast chat about “Happy Accidents”. Tia had the opportunity to get involved with the Social Movement project by a coincidental conversation with a stranger at a cybersecurity conference many years ago. The premise of the project is 4 days to change the world. Tia’s challenge during the project was to solve racism issues by bringing brilliant minds together. Tia mentions that the challenge is a tall order but great minds in the world can solve any problem.</p>
<p>During COVID-19, a lot has changed for Hacker Valley Studio - Ron and Chris used to record in the same studio but now record separately due to the lockdown. Despite this difference in production, HVS has been able to scale and grow by dividing and conquering tasks. Tia can relate to this sentiment because without COVID-19 she likely would have not started Empow(H)er Cybersecurity. In addition to starting her foundation, Tia has also started a PhD program. When asked her about her superpower, Tia describes her ability to get things done. As a former athlete, Tia has a growth mindset and is determined to accomplish her goals.</p>
<p> </p>
<p>Meaningful moments in the podcast:</p>
<p>0:00 - Intro</p>
<p>1:51 - Tia Hopkins on Hacker Valley Studio Podcast</p>
<p>2:39 - Tia’s background and start in technology</p>
<p>4:24 - Tia’s perspective on being a leader</p>
<p>7:17 - Induction in the American Football Hall of Fame</p>
<p>9:01 - Social Movement Season 2</p>
<p>14:30 - Developing and working on your craft</p>
<p>16:50 - What has changed since COVID-19</p>
<p>19:00 - Tia’s Superpower</p>
<p>24:13 - Personal resiliency techniques</p>
<p>28:47 - How to stay in touch with Tia Hopkins</p>
<p> </p>
<p>Links:</p>
<p>Connect with Tia Hopkins on <a href='https://www.linkedin.com/in/yatiahopkins/'>LinkedIn</a>.</p>
<p>Follow Empow(H)er Cybersecurity on <a href='https://twitter.com/empowhercyber'>Twitter</a> and <a href='https://www.linkedin.com/company/empowhercyber/'>LinkedIn</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a>. </p>
<p>




</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Tia Hopkins, Founder of Empow(H)er Cybersecurity with the focus of empowering mentoring, educating, and providing opportunities for women of color. Tia is also VP, Global Solutions Engineering at eSentire.</p>
<p>The episode begins by Tia describing her early interests in technology. She began exploring her interest by taking apart her family computer - After her mom found out that she disassembled the computer, she quickly learned that she had to reassemble it before there were consequences. Early in Tia’s career she worked at phone companies installing DSL, IT operations, and managing technology focused teams. Tia has always been a doer and problem solver which led to resistance when first being called to become a leader. She was initially concerned that if she wasn’t hands-on with technical issues that she wouldn’t be as effective as a leader. However, she discovered that as a leader she can leverage her experience to have a broader impact through her team. </p>
<p>As the episode progresses, the cast chat about “Happy Accidents”. Tia had the opportunity to get involved with the Social Movement project by a coincidental conversation with a stranger at a cybersecurity conference many years ago. The premise of the project is 4 days to change the world. Tia’s challenge during the project was to solve racism issues by bringing brilliant minds together. Tia mentions that the challenge is a tall order but great minds in the world can solve any problem.</p>
<p>During COVID-19, a lot has changed for Hacker Valley Studio - Ron and Chris used to record in the same studio but now record separately due to the lockdown. Despite this difference in production, HVS has been able to scale and grow by dividing and conquering tasks. Tia can relate to this sentiment because without COVID-19 she likely would have not started Empow(H)er Cybersecurity. In addition to starting her foundation, Tia has also started a PhD program. When asked her about her superpower, Tia describes her ability to get things done. As a former athlete, Tia has a growth mindset and is determined to accomplish her goals.</p>
<p> </p>
<p>Meaningful moments in the podcast:</p>
<p>0:00 - Intro</p>
<p>1:51 - Tia Hopkins on Hacker Valley Studio Podcast</p>
<p>2:39 - Tia’s background and start in technology</p>
<p>4:24 - Tia’s perspective on being a leader</p>
<p>7:17 - Induction in the American Football Hall of Fame</p>
<p>9:01 - Social Movement Season 2</p>
<p>14:30 - Developing and working on your craft</p>
<p>16:50 - What has changed since COVID-19</p>
<p>19:00 - Tia’s Superpower</p>
<p>24:13 - Personal resiliency techniques</p>
<p>28:47 - How to stay in touch with Tia Hopkins</p>
<p> </p>
<p>Links:</p>
<p>Connect with Tia Hopkins on <a href='https://www.linkedin.com/in/yatiahopkins/'>LinkedIn</a>.</p>
<p>Follow Empow(H)er Cybersecurity on <a href='https://twitter.com/empowhercyber'>Twitter</a> and <a href='https://www.linkedin.com/company/empowhercyber/'>LinkedIn</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://attackiq.com/'>AttackIQ</a>. </p>
<p><br>
<br>
<br>
<br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gf7zuf/Tia_Final_Mix8itpg.mp3" length="28486656" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Tia Hopkins, Founder of Empow(H)er Cybersecurity with the focus of empowering mentoring, educating, and providing opportunities for women of color. Tia is also VP, Global Solutions Engineering at eSentire.
The episode begins by Tia describing her early interests in technology. She began exploring her interest by taking apart her family computer - After her mom found out that she disassembled the computer, she quickly learned that she had to reassemble it before there were consequences. Early in Tia’s career she worked at phone companies installing DSL, IT operations, and managing technology focused teams. Tia has always been a doer and problem solver which led to resistance when first being called to become a leader. She was initially concerned that if she wasn’t hands-on with technical issues that she wouldn’t be as effective as a leader. However, she discovered that as a leader she can leverage her experience to have a broader impact through her team. 
As the episode progresses, the cast chat about “Happy Accidents”. Tia had the opportunity to get involved with the Social Movement project by a coincidental conversation with a stranger at a cybersecurity conference many years ago. The premise of the project is 4 days to change the world. Tia’s challenge during the project was to solve racism issues by bringing brilliant minds together. Tia mentions that the challenge is a tall order but great minds in the world can solve any problem.
During COVID-19, a lot has changed for Hacker Valley Studio - Ron and Chris used to record in the same studio but now record separately due to the lockdown. Despite this difference in production, HVS has been able to scale and grow by dividing and conquering tasks. Tia can relate to this sentiment because without COVID-19 she likely would have not started Empow(H)er Cybersecurity. In addition to starting her foundation, Tia has also started a PhD program. When asked her about her superpower, Tia describes her ability to get things done. As a former athlete, Tia has a growth mindset and is determined to accomplish her goals.
 
Meaningful moments in the podcast:
0:00 - Intro
1:51 - Tia Hopkins on Hacker Valley Studio Podcast
2:39 - Tia’s background and start in technology
4:24 - Tia’s perspective on being a leader
7:17 - Induction in the American Football Hall of Fame
9:01 - Social Movement Season 2
14:30 - Developing and working on your craft
16:50 - What has changed since COVID-19
19:00 - Tia’s Superpower
24:13 - Personal resiliency techniques
28:47 - How to stay in touch with Tia Hopkins
 
Links:
Connect with Tia Hopkins on LinkedIn.
Follow Empow(H)er Cybersecurity on Twitter and LinkedIn
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor AttackIQ. 
]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1776</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>117</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 116 - Start-Up Secure with Chris Castaldo</title>
        <itunes:title>Episode 116 - Start-Up Secure with Chris Castaldo</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-116-start-up-secure-with-chris-castaldo/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-116-start-up-secure-with-chris-castaldo/#comments</comments>        <pubDate>Tue, 26 Jan 2021 10:00:08 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/07e873ed-d12c-3828-b2c2-f63371ed96c7</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Chris Castaldo, Chief Information Security Officer at Crossbeam and author of Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit. Throughout his career, Chris noticed that the same cybersecurity related problems surface but there are many different ways to solve them.</p>
<p>Chris has always been passionate about startups and has plans to one day start his own company. While going through lists of top 10 books for startups and entrepreneurs he didn’t find any that mentioned how to do cybersecurity at a startup. This a significant gap for startups, not baking in cybersecurity early results in expensive rework 4-10 years after the startup is founded. This led to Chris writing Startup Secure - his goal was to create a guide and methodology for startup founders to avoid the expensive mistake of not baking cybersecurity into the startup in the beginning.</p>
<p>As the episode progresses, Chris highlights the difference in challenges for startups that are B2B (Business-to-Business) vs B2C (Business-to-Consumer). Cybersecurity startups must weigh the risks of building a product and building a secure company. It’s easier to implement all of the security controls offered by a solution when the startup is 20 employees or less because there is less impact on users and business functions. When cybersecurity startups are selling to organizations with cybersecurity teams, the startup is asked tough questions. For example:</p>
<ul><li style="font-weight:400;">What is your vendor review process?</li>
<li style="font-weight:400;">Is your startup leveraging cloud security controls?</li>
<li style="font-weight:400;">What is your privacy policy?</li>
</ul>
<p> </p>
<p>As a cybersecurity professional, Chris emphases the importance of networking with other professionals. There is an increase in virtual conferences and adoption of LinkedIn. Asking questions to the leaders in the field and providing mentorship to others both provide a significant impact while cultivating your career. Chris also highlights the importance of following up on conversations to build relationships and securing opportunities. </p>
<p>When transitioning from engineer to CISO, Chris found that being intentional and purposeful with his time was impactful in his transition. He developed these skills by reading books about stoicism. He found that focusing on “the right thing to do” was tough because of constant distractions but being purposeful was the solution to distraction. Instead of focusing on all the things that were on his plate he would break down his goals into smaller chunks and give them his undivided attention for a specific amount of time.</p>
<p> </p>
<p>Moments During This Podcast:</p>
<p>0:00 - Intro</p>
<p>1:57 - Chris Castaldo on Hacker Valley Studio Podcast</p>
<p>2:47 - Chris’ start in cybersecurity as a red team member</p>
<p>3:50 - Why did Chris write his book Startup Secure</p>
<p>6:58 - Challenges of implementing cybersecurity at a startup</p>
<p>9:56 - What excites Chris about cybersecurity</p>
<p>13:35 - How do you immerse yourself in learning about cybersecurity?</p>
<p>17:33 - Surprises when transitioning from engineer to CISO</p>
<p>22:43 - Core tenants of solving hard problems</p>
<p>25:53 - Protecting the crown jewels at an organization during a breach</p>
<p>33:38 - Advice on sharing knowledge with the world</p>
<p> </p>
<p>Links:</p>
<p>Pre-order <a href='https://www.amazon.com/Start-Up-Secure-Cybersecurity-Company-Founding/dp/1119700736'>Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit</a></p>
<p>Learn more about <a href='https://www.linkedin.com/in/chriscastaldo/'>Chris Castaldo</a> and connect with him on LinkedIn.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Chris Castaldo, Chief Information Security Officer at Crossbeam and author of Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit. Throughout his career, Chris noticed that the same cybersecurity related problems surface but there are many different ways to solve them.</p>
<p>Chris has always been passionate about startups and has plans to one day start his own company. While going through lists of top 10 books for startups and entrepreneurs he didn’t find any that mentioned how to do cybersecurity at a startup. This a significant gap for startups, not baking in cybersecurity early results in expensive rework 4-10 years after the startup is founded. This led to Chris writing Startup Secure - his goal was to create a guide and methodology for startup founders to avoid the expensive mistake of not baking cybersecurity into the startup in the beginning.</p>
<p>As the episode progresses, Chris highlights the difference in challenges for startups that are B2B (Business-to-Business) vs B2C (Business-to-Consumer). Cybersecurity startups must weigh the risks of building a product and building a secure company. It’s easier to implement all of the security controls offered by a solution when the startup is 20 employees or less because there is less impact on users and business functions. When cybersecurity startups are selling to organizations with cybersecurity teams, the startup is asked tough questions. For example:</p>
<ul><li style="font-weight:400;">What is your vendor review process?</li>
<li style="font-weight:400;">Is your startup leveraging cloud security controls?</li>
<li style="font-weight:400;">What is your privacy policy?</li>
</ul>
<p> </p>
<p>As a cybersecurity professional, Chris emphases the importance of networking with other professionals. There is an increase in virtual conferences and adoption of LinkedIn. Asking questions to the leaders in the field and providing mentorship to others both provide a significant impact while cultivating your career. Chris also highlights the importance of following up on conversations to build relationships and securing opportunities. </p>
<p>When transitioning from engineer to CISO, Chris found that being intentional and purposeful with his time was impactful in his transition. He developed these skills by reading books about stoicism. He found that focusing on “the right thing to do” was tough because of constant distractions but being purposeful was the solution to distraction. Instead of focusing on all the things that were on his plate he would break down his goals into smaller chunks and give them his undivided attention for a specific amount of time.</p>
<p> </p>
<p>Moments During This Podcast:</p>
<p>0:00 - Intro</p>
<p>1:57 - Chris Castaldo on Hacker Valley Studio Podcast</p>
<p>2:47 - Chris’ start in cybersecurity as a red team member</p>
<p>3:50 - Why did Chris write his book Startup Secure</p>
<p>6:58 - Challenges of implementing cybersecurity at a startup</p>
<p>9:56 - What excites Chris about cybersecurity</p>
<p>13:35 - How do you immerse yourself in learning about cybersecurity?</p>
<p>17:33 - Surprises when transitioning from engineer to CISO</p>
<p>22:43 - Core tenants of solving hard problems</p>
<p>25:53 - Protecting the crown jewels at an organization during a breach</p>
<p>33:38 - Advice on sharing knowledge with the world</p>
<p> </p>
<p>Links:</p>
<p>Pre-order <a href='https://www.amazon.com/Start-Up-Secure-Cybersecurity-Company-Founding/dp/1119700736'>Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit</a></p>
<p>Learn more about <a href='https://www.linkedin.com/in/chriscastaldo/'>Chris Castaldo</a> and connect with him on LinkedIn.</p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ak6p9s/Chris_Castaldo_Final_Mixbiml0.mp3" length="34488960" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Chris Castaldo, Chief Information Security Officer at Crossbeam and author of Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit. Throughout his career, Chris noticed that the same cybersecurity related problems surface but there are many different ways to solve them.
Chris has always been passionate about startups and has plans to one day start his own company. While going through lists of top 10 books for startups and entrepreneurs he didn’t find any that mentioned how to do cybersecurity at a startup. This a significant gap for startups, not baking in cybersecurity early results in expensive rework 4-10 years after the startup is founded. This led to Chris writing Startup Secure - his goal was to create a guide and methodology for startup founders to avoid the expensive mistake of not baking cybersecurity into the startup in the beginning.
As the episode progresses, Chris highlights the difference in challenges for startups that are B2B (Business-to-Business) vs B2C (Business-to-Consumer). Cybersecurity startups must weigh the risks of building a product and building a secure company. It’s easier to implement all of the security controls offered by a solution when the startup is 20 employees or less because there is less impact on users and business functions. When cybersecurity startups are selling to organizations with cybersecurity teams, the startup is asked tough questions. For example:
What is your vendor review process?
Is your startup leveraging cloud security controls?
What is your privacy policy?
 
As a cybersecurity professional, Chris emphases the importance of networking with other professionals. There is an increase in virtual conferences and adoption of LinkedIn. Asking questions to the leaders in the field and providing mentorship to others both provide a significant impact while cultivating your career. Chris also highlights the importance of following up on conversations to build relationships and securing opportunities. 
When transitioning from engineer to CISO, Chris found that being intentional and purposeful with his time was impactful in his transition. He developed these skills by reading books about stoicism. He found that focusing on “the right thing to do” was tough because of constant distractions but being purposeful was the solution to distraction. Instead of focusing on all the things that were on his plate he would break down his goals into smaller chunks and give them his undivided attention for a specific amount of time.
 
Moments During This Podcast:
0:00 - Intro
1:57 - Chris Castaldo on Hacker Valley Studio Podcast
2:47 - Chris’ start in cybersecurity as a red team member
3:50 - Why did Chris write his book Startup Secure
6:58 - Challenges of implementing cybersecurity at a startup
9:56 - What excites Chris about cybersecurity
13:35 - How do you immerse yourself in learning about cybersecurity?
17:33 - Surprises when transitioning from engineer to CISO
22:43 - Core tenants of solving hard problems
25:53 - Protecting the crown jewels at an organization during a breach
33:38 - Advice on sharing knowledge with the world
 
Links:
Pre-order Start-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit
Learn more about Chris Castaldo and connect with him on LinkedIn.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek. ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2151</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>116</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 115  - Podcast Takeover with Carole Theriault</title>
        <itunes:title>Episode 115  - Podcast Takeover with Carole Theriault</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-115-podcast-takeover-with-carole-theriault/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-115-podcast-takeover-with-carole-theriault/#comments</comments>        <pubDate>Wed, 20 Jan 2021 08:54:18 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/768e1982-1bd8-31d6-b07c-b35deecaf1d5</guid>
                                    <description><![CDATA[<p>The tables have turned on Ron and Chris this episode and they are interviewed by guest host, Carole Theriault! Besides being a two-time guest on the Hacker Valley Studio Podcast, Carole is producer and host of the Smashing Security Podcast and Sticky Pickles podcast. Carole put together 7 serious questions and 7 funny questions to interview Ron and Chris.</p>
<p> </p>
<p>Question #1 - How did you get into podcasting?</p>
<p>Ron - describes his entry into podcasting as a surprise. Ron had set up a studio at his home in San Jose, California with the intention to create YouTube videos. When Chris relocated to the area, he suggested that the two get on the microphones and have a conversation to see where it goes - Where the two began speaking about Cybersecurity Alchemy. </p>
<p>Chris - Before moving to Silicon Valley, Chris experimented with content creation on Instagram and worked with professionals to document his weight loss journey. This experiment went well but left Chris hoping to make a greater impact through content creation.</p>
<p> </p>
<p>Question #2 - What are the most surprising lessons you learned from podcasting</p>
<p>Carole begins by describing her most surprising lesson is the sheer amount of work.</p>
<p>Chris was surprised about all of the aspects that go into a quality production. For example, mastering the sound of the podcast.</p>
<p>Ron describes the most surprising lesson being the work that goes into show notes and the conversion of full-length topics into bite sized nuggets.</p>
<p> </p>
<p>Question #3 - What trait do you like most in your podcast partner</p>
<p>Ron - Chris’ accountability and availability. We meet together daily during the week to discuss goals, challenges, and collaboration opportunities. When help is needed, Chris is consistently there to help.</p>
<p>Chris - Ron’s calm, understated competitiveness nature. The competitive nature pushes both of us to get better everyday. </p>
<p> </p>
<p>Question #4 - What do you worry most about when creating an episode of Hacker Valley Studio?</p>
<p>Chris - Capturing great quality audio. During post-production, we can fix nearly everything like “ahs”, “ums”, awkward pauses but not poor quality audio. Carole can relate to this technical difficulty as she has experienced difficulties with hearing feedback from internal microphones on her podcasts</p>
<p>Ron - HVS has had over a hundred episodes and around 10% of the guests have never been on a podcast. When recording with the 10% that have not been on a podcast before Ron’s main goal and concern is to ensure that the guest is comfortable. Creating an environment where guests can share their story and as.king great questions creates raving fans of our content through our listeners and guests</p>
<p> </p>
<p>Question #5 - Who does more of the work on the podcast?</p>
<p>Ron - Chris is the GOAT for the HVS podcast. In the very beginning, Ron said that he did most of the work. In the beginning Ron was editing the video and audio for the podcast but at some point, Chris became curious about the audio editing process and fell in love with the process and built a strong foundation for rapidly increasing the quality of Hacker Valley Studio content.</p>
<p> </p>
<p>Follow up to Question #5 - Chris do you appreciate about Ron’s contribution to the podcast?</p>
<p>Chris - Our chemistry. Episode one shows our chemistry because even though we did not have any experience podcasting, we still had a great conversational flow. It didn’t take anytime for us to build this chemistry up because Ron is able to read expressions and see where I’m going with questions and answers. Ron has always been able to pick up where I left off and bring up topics that I may forget.</p>
<p> </p>
<p>Question #6 - Which episode of HVS sticks out most in your mind and why?</p>
<p>Chris - <a href='https://hackervalley.com/e/episode-40-lessons-in-humility-with-daniel-meade/'>Episode 40</a> with <a href='https://www.linkedin.com/in/daniel-meade-a9b142b/'>Daniel Meade</a>. This episode started out with us speaking with Daniel about AppSec but had many turns where we got to experience Daniel’s authentic humor and moments of growth throughout his life. This episode helped shape the future of Hacker Valley Studio.</p>
<p>Ron - <a href='https://hackervalley.com/e/episode-104-analyzing-the-enemy-with-robin-black/'>Episode 104</a> with <a href='https://www.linkedin.com/in/robin-black-31b6bb39/'>Robin Black</a>. This episode has very little connection with technology and cybersecurity but focuses on the auxiliary skills that make practitioners at any craft great. Robin is fascinated with his work and crossing the chasm to gain expertise from similar or related fields.</p>
<p> </p>
<p>Question #7 - What does success mean for Hacker Valley Studio?</p>
<p>Ron - Having fun during the process. Chris and I are extremely successful at this point because we’ve been enjoying creating the process everyday. We are lucky enough to speak to experts, work with vocal coaches, and learn how to make quality productions each week.</p>
<p>Chris - The impact on the listener. We’ve received emails and messages on social media from listeners that have thanked us for helping them get into cybersecurity and promoted within their field. We’ve been able to create our own journey and be part of others journeys.</p>
<p> </p>
<p>Moments During the Podcast</p>
<p> </p>
<p>0:00 - Intro</p>
<p>1:22 - Carole Theriault takes over Hacker Valley Studio! </p>
<p>2:50 - How Chris and Ron got into podcasting</p>
<p>5:06 - Would you rather be 8 foot tall or have eight feet?</p>
<p>5:55 - What are the most surprising lessons you learned from podcasting?</p>
<p>8:13 - If you were on a desert island, what luxury item would you bring?</p>
<p>9:10 - What trait do you like most in your podcast partner?</p>
<p>11:17 - What's your favorite thing to do outside of work and family responsibilities?</p>
<p>14:07 - What do you worry most about when creating an episode of Hacker Valley Studio?</p>
<p>18:55 - What is one thing any friend or family member could do to make you laugh or smile?</p>
<p>20:28 - Who does more of the work on Hacker Valley Studio podcast?</p>
<p>24:50 - Who would play you in a movie?</p>
<p>27:30 - Which episode of HVS sticks out most in your mind and why?</p>
<p>37:16 - How would you define success for Hacker Valley Studio?</p>
<p> </p>
<p>Links:</p>
<p>Our guest host <a href='https://twitter.com/caroletheriault'>Carole Theriault</a></p>
<p>Carole’s podcast - <a href='https://www.smashingsecurity.com/'>Smashing Security</a> and <a href='http://stickypickles.com'>Sticky Pickles</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The tables have turned on Ron and Chris this episode and they are interviewed by guest host, Carole Theriault! Besides being a two-time guest on the Hacker Valley Studio Podcast, Carole is producer and host of the Smashing Security Podcast and Sticky Pickles podcast. Carole put together 7 serious questions and 7 funny questions to interview Ron and Chris.</p>
<p> </p>
<p>Question #1 - How did you get into podcasting?</p>
<p>Ron - describes his entry into podcasting as a surprise. Ron had set up a studio at his home in San Jose, California with the intention to create YouTube videos. When Chris relocated to the area, he suggested that the two get on the microphones and have a conversation to see where it goes - Where the two began speaking about Cybersecurity Alchemy. </p>
<p>Chris - Before moving to Silicon Valley, Chris experimented with content creation on Instagram and worked with professionals to document his weight loss journey. This experiment went well but left Chris hoping to make a greater impact through content creation.</p>
<p> </p>
<p>Question #2 - What are the most surprising lessons you learned from podcasting</p>
<p>Carole begins by describing her most surprising lesson is the sheer amount of work.</p>
<p>Chris was surprised about all of the aspects that go into a quality production. For example, mastering the sound of the podcast.</p>
<p>Ron describes the most surprising lesson being the work that goes into show notes and the conversion of full-length topics into bite sized nuggets.</p>
<p> </p>
<p>Question #3 - What trait do you like most in your podcast partner</p>
<p>Ron - Chris’ accountability and availability. We meet together daily during the week to discuss goals, challenges, and collaboration opportunities. When help is needed, Chris is consistently there to help.</p>
<p>Chris - Ron’s calm, understated competitiveness nature. The competitive nature pushes both of us to get better everyday. </p>
<p> </p>
<p>Question #4 - What do you worry most about when creating an episode of Hacker Valley Studio?</p>
<p>Chris - Capturing great quality audio. During post-production, we can fix nearly everything like “ahs”, “ums”, awkward pauses but not poor quality audio. Carole can relate to this technical difficulty as she has experienced difficulties with hearing feedback from internal microphones on her podcasts</p>
<p>Ron - HVS has had over a hundred episodes and around 10% of the guests have never been on a podcast. When recording with the 10% that have not been on a podcast before Ron’s main goal and concern is to ensure that the guest is comfortable. Creating an environment where guests can share their story and as.king great questions creates raving fans of our content through our listeners and guests</p>
<p> </p>
<p>Question #5 - Who does more of the work on the podcast?</p>
<p>Ron - Chris is the GOAT for the HVS podcast. In the very beginning, Ron said that he did most of the work. In the beginning Ron was editing the video and audio for the podcast but at some point, Chris became curious about the audio editing process and fell in love with the process and built a strong foundation for rapidly increasing the quality of Hacker Valley Studio content.</p>
<p> </p>
<p>Follow up to Question #5 - Chris do you appreciate about Ron’s contribution to the podcast?</p>
<p>Chris - Our chemistry. Episode one shows our chemistry because even though we did not have any experience podcasting, we still had a great conversational flow. It didn’t take anytime for us to build this chemistry up because Ron is able to read expressions and see where I’m going with questions and answers. Ron has always been able to pick up where I left off and bring up topics that I may forget.</p>
<p> </p>
<p>Question #6 - Which episode of HVS sticks out most in your mind and why?</p>
<p>Chris - <a href='https://hackervalley.com/e/episode-40-lessons-in-humility-with-daniel-meade/'>Episode 40</a> with <a href='https://www.linkedin.com/in/daniel-meade-a9b142b/'>Daniel Meade</a>. This episode started out with us speaking with Daniel about AppSec but had many turns where we got to experience Daniel’s authentic humor and moments of growth throughout his life. This episode helped shape the future of Hacker Valley Studio.</p>
<p>Ron - <a href='https://hackervalley.com/e/episode-104-analyzing-the-enemy-with-robin-black/'>Episode 104</a> with <a href='https://www.linkedin.com/in/robin-black-31b6bb39/'>Robin Black</a>. This episode has very little connection with technology and cybersecurity but focuses on the auxiliary skills that make practitioners at any craft great. Robin is fascinated with his work and crossing the chasm to gain expertise from similar or related fields.</p>
<p> </p>
<p>Question #7 - What does success mean for Hacker Valley Studio?</p>
<p>Ron - Having fun during the process. Chris and I are extremely successful at this point because we’ve been enjoying creating the process everyday. We are lucky enough to speak to experts, work with vocal coaches, and learn how to make quality productions each week.</p>
<p>Chris - The impact on the listener. We’ve received emails and messages on social media from listeners that have thanked us for helping them get into cybersecurity and promoted within their field. We’ve been able to create our own journey and be part of others journeys.</p>
<p> </p>
<p>Moments During the Podcast</p>
<p> </p>
<p>0:00 - Intro</p>
<p>1:22 - Carole Theriault takes over Hacker Valley Studio! </p>
<p>2:50 - How Chris and Ron got into podcasting</p>
<p>5:06 - Would you rather be 8 foot tall or have eight feet?</p>
<p>5:55 - What are the most surprising lessons you learned from podcasting?</p>
<p>8:13 - If you were on a desert island, what luxury item would you bring?</p>
<p>9:10 - What trait do you like most in your podcast partner?</p>
<p>11:17 - What's your favorite thing to do outside of work and family responsibilities?</p>
<p>14:07 - What do you worry most about when creating an episode of Hacker Valley Studio?</p>
<p>18:55 - What is one thing any friend or family member could do to make you laugh or smile?</p>
<p>20:28 - Who does more of the work on Hacker Valley Studio podcast?</p>
<p>24:50 - Who would play you in a movie?</p>
<p>27:30 - Which episode of HVS sticks out most in your mind and why?</p>
<p>37:16 - How would you define success for Hacker Valley Studio?</p>
<p> </p>
<p>Links:</p>
<p>Our guest host <a href='https://twitter.com/caroletheriault'>Carole Theriault</a></p>
<p>Carole’s podcast - <a href='https://www.smashingsecurity.com/'>Smashing Security</a> and <a href='http://stickypickles.com'>Sticky Pickles</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4i4u8k/Carole_Hijack_Final_Mix7m7av.mp3" length="39822720" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The tables have turned on Ron and Chris this episode and they are interviewed by guest host, Carole Theriault! Besides being a two-time guest on the Hacker Valley Studio Podcast, Carole is producer and host of the Smashing Security Podcast and Sticky Pickles podcast. Carole put together 7 serious questions and 7 funny questions to interview Ron and Chris.
 
Question #1 - How did you get into podcasting?
Ron - describes his entry into podcasting as a surprise. Ron had set up a studio at his home in San Jose, California with the intention to create YouTube videos. When Chris relocated to the area, he suggested that the two get on the microphones and have a conversation to see where it goes - Where the two began speaking about Cybersecurity Alchemy. 
Chris - Before moving to Silicon Valley, Chris experimented with content creation on Instagram and worked with professionals to document his weight loss journey. This experiment went well but left Chris hoping to make a greater impact through content creation.
 
Question #2 - What are the most surprising lessons you learned from podcasting
Carole begins by describing her most surprising lesson is the sheer amount of work.
Chris was surprised about all of the aspects that go into a quality production. For example, mastering the sound of the podcast.
Ron describes the most surprising lesson being the work that goes into show notes and the conversion of full-length topics into bite sized nuggets.
 
Question #3 - What trait do you like most in your podcast partner
Ron - Chris’ accountability and availability. We meet together daily during the week to discuss goals, challenges, and collaboration opportunities. When help is needed, Chris is consistently there to help.
Chris - Ron’s calm, understated competitiveness nature. The competitive nature pushes both of us to get better everyday. 
 
Question #4 - What do you worry most about when creating an episode of Hacker Valley Studio?
Chris - Capturing great quality audio. During post-production, we can fix nearly everything like “ahs”, “ums”, awkward pauses but not poor quality audio. Carole can relate to this technical difficulty as she has experienced difficulties with hearing feedback from internal microphones on her podcasts
Ron - HVS has had over a hundred episodes and around 10% of the guests have never been on a podcast. When recording with the 10% that have not been on a podcast before Ron’s main goal and concern is to ensure that the guest is comfortable. Creating an environment where guests can share their story and as.king great questions creates raving fans of our content through our listeners and guests
 
Question #5 - Who does more of the work on the podcast?
Ron - Chris is the GOAT for the HVS podcast. In the very beginning, Ron said that he did most of the work. In the beginning Ron was editing the video and audio for the podcast but at some point, Chris became curious about the audio editing process and fell in love with the process and built a strong foundation for rapidly increasing the quality of Hacker Valley Studio content.
 
Follow up to Question #5 - Chris do you appreciate about Ron’s contribution to the podcast?
Chris - Our chemistry. Episode one shows our chemistry because even though we did not have any experience podcasting, we still had a great conversational flow. It didn’t take anytime for us to build this chemistry up because Ron is able to read expressions and see where I’m going with questions and answers. Ron has always been able to pick up where I left off and bring up topics that I may forget.
 
Question #6 - Which episode of HVS sticks out most in your mind and why?
Chris - Episode 40 with Daniel Meade. This episode started out with us speaking with Daniel about AppSec but had many turns where we got to experience Daniel’s authentic humor and moments of growth throughout his life. This episode helped shape the future of Hacker Valley Studio.
Ron - Episode 104 with Robin Black. This episode ha]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2484</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>115</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 114 -  The Good, Bad, and Ugly of Threat Intelligence with Patrick Coughlin</title>
        <itunes:title>Episode 114 -  The Good, Bad, and Ugly of Threat Intelligence with Patrick Coughlin</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-114-the-good-bad-and-ugly-of-threat-intelligence-with-patrick-coughlin/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-114-the-good-bad-and-ugly-of-threat-intelligence-with-patrick-coughlin/#comments</comments>        <pubDate>Tue, 12 Jan 2021 10:04:50 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/01512b1a-6a47-3e70-98a5-e25f197d0a1d</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Patrick Coughlin, Co-Founder and CEO of TruSTAR. Patrick began his career as a security analyst in Washington D.C. and the middle east. By working with government contractors, multinational corporations, and counter-terrorism units, Patrick learned that the biggest challenge that security analysts have is retrieving the needed information from disparate data sources. This discovery led Patrick to founding TruStar. Patrick’s focus is to help organizations automate the collection and curation of threat intelligence data.</p>
<p>Patrick’s analytical prowess originated from working at Booz Allen Hamilton where he learned a fundamental skill that all cybersecurity analysts should have - how to put together a slide deck. This skill helped Patrick articulate the importance of threat intelligence to leaders in the government and private sector. </p>
<p>As the episode progresses, Patrick details the differences between threat intelligence requirements for national security and enterprise. For enterprise threat intelligence programs, the goal is to accelerate automation of detection and rarely attribution. Patrick also mentions automation is only as effective as the data is cleaned, normalized, and prioritized. </p>
<p>What about the good, bad, and ugly of threat intelligence? Patrick describes that an organization can thrive by leveraging internal intelligence. This can be overlooked when organizations are fixated on buying threat data feeds and subscribing to ISAC feeds. Most enterprise organizations have a detection and response stack that is constantly providing information about threats relevant to their organization - which serves as great threat intelligence data.</p>
<p>Chris and Ron ask Patrick about the science vs art aspects of cybersecurity and threat intelligence. Patrick describes that there is room for both art and science in threat intelligence. While new concepts are being discovered, there is art in finding the needle in the haystack. However, at some point, intuition can be described into steps that a machine can repeat. For example, after years of analytical practice an analyst can describe how and why they are tagging threat intelligence related data in such a way that can be repeated by other analysts or automation. </p>
<p>This episode covers an abundance of tactics and techniques for threat intelligence analysts. Patrick describes the best place to begin automating threat intelligence is detection. An analyst can ask the question, “How do I get sources of known bad indicators into my detection stack so that I could drive high fidelity detections?”. As false positives decrease, your mean time to detection (MTTD) and resolution (MTTR) decrease which makes your threat intelligence and security operation team members more effective.</p>
<p> </p>
<p>0:00 - Intro</p>
<p>1:53 - This episode features Patrick Coughlin, Co-Founder and CEO of TruSTAR</p>
<p>2:30 - Patrick’s background and start as a security analyst</p>
<p>5:19 - How to automate threat intelligence while reducing analyst fatigue</p>
<p>7:05 - How Patrick cultivated his analyst prowess</p>
<p>8:43 - Articulating threat intelligence to government and enterprise organizations</p>
<p>11:09 - Can a threat intelligence program be automated?</p>
<p>17:21 - Patrick’s experience of “good” and “bad” threat intelligence programs</p>
<p>20:31 - Logic vs Intuition in threat intelligence</p>
<p>27:04 - Artificial Intelligence and Machine Learning to make threat intelligence decisions</p>
<p>28:42 - Where to start when automating threat intelligence</p>
<p>30:02 - How to stay in touch with Patrick Coughlin</p>
<p> </p>
<p>Links: </p>
<p>Connect with Patrick Coughlin on <a href='https://www.linkedin.com/in/patrickcoughlin1/'>LinkedIn</a></p>
<p>Link to Patrick’s company <a href='https://www.trustar.co/'>TruSTAR</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p>Take our FREE course for building threat intelligence programs by visiting <a href='http://www.hackervalley.com/easy'>www.hackervalley.com/easy</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Patrick Coughlin, Co-Founder and CEO of TruSTAR. Patrick began his career as a security analyst in Washington D.C. and the middle east. By working with government contractors, multinational corporations, and counter-terrorism units, Patrick learned that the biggest challenge that security analysts have is retrieving the needed information from disparate data sources. This discovery led Patrick to founding TruStar. Patrick’s focus is to help organizations automate the collection and curation of threat intelligence data.</p>
<p>Patrick’s analytical prowess originated from working at Booz Allen Hamilton where he learned a fundamental skill that all cybersecurity analysts should have - how to put together a slide deck. This skill helped Patrick articulate the importance of threat intelligence to leaders in the government and private sector. </p>
<p>As the episode progresses, Patrick details the differences between threat intelligence requirements for national security and enterprise. For enterprise threat intelligence programs, the goal is to accelerate automation of detection and rarely attribution. Patrick also mentions automation is only as effective as the data is cleaned, normalized, and prioritized. </p>
<p>What about the good, bad, and ugly of threat intelligence? Patrick describes that an organization can thrive by leveraging internal intelligence. This can be overlooked when organizations are fixated on buying threat data feeds and subscribing to ISAC feeds. Most enterprise organizations have a detection and response stack that is constantly providing information about threats relevant to their organization - which serves as great threat intelligence data.</p>
<p>Chris and Ron ask Patrick about the science vs art aspects of cybersecurity and threat intelligence. Patrick describes that there is room for both art and science in threat intelligence. While new concepts are being discovered, there is art in finding the needle in the haystack. However, at some point, intuition can be described into steps that a machine can repeat. For example, after years of analytical practice an analyst can describe how and why they are tagging threat intelligence related data in such a way that can be repeated by other analysts or automation. </p>
<p>This episode covers an abundance of tactics and techniques for threat intelligence analysts. Patrick describes the best place to begin automating threat intelligence is detection. An analyst can ask the question, “How do I get sources of known bad indicators into my detection stack so that I could drive high fidelity detections?”. As false positives decrease, your mean time to detection (MTTD) and resolution (MTTR) decrease which makes your threat intelligence and security operation team members more effective.</p>
<p> </p>
<p>0:00 - Intro</p>
<p>1:53 - This episode features Patrick Coughlin, Co-Founder and CEO of TruSTAR</p>
<p>2:30 - Patrick’s background and start as a security analyst</p>
<p>5:19 - How to automate threat intelligence while reducing analyst fatigue</p>
<p>7:05 - How Patrick cultivated his analyst prowess</p>
<p>8:43 - Articulating threat intelligence to government and enterprise organizations</p>
<p>11:09 - Can a threat intelligence program be automated?</p>
<p>17:21 - Patrick’s experience of “good” and “bad” threat intelligence programs</p>
<p>20:31 - Logic vs Intuition in threat intelligence</p>
<p>27:04 - Artificial Intelligence and Machine Learning to make threat intelligence decisions</p>
<p>28:42 - Where to start when automating threat intelligence</p>
<p>30:02 - How to stay in touch with Patrick Coughlin</p>
<p> </p>
<p>Links: </p>
<p>Connect with Patrick Coughlin on <a href='https://www.linkedin.com/in/patrickcoughlin1/'>LinkedIn</a></p>
<p>Link to Patrick’s company <a href='https://www.trustar.co/'>TruSTAR</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
<p>Take our FREE course for building threat intelligence programs by visiting <a href='http://www.hackervalley.com/easy'>www.hackervalley.com/easy</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9fxm58/Patrick_Final_Mixbnb9j.mp3" length="29669376" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Patrick Coughlin, Co-Founder and CEO of TruSTAR. Patrick began his career as a security analyst in Washington D.C. and the middle east. By working with government contractors, multinational corporations, and counter-terrorism units, Patrick learned that the biggest challenge that security analysts have is retrieving the needed information from disparate data sources. This discovery led Patrick to founding TruStar. Patrick’s focus is to help organizations automate the collection and curation of threat intelligence data.
Patrick’s analytical prowess originated from working at Booz Allen Hamilton where he learned a fundamental skill that all cybersecurity analysts should have - how to put together a slide deck. This skill helped Patrick articulate the importance of threat intelligence to leaders in the government and private sector. 
As the episode progresses, Patrick details the differences between threat intelligence requirements for national security and enterprise. For enterprise threat intelligence programs, the goal is to accelerate automation of detection and rarely attribution. Patrick also mentions automation is only as effective as the data is cleaned, normalized, and prioritized. 
What about the good, bad, and ugly of threat intelligence? Patrick describes that an organization can thrive by leveraging internal intelligence. This can be overlooked when organizations are fixated on buying threat data feeds and subscribing to ISAC feeds. Most enterprise organizations have a detection and response stack that is constantly providing information about threats relevant to their organization - which serves as great threat intelligence data.
Chris and Ron ask Patrick about the science vs art aspects of cybersecurity and threat intelligence. Patrick describes that there is room for both art and science in threat intelligence. While new concepts are being discovered, there is art in finding the needle in the haystack. However, at some point, intuition can be described into steps that a machine can repeat. For example, after years of analytical practice an analyst can describe how and why they are tagging threat intelligence related data in such a way that can be repeated by other analysts or automation. 
This episode covers an abundance of tactics and techniques for threat intelligence analysts. Patrick describes the best place to begin automating threat intelligence is detection. An analyst can ask the question, “How do I get sources of known bad indicators into my detection stack so that I could drive high fidelity detections?”. As false positives decrease, your mean time to detection (MTTD) and resolution (MTTR) decrease which makes your threat intelligence and security operation team members more effective.
 
0:00 - Intro
1:53 - This episode features Patrick Coughlin, Co-Founder and CEO of TruSTAR
2:30 - Patrick’s background and start as a security analyst
5:19 - How to automate threat intelligence while reducing analyst fatigue
7:05 - How Patrick cultivated his analyst prowess
8:43 - Articulating threat intelligence to government and enterprise organizations
11:09 - Can a threat intelligence program be automated?
17:21 - Patrick’s experience of “good” and “bad” threat intelligence programs
20:31 - Logic vs Intuition in threat intelligence
27:04 - Artificial Intelligence and Machine Learning to make threat intelligence decisions
28:42 - Where to start when automating threat intelligence
30:02 - How to stay in touch with Patrick Coughlin
 
Links: 
Connect with Patrick Coughlin on LinkedIn
Link to Patrick’s company TruSTAR
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor ByteChek. 
Take our FREE course for building threat intelligence programs by visiting www.hackervalley.com/easy]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1850</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>114</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 113 - Astonishing Stories with Neil Bearden</title>
        <itunes:title>Episode 113 - Astonishing Stories with Neil Bearden</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-113-astonishing-stories-with-neil-bearden/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-113-astonishing-stories-with-neil-bearden/#comments</comments>        <pubDate>Wed, 06 Jan 2021 08:49:20 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f3417617-d392-323d-98d5-04ba68ad5042</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Neil Bearden, storytelling expert and founder of The Story School and Plot Wolf Ltd. Neil originally started his career by teaching statistics and behavioral economics but had an astonishing introduction to storytelling by a stranger in San Francisco.</p>
<p>The episode begins by Neil sharing that he began his career in academia by completing a PhD in psychology which led to him teaching statistics, behavioral economics and behavioral decision-making. At some point, Neil found that he had a passion for storytelling and started the first MBA course at our INSEAD university on storytelling called storytelling workshop. Teaching storytelling at university helped Neil discover that the storytelling market is the entire world! Which ultimately led to his recognition and founding companies that help individuals tell their greatest stories. </p>
<p>While completing his postdoctoral studies at Duke University in 2005, Neil attended a neuroscience conference in San Francisco where he decided to go for a walk and ran into a stranger that asked him, “Would you like to hear some poetry young man?”. After Neil agreed, the man said:</p>
<p>“They’re latent semantics embedded deep down inside these rambles; these aren't the ravings of a madman alone, the dark with candles. </p>
<p>These are my notes, the underground they were sent to me from the year 2012</p>
<p>Dusky as he said to a beat these lyrics, they were pinned in a prison cell</p>
<p>Caught up with a knife, sent to the compression of vacuum tubes that articulate expressions </p>
<p>Are readily answered with a question. </p>
<p>A rhythm that's progressing</p>
<p>It keeps the head nodding like you agreeing with the lesson</p>
<p>Your freedom, It's called the question - Free will. That's obsolescent. </p>
<p>It's a myth from long ago. It's no longer relevant to the present. </p>
<p>So you must obey then all your thoughts young man, you must replace them with this prism. You’re plugged into the system. You too are now in prison. </p>
<p>In the matrix of your mind known as walls, ancient wisdom in a system of symbols, encrypted and deeply hidden </p>
<p>In the depths of your unconscious as if it were forbidden from outside awareness, by the id who does its bidding”</p>
<p>The man introduced himself as Osiris, a poet. For several hours, Neil and Osiris shared life experiences together while Osiris recited poems at his own accord throughout the night. After departing, Neil never had the opportunity to meet Osiris again but did attempt to track him down years later with no luck.</p>
<p>After the introduction to Osiris, Neil made a commitment that he’d begin writing poetry and cultivate the courage to share his stories publicly. Neil learned that he could halt beer bottles from clinking, discussions happening, and have listeners lean in while telling a great story. This compelled Neil to pivot from teaching statistics at university to teaching storytelling. After teaching storytelling for many years, Neil realized that he wanted to make a bigger impact and become an entrepreneur and teach storytelling to anyone who needs it.</p>
<p>Today, Neil helps companies and individuals add spice to their stories by extracting the details of a story that helps listeners internalize and visualize the nutrient rich details of a story. Neil is often humbled by the fact that he was able to pivot to a psychology PhD to storyteller organically and is able to help so many through having conversations. </p>
<p>As the podcast progresses, Neil highlights the difference between a story and a “crappy little speech”. While telling a story, the presenter needs to invoke a visual experience for the audience and provide a mental movie. Providing description of looks, taste, and feel helps build a mental model for the audience when being told a story. Everyone has experiences and knowledge that is story worthy.</p>
<p> </p>
<p>0:00 - Intro</p>
<p>2:52 - This episode features Neil Bearden, founder of The Story School and Plot Wolf Ltd</p>
<p>3:57 - Neil’s introduction to storytelling by Osiris, the poet.</p>
<p>12:20 - The search for Osiris after 2005</p>
<p>15:09 - How Neil helps companies and individuals with storytelling
18:03 - Difference between a story and a crappy little speech</p>
<p>23:51 - Shaking the dust off of a story and making it great</p>
<p>26:00 - Using previous experience from statistics to tell stories</p>
<p>36:36 - Advice for beginning to tell your story</p>
<p>41:00 - How to stay in touch with Neil Bearden</p>
<p> </p>
<p>Links: </p>
<p>Connect with Neil Bearden on <a href='https://www.linkedin.com/in/nbearden/'>LinkedIn</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Neil Bearden, storytelling expert and founder of The Story School and Plot Wolf Ltd. Neil originally started his career by teaching statistics and behavioral economics but had an astonishing introduction to storytelling by a stranger in San Francisco.</p>
<p>The episode begins by Neil sharing that he began his career in academia by completing a PhD in psychology which led to him teaching statistics, behavioral economics and behavioral decision-making. At some point, Neil found that he had a passion for storytelling and started the first MBA course at our INSEAD university on storytelling called storytelling workshop. Teaching storytelling at university helped Neil discover that the storytelling market is the entire world! Which ultimately led to his recognition and founding companies that help individuals tell their greatest stories. </p>
<p>While completing his postdoctoral studies at Duke University in 2005, Neil attended a neuroscience conference in San Francisco where he decided to go for a walk and ran into a stranger that asked him, “Would you like to hear some poetry young man?”. After Neil agreed, the man said:</p>
<p>“They’re latent semantics embedded deep down inside these rambles; these aren't the ravings of a madman alone, the dark with candles. </p>
<p>These are my notes, the underground they were sent to me from the year 2012</p>
<p>Dusky as he said to a beat these lyrics, they were pinned in a prison cell</p>
<p>Caught up with a knife, sent to the compression of vacuum tubes that articulate expressions </p>
<p>Are readily answered with a question. </p>
<p>A rhythm that's progressing</p>
<p>It keeps the head nodding like you agreeing with the lesson</p>
<p>Your freedom, It's called the question - Free will. That's obsolescent. </p>
<p>It's a myth from long ago. It's no longer relevant to the present. </p>
<p>So you must obey then all your thoughts young man, you must replace them with this prism. You’re plugged into the system. You too are now in prison. </p>
<p>In the matrix of your mind known as walls, ancient wisdom in a system of symbols, encrypted and deeply hidden </p>
<p>In the depths of your unconscious as if it were forbidden from outside awareness, by the id who does its bidding”</p>
<p>The man introduced himself as Osiris, a poet. For several hours, Neil and Osiris shared life experiences together while Osiris recited poems at his own accord throughout the night. After departing, Neil never had the opportunity to meet Osiris again but did attempt to track him down years later with no luck.</p>
<p>After the introduction to Osiris, Neil made a commitment that he’d begin writing poetry and cultivate the courage to share his stories publicly. Neil learned that he could halt beer bottles from clinking, discussions happening, and have listeners lean in while telling a great story. This compelled Neil to pivot from teaching statistics at university to teaching storytelling. After teaching storytelling for many years, Neil realized that he wanted to make a bigger impact and become an entrepreneur and teach storytelling to anyone who needs it.</p>
<p>Today, Neil helps companies and individuals add spice to their stories by extracting the details of a story that helps listeners internalize and visualize the nutrient rich details of a story. Neil is often humbled by the fact that he was able to pivot to a psychology PhD to storyteller organically and is able to help so many through having conversations. </p>
<p>As the podcast progresses, Neil highlights the difference between a story and a “crappy little speech”. While telling a story, the presenter needs to invoke a visual experience for the audience and provide a mental movie. Providing description of looks, taste, and feel helps build a mental model for the audience when being told a story. Everyone has experiences and knowledge that is story worthy.</p>
<p> </p>
<p>0:00 - Intro</p>
<p>2:52 - This episode features Neil Bearden, founder of The Story School and Plot Wolf Ltd</p>
<p>3:57 - Neil’s introduction to storytelling by Osiris, the poet.</p>
<p>12:20 - The search for Osiris after 2005</p>
<p>15:09 - How Neil helps companies and individuals with storytelling<br>
18:03 - Difference between a story and a crappy little speech</p>
<p>23:51 - Shaking the dust off of a story and making it great</p>
<p>26:00 - Using previous experience from statistics to tell stories</p>
<p>36:36 - Advice for beginning to tell your story</p>
<p>41:00 - How to stay in touch with Neil Bearden</p>
<p> </p>
<p>Links: </p>
<p>Connect with Neil Bearden on <a href='https://www.linkedin.com/in/nbearden/'>LinkedIn</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/m2mdbw/Neil_Bearden_Final_Mix7x7i3.mp3" length="40257792" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview Neil Bearden, storytelling expert and founder of The Story School and Plot Wolf Ltd. Neil originally started his career by teaching statistics and behavioral economics but had an astonishing introduction to storytelling by a stranger in San Francisco.
The episode begins by Neil sharing that he began his career in academia by completing a PhD in psychology which led to him teaching statistics, behavioral economics and behavioral decision-making. At some point, Neil found that he had a passion for storytelling and started the first MBA course at our INSEAD university on storytelling called storytelling workshop. Teaching storytelling at university helped Neil discover that the storytelling market is the entire world! Which ultimately led to his recognition and founding companies that help individuals tell their greatest stories. 
While completing his postdoctoral studies at Duke University in 2005, Neil attended a neuroscience conference in San Francisco where he decided to go for a walk and ran into a stranger that asked him, “Would you like to hear some poetry young man?”. After Neil agreed, the man said:
“They’re latent semantics embedded deep down inside these rambles; these aren't the ravings of a madman alone, the dark with candles. 
These are my notes, the underground they were sent to me from the year 2012
Dusky as he said to a beat these lyrics, they were pinned in a prison cell
Caught up with a knife, sent to the compression of vacuum tubes that articulate expressions 
Are readily answered with a question. 
A rhythm that's progressing
It keeps the head nodding like you agreeing with the lesson
Your freedom, It's called the question - Free will. That's obsolescent. 
It's a myth from long ago. It's no longer relevant to the present. 
So you must obey then all your thoughts young man, you must replace them with this prism. You’re plugged into the system. You too are now in prison. 
In the matrix of your mind known as walls, ancient wisdom in a system of symbols, encrypted and deeply hidden 
In the depths of your unconscious as if it were forbidden from outside awareness, by the id who does its bidding”
The man introduced himself as Osiris, a poet. For several hours, Neil and Osiris shared life experiences together while Osiris recited poems at his own accord throughout the night. After departing, Neil never had the opportunity to meet Osiris again but did attempt to track him down years later with no luck.
After the introduction to Osiris, Neil made a commitment that he’d begin writing poetry and cultivate the courage to share his stories publicly. Neil learned that he could halt beer bottles from clinking, discussions happening, and have listeners lean in while telling a great story. This compelled Neil to pivot from teaching statistics at university to teaching storytelling. After teaching storytelling for many years, Neil realized that he wanted to make a bigger impact and become an entrepreneur and teach storytelling to anyone who needs it.
Today, Neil helps companies and individuals add spice to their stories by extracting the details of a story that helps listeners internalize and visualize the nutrient rich details of a story. Neil is often humbled by the fact that he was able to pivot to a psychology PhD to storyteller organically and is able to help so many through having conversations. 
As the podcast progresses, Neil highlights the difference between a story and a “crappy little speech”. While telling a story, the presenter needs to invoke a visual experience for the audience and provide a mental movie. Providing description of looks, taste, and feel helps build a mental model for the audience when being told a story. Everyone has experiences and knowledge that is story worthy.
 
0:00 - Intro
2:52 - This episode features Neil Bearden, founder of The Story School and Plot Wolf Ltd
3:57 - Neil’s introduction to storytel]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2512</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>113</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 112  - Cybersecurity and Ambient Computing with Dr. James Stanger</title>
        <itunes:title>Episode 112  - Cybersecurity and Ambient Computing with Dr. James Stanger</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-112-cybersecurity-and-ambient-computing-with-dr-james-stanger/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-112-cybersecurity-and-ambient-computing-with-dr-james-stanger/#comments</comments>        <pubDate>Thu, 17 Dec 2020 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/049155b5-f1e7-344f-bfe5-cc22a647ee5c</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview the brilliant Dr. James Stanger, Chief Technology Evangelist at CompTIA and scuba diving aficionado.  The episode is a kind of journey through time - touching on the past, present, and future of cybersecurity.  </p>
<p class="p1">As the conversation begins, James looks to the past, sharing about himself and his background.  He studied English Literature, worked as a technical editor and then writer, worked in education, and finally made his way to a position with CompTIA.  All along, James demonstrated his propensity for combining aspects of his knowledge and experience, a propensity revealed most recently by the way in which his work for CompTIA merges education and cybersecurity.  James’ background has an incredible evolution to it, and has set him up to be a well-rounded and knowledgeable addition to the cybersecurity field.</p>
<p class="p1">And his knowledge comes in handy, as much of James’s work involves answering client questions.  James shares with Ron and Chris about current trends of questions he’s facing, as well as how he encourages agility in the face of emerging technology.  Further, he explains the term, “ambient computing” and its tie to emerging tech, concluding that we are entering a hyper- or post-information age in which data is collected at an incredible rate.  Data is in the air, captured, and processed, with massive stores of information about individuals available.  This fact raises questions about how to ethically manage the data, and how to make sure it is used well.  These questions, in turn, lead to considerations of business compliance, ramifications, and the like.  As the conversation winds down, James shares areas of opportunity he sees in approaching cybersecurity from a business perspective, and explores ways in which he’d like to see the future of cybersecurity take shape - including an uptick in IT hiring, a stronger focus on implications, and more!</p>
<p class="p2">0:00 - Intro</p>
<p class="p1">1:41 - This episode features Dr. James Stanger, who begins by sharing about his background.</p>
<p class="p1">5:25 - What kinds of questions are companies and individuals asking these days?</p>
<p class="p1">8:04 - How is Dr. Stanger advising companies to pursue agility in light of emerging tech?</p>
<p class="p1">11:19 - What is ambient computing?</p>
<p class="p1">13:43 - The conversation turns to ethics, understanding of ramifications, and business compliance.</p>
<p class="p1">17:02 - What areas of opportunity does James see in approaching cybersecurity from a business perspective?</p>
<p class="p1">21:01 - James shares about what he wants the future of cybersecurity to look like.</p>
<p class="p2"> </p>
<p class="p1">Links: </p>
<p class="p3"><a href='https://twitter.com/jamesstanger?lang=en'>Follow James Stanger on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/jamesstanger/'>Connect with James on LinkedIn</a></p>
<p class="p3"><a href='https://www.comptia.org/home'>Learn more about CompTIA</a></p>
<p class="p3"><a href='https://www.youtube.com/channel/UC3kFmMxz3IdLdz4TxA9a4DQ'>Follow CompTIA on Youtube </a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.bytechek.com/'>Learn more about ByteChek</a></p>
<p class="p4">Want to take the Introduction to EASY Framework Course with Ron and Chris? Take it for FREE here: <a href='http://www.hackervalley.com/easy'>www.hackervalley.com/easy</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris interview the brilliant Dr. James Stanger, Chief Technology Evangelist at CompTIA and scuba diving aficionado.  The episode is a kind of journey through time - touching on the past, present, and future of cybersecurity.  </p>
<p class="p1">As the conversation begins, James looks to the past, sharing about himself and his background.  He studied English Literature, worked as a technical editor and then writer, worked in education, and finally made his way to a position with CompTIA.  All along, James demonstrated his propensity for combining aspects of his knowledge and experience, a propensity revealed most recently by the way in which his work for CompTIA merges education and cybersecurity.  James’ background has an incredible evolution to it, and has set him up to be a well-rounded and knowledgeable addition to the cybersecurity field.</p>
<p class="p1">And his knowledge comes in handy, as much of James’s work involves answering client questions.  James shares with Ron and Chris about current trends of questions he’s facing, as well as how he encourages agility in the face of emerging technology.  Further, he explains the term, “ambient computing” and its tie to emerging tech, concluding that we are entering a hyper- or post-information age in which data is collected at an incredible rate.  Data is in the air, captured, and processed, with massive stores of information about individuals available.  This fact raises questions about how to ethically manage the data, and how to make sure it is used well.  These questions, in turn, lead to considerations of business compliance, ramifications, and the like.  As the conversation winds down, James shares areas of opportunity he sees in approaching cybersecurity from a business perspective, and explores ways in which he’d like to see the future of cybersecurity take shape - including an uptick in IT hiring, a stronger focus on implications, and more!</p>
<p class="p2">0:00 - Intro</p>
<p class="p1">1:41 - This episode features Dr. James Stanger, who begins by sharing about his background.</p>
<p class="p1">5:25 - What kinds of questions are companies and individuals asking these days?</p>
<p class="p1">8:04 - How is Dr. Stanger advising companies to pursue agility in light of emerging tech?</p>
<p class="p1">11:19 - What is ambient computing?</p>
<p class="p1">13:43 - The conversation turns to ethics, understanding of ramifications, and business compliance.</p>
<p class="p1">17:02 - What areas of opportunity does James see in approaching cybersecurity from a business perspective?</p>
<p class="p1">21:01 - James shares about what he wants the future of cybersecurity to look like.</p>
<p class="p2"> </p>
<p class="p1">Links: </p>
<p class="p3"><a href='https://twitter.com/jamesstanger?lang=en'>Follow James Stanger on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/jamesstanger/'>Connect with James on LinkedIn</a></p>
<p class="p3"><a href='https://www.comptia.org/home'>Learn more about CompTIA</a></p>
<p class="p3"><a href='https://www.youtube.com/channel/UC3kFmMxz3IdLdz4TxA9a4DQ'>Follow CompTIA on Youtube </a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.bytechek.com/'>Learn more about ByteChek</a></p>
<p class="p4">Want to take the Introduction to EASY Framework Course with Ron and Chris? Take it for FREE here: <a href='http://www.hackervalley.com/easy'>www.hackervalley.com/easy</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6q2i9y/James_Stanger_Final_MIX9xzdf.mp3" length="23741568" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview the brilliant Dr. James Stanger, Chief Technology Evangelist at CompTIA and scuba diving aficionado.  The episode is a kind of journey through time - touching on the past, present, and future of cybersecurity.  
As the conversation begins, James looks to the past, sharing about himself and his background.  He studied English Literature, worked as a technical editor and then writer, worked in education, and finally made his way to a position with CompTIA.  All along, James demonstrated his propensity for combining aspects of his knowledge and experience, a propensity revealed most recently by the way in which his work for CompTIA merges education and cybersecurity.  James’ background has an incredible evolution to it, and has set him up to be a well-rounded and knowledgeable addition to the cybersecurity field.
And his knowledge comes in handy, as much of James’s work involves answering client questions.  James shares with Ron and Chris about current trends of questions he’s facing, as well as how he encourages agility in the face of emerging technology.  Further, he explains the term, “ambient computing” and its tie to emerging tech, concluding that we are entering a hyper- or post-information age in which data is collected at an incredible rate.  Data is in the air, captured, and processed, with massive stores of information about individuals available.  This fact raises questions about how to ethically manage the data, and how to make sure it is used well.  These questions, in turn, lead to considerations of business compliance, ramifications, and the like.  As the conversation winds down, James shares areas of opportunity he sees in approaching cybersecurity from a business perspective, and explores ways in which he’d like to see the future of cybersecurity take shape - including an uptick in IT hiring, a stronger focus on implications, and more!
0:00 - Intro
1:41 - This episode features Dr. James Stanger, who begins by sharing about his background.
5:25 - What kinds of questions are companies and individuals asking these days?
8:04 - How is Dr. Stanger advising companies to pursue agility in light of emerging tech?
11:19 - What is ambient computing?
13:43 - The conversation turns to ethics, understanding of ramifications, and business compliance.
17:02 - What areas of opportunity does James see in approaching cybersecurity from a business perspective?
21:01 - James shares about what he wants the future of cybersecurity to look like.
 
Links: 
Follow James Stanger on Twitter
Connect with James on LinkedIn
Learn more about CompTIA
Follow CompTIA on Youtube 
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about ByteChek
Want to take the Introduction to EASY Framework Course with Ron and Chris? Take it for FREE here: www.hackervalley.com/easy]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1479</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>112</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 111 - Getting Back to Happy with Suzanne Falter</title>
        <itunes:title>Episode 111 - Getting Back to Happy with Suzanne Falter</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-111-getting-back-to-happy-with-suzanne-falter/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-111-getting-back-to-happy-with-suzanne-falter/#comments</comments>        <pubDate>Mon, 14 Dec 2020 13:38:32 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/17a74065-b3bb-37a2-9d03-44665a7eaa00</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Suzanne Falter, an author, motivational speaker, and podcaster who helps busy women find happiness through self care. In 2012, she ended her relationship, shut down her business, and her 22 year old daughter, Teal unexpectedly died. In the year that followed, she says she did nothing but take exceptional care of herself. Living in a friend’s guest room, she learned to slow down and practice self care.</p>
<p class="p1">Years later, Suzanne met the young woman who received Teal’s organs, and her mother, Debbie. Now, Debbie and Suzanne host the Back to Happy podcast together. Suzanne explains their instant chemistry, and how meeting them allowed pieces of life to fall together. These days in addition to the podcast, Suzanne has continued slowing down her life, working as an author and podcaster. She shares that she’s done this through choosing to slow down and practice meditation. She recommends taking a break from screens and starting to do small moments of life without them. It can be difficult, she says to start mindfulness from a healthy mental state, for those with depression or other mental health concerns, she says your first priority is to get help. Help can come in many forms, and it’s okay to reach out and ask for it. </p>
<p class="p1">To keep your alignment in check, and be able to sit in stillness, Suzanne says you have to have strong boundaries. This means recognizing what is encroaching on you. Once you’ve identified it and set that boundary, you can sit and do nothing which takes your brain into default mode. Default mode is where creativity and problem solving happens. In the midst of the pandemic, this can be difficult. Suzanne recommends small tasks that keep your hands busy, but allow your brain to relax as a start. She says avoid telling yourself what you “should” do, and think about what the next right thing to do is instead - one step at a time. </p>
<p class="p1">As the episode ends, Suzanne gives her advice to listeners for how to get back to happy.</p>
<p class="p3">0:00 - Intro</p>
<p class="p1">1:42 - Listeners are introduced to Suzanne and the episode ahead.</p>
<p class="p1">3:15 - Suzanne shares her background.</p>
<p class="p1">5:58 - How do you get back to happy after something tragic happens?</p>
<p class="p1">11:43 - Suzanne gives advice for how to slow down.</p>
<p class="p1">14:08 - Mindfulness practices.</p>
<p class="p1">21:53 - Suzanne explains the default mode.</p>
<p class="p1">24:42 - How can folks get back to happy in a pandemic?</p>
<p class="p1">32:41 - Suzanne’s advice to listeners.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Learn more about <a href='https://suzannefalter.com/'>Suzanne Falter</a> and connect with her on <a href='https://twitter.com/suzannefalter'>Twitter</a></p>
<p class="p1">Learn more about Suzanne’s <a href='https://suzannefalter.com/books/non-fiction/'>books</a>.</p>
<p class="p4">Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>Bytecheck</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Suzanne Falter, an author, motivational speaker, and podcaster who helps busy women find happiness through self care. In 2012, she ended her relationship, shut down her business, and her 22 year old daughter, Teal unexpectedly died. In the year that followed, she says she did nothing but take exceptional care of herself. Living in a friend’s guest room, she learned to slow down and practice self care.</p>
<p class="p1">Years later, Suzanne met the young woman who received Teal’s organs, and her mother, Debbie. Now, Debbie and Suzanne host the <em>Back to Happy</em> podcast together. Suzanne explains their instant chemistry, and how meeting them allowed pieces of life to fall together. These days in addition to the podcast, Suzanne has continued slowing down her life, working as an author and podcaster. She shares that she’s done this through choosing to slow down and practice meditation. She recommends taking a break from screens and starting to do small moments of life without them. It can be difficult, she says to start mindfulness from a healthy mental state, for those with depression or other mental health concerns, she says your first priority is to get help. Help can come in many forms, and it’s okay to reach out and ask for it. </p>
<p class="p1">To keep your alignment in check, and be able to sit in stillness, Suzanne says you have to have strong boundaries. This means recognizing what is encroaching on you. Once you’ve identified it and set that boundary, you can sit and do nothing which takes your brain into default mode. Default mode is where creativity and problem solving happens. In the midst of the pandemic, this can be difficult. Suzanne recommends small tasks that keep your hands busy, but allow your brain to relax as a start. She says avoid telling yourself what you “should” do, and think about what the next right thing to do is instead - one step at a time. </p>
<p class="p1">As the episode ends, Suzanne gives her advice to listeners for how to get back to happy.</p>
<p class="p3">0:00 - Intro</p>
<p class="p1">1:42 - Listeners are introduced to Suzanne and the episode ahead.</p>
<p class="p1">3:15 - Suzanne shares her background.</p>
<p class="p1">5:58 - How do you get back to happy after something tragic happens?</p>
<p class="p1">11:43 - Suzanne gives advice for how to slow down.</p>
<p class="p1">14:08 - Mindfulness practices.</p>
<p class="p1">21:53 - Suzanne explains the default mode.</p>
<p class="p1">24:42 - How can folks get back to happy in a pandemic?</p>
<p class="p1">32:41 - Suzanne’s advice to listeners.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Learn more about <a href='https://suzannefalter.com/'>Suzanne Falter</a> and connect with her on <a href='https://twitter.com/suzannefalter'>Twitter</a></p>
<p class="p1">Learn more about Suzanne’s <a href='https://suzannefalter.com/books/non-fiction/'>books</a>.</p>
<p class="p4">Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>Bytecheck</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dx7nea/Suzanne_Final_MIX6zogs.mp3" length="33303168" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by Suzanne Falter, an author, motivational speaker, and podcaster who helps busy women find happiness through self care. In 2012, she ended her relationship, shut down her business, and her 22 year old daughter, Teal unexpectedly died. In the year that followed, she says she did nothing but take exceptional care of herself. Living in a friend’s guest room, she learned to slow down and practice self care.
Years later, Suzanne met the young woman who received Teal’s organs, and her mother, Debbie. Now, Debbie and Suzanne host the Back to Happy podcast together. Suzanne explains their instant chemistry, and how meeting them allowed pieces of life to fall together. These days in addition to the podcast, Suzanne has continued slowing down her life, working as an author and podcaster. She shares that she’s done this through choosing to slow down and practice meditation. She recommends taking a break from screens and starting to do small moments of life without them. It can be difficult, she says to start mindfulness from a healthy mental state, for those with depression or other mental health concerns, she says your first priority is to get help. Help can come in many forms, and it’s okay to reach out and ask for it. 
To keep your alignment in check, and be able to sit in stillness, Suzanne says you have to have strong boundaries. This means recognizing what is encroaching on you. Once you’ve identified it and set that boundary, you can sit and do nothing which takes your brain into default mode. Default mode is where creativity and problem solving happens. In the midst of the pandemic, this can be difficult. Suzanne recommends small tasks that keep your hands busy, but allow your brain to relax as a start. She says avoid telling yourself what you “should” do, and think about what the next right thing to do is instead - one step at a time. 
As the episode ends, Suzanne gives her advice to listeners for how to get back to happy.
0:00 - Intro
1:42 - Listeners are introduced to Suzanne and the episode ahead.
3:15 - Suzanne shares her background.
5:58 - How do you get back to happy after something tragic happens?
11:43 - Suzanne gives advice for how to slow down.
14:08 - Mindfulness practices.
21:53 - Suzanne explains the default mode.
24:42 - How can folks get back to happy in a pandemic?
32:41 - Suzanne’s advice to listeners.
 
Links:
Learn more about Suzanne Falter and connect with her on Twitter
Learn more about Suzanne’s books.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about our sponsor Bytecheck.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2077</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>111</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 110 - Becoming Material Security with Ryan Noon and Abhishek Agrawal</title>
        <itunes:title>Episode 110 - Becoming Material Security with Ryan Noon and Abhishek Agrawal</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-110-becoming-material-security-with-ryan-noon-and-abhishek-agrawal/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-110-becoming-material-security-with-ryan-noon-and-abhishek-agrawal/#comments</comments>        <pubDate>Thu, 10 Dec 2020 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f946f9f8-632e-3f49-8ac6-91c6be1cfbdf</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by co-founders of Material Security, Ryan Noon and Abhishek Agrawal. They co-founded Material Security in 2017, today Ryan serves as the CEO, and Abhishek the CTO. Abishek has a background in engineering, infrastructure and analytics and his MBA from Harvard.  Ryan’s background is in engineering and data analysis, and holds multiple computer science and security degrees from Stanford. Before they moved on to creating their own company, they worked together at DropBox.</p>
<p class="p1">While they both have a strong engineering background, they are developing a security product. Ryan explains that coding and engineering is why he’s able to work in cyber security, all his years of engineering helped him make a reliable and effective product. Abhishek agrees that both their different backgrounds have carried over into the security industry and says the lessons he learned in productivity and engineering have been incredibly useful. Despite these diverse backgrounds, Ryan says going into security was an easy decision. “Go to where the problems are,” he says. Around the time of the founding of Material Security, there were a lot of problems with email. Abhishek agrees, and says he’s always been interested in email and how it’s being destroyed by threats. </p>
<p class="p1">When hackers access your email, what are they looking for? Abhishek explains that they may be downloading all of its contents, or resetting passwords to services like Twitter or Instagram. Material Security works to ask those questions and stop the effectiveness of a breach in email security. This shifts the focus from all the ways someone may hack you, to the implications of that hack. Ryan likens it to a burglary, explaining that their security is less about all the doors and windows - ways to get into your home - but rather what someone may want once they’re inside.</p>
<p class="p1">There is a lot of hand wringing in startup land, Ryan says, but there is no one right way to do it. The startup can burn you out, and what made Material Security’s leadership work was the reliance on each other, both he and Abhishek and their third co-founder, Chris Park. For them, this was the magic answer, having a third person gives them a tie breaker and someone who could cut through the noise with clarity. Abhishek agrees, joking that they compliment each other by Ryan giving long detailed answers, and Abhishek can summarize his thoughts. In all seriousness, this balance of responsibility and strengths requires a level of trust and lack of ego but makes the team work smoothly. Having unique skill sets is important, but Abhishek explains overlap is important as well because you can speak the same language and push each other for the best solutions.</p>
<p class="p1">When you come from similar backgrounds, no one is the authority and ideas get pressure tested. One of the challenges is using this overlap of skills for good - not letting it paralyze you. Another challenge they faced is knowing where to question and press industry standards, versus where to accept and excel at current practices. When thinking over their challenges and journey they offer some advice to new founders. Ryan stresses, “stop trying to get into things.” People can fall into the trap of trying to get into college, programs, and industries, and end up giving up some of their productivity and creativity to others. He also encourages people to know their partners and communicate with them about everything. Abhishek says people should divorce the idea of leaving their job from starting a company. Instead you should decide if you’re ready to leave your current job and then if you want to go to a new company or start your own.</p>
<p class="p3"> </p>
<p class="p3">0:00 - Intro</p>
<p class="p1">1:40 - Listeners are introduced to co-founders of Material Security and the episode ahead.</p>
<p class="p1">3:05 - Ryan and Abhishek introduce themselves. </p>
<p class="p1">5:38 - How do engineering and cyber security intersect?</p>
<p class="p1">8:39 - Why did Ryan and Abhishek decide to go into security?</p>
<p class="p1">14:28 - Ryan and Abhishek explain what hackers do when they’ve gotten into email.</p>
<p class="p1">18:08 - How do Ryan and Abhishek navigate their relationship?</p>
<p class="p1">24:19 - Ron asks Ryan and Abhishek about the challenges of the founder’s journey.</p>
<p class="p1">26:45 - What piece of advice do they have for new founders?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Learn more about <a href='https://material.security/'>Material Security</a>.</p>
<p class="p4">Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by co-founders of Material Security, Ryan Noon and Abhishek Agrawal. They co-founded Material Security in 2017, today Ryan serves as the CEO, and Abhishek the CTO. Abishek has a background in engineering, infrastructure and analytics and his MBA from Harvard.  Ryan’s background is in engineering and data analysis, and holds multiple computer science and security degrees from Stanford. Before they moved on to creating their own company, they worked together at DropBox.</p>
<p class="p1">While they both have a strong engineering background, they are developing a security product. Ryan explains that coding and engineering is why he’s able to work in cyber security, all his years of engineering helped him make a reliable and effective product. Abhishek agrees that both their different backgrounds have carried over into the security industry and says the lessons he learned in productivity and engineering have been incredibly useful. Despite these diverse backgrounds, Ryan says going into security was an easy decision. “Go to where the problems are,” he says. Around the time of the founding of Material Security, there were a lot of problems with email. Abhishek agrees, and says he’s always been interested in email and how it’s being destroyed by threats. </p>
<p class="p1">When hackers access your email, what are they looking for? Abhishek explains that they may be downloading all of its contents, or resetting passwords to services like Twitter or Instagram. Material Security works to ask those questions and stop the effectiveness of a breach in email security. This shifts the focus from all the ways someone may hack you, to the implications of that hack. Ryan likens it to a burglary, explaining that their security is less about all the doors and windows - ways to get into your home - but rather what someone may want once they’re inside.</p>
<p class="p1">There is a lot of hand wringing in startup land, Ryan says, but there is no one right way to do it. The startup can burn you out, and what made Material Security’s leadership work was the reliance on each other, both he and Abhishek and their third co-founder, Chris Park. For them, this was the magic answer, having a third person gives them a tie breaker and someone who could cut through the noise with clarity. Abhishek agrees, joking that they compliment each other by Ryan giving long detailed answers, and Abhishek can summarize his thoughts. In all seriousness, this balance of responsibility and strengths requires a level of trust and lack of ego but makes the team work smoothly. Having unique skill sets is important, but Abhishek explains overlap is important as well because you can speak the same language and push each other for the best solutions.</p>
<p class="p1">When you come from similar backgrounds, no one is the authority and ideas get pressure tested. One of the challenges is using this overlap of skills for good - not letting it paralyze you. Another challenge they faced is knowing where to question and press industry standards, versus where to accept and excel at current practices. When thinking over their challenges and journey they offer some advice to new founders. Ryan stresses, “stop trying to get into things.” People can fall into the trap of trying to get into college, programs, and industries, and end up giving up some of their productivity and creativity to others. He also encourages people to know their partners and communicate with them about everything. Abhishek says people should divorce the idea of leaving their job from starting a company. Instead you should decide if you’re ready to leave your current job and then if you want to go to a new company or start your own.</p>
<p class="p3"> </p>
<p class="p3">0:00 - Intro</p>
<p class="p1">1:40 - Listeners are introduced to co-founders of Material Security and the episode ahead.</p>
<p class="p1">3:05 - Ryan and Abhishek introduce themselves. </p>
<p class="p1">5:38 - How do engineering and cyber security intersect?</p>
<p class="p1">8:39 - Why did Ryan and Abhishek decide to go into security?</p>
<p class="p1">14:28 - Ryan and Abhishek explain what hackers do when they’ve gotten into email.</p>
<p class="p1">18:08 - How do Ryan and Abhishek navigate their relationship?</p>
<p class="p1">24:19 - Ron asks Ryan and Abhishek about the challenges of the founder’s journey.</p>
<p class="p1">26:45 - What piece of advice do they have for new founders?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Learn more about <a href='https://material.security/'>Material Security</a>.</p>
<p class="p4">Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/c5qrab/Material_Security_Final_MIX79baj.mp3" length="31580544" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, Ron and Chris are joined by co-founders of Material Security, Ryan Noon and Abhishek Agrawal. They co-founded Material Security in 2017, today Ryan serves as the CEO, and Abhishek the CTO. Abishek has a background in engineering, infrastructure and analytics and his MBA from Harvard.  Ryan’s background is in engineering and data analysis, and holds multiple computer science and security degrees from Stanford. Before they moved on to creating their own company, they worked together at DropBox.
While they both have a strong engineering background, they are developing a security product. Ryan explains that coding and engineering is why he’s able to work in cyber security, all his years of engineering helped him make a reliable and effective product. Abhishek agrees that both their different backgrounds have carried over into the security industry and says the lessons he learned in productivity and engineering have been incredibly useful. Despite these diverse backgrounds, Ryan says going into security was an easy decision. “Go to where the problems are,” he says. Around the time of the founding of Material Security, there were a lot of problems with email. Abhishek agrees, and says he’s always been interested in email and how it’s being destroyed by threats. 
When hackers access your email, what are they looking for? Abhishek explains that they may be downloading all of its contents, or resetting passwords to services like Twitter or Instagram. Material Security works to ask those questions and stop the effectiveness of a breach in email security. This shifts the focus from all the ways someone may hack you, to the implications of that hack. Ryan likens it to a burglary, explaining that their security is less about all the doors and windows - ways to get into your home - but rather what someone may want once they’re inside.
There is a lot of hand wringing in startup land, Ryan says, but there is no one right way to do it. The startup can burn you out, and what made Material Security’s leadership work was the reliance on each other, both he and Abhishek and their third co-founder, Chris Park. For them, this was the magic answer, having a third person gives them a tie breaker and someone who could cut through the noise with clarity. Abhishek agrees, joking that they compliment each other by Ryan giving long detailed answers, and Abhishek can summarize his thoughts. In all seriousness, this balance of responsibility and strengths requires a level of trust and lack of ego but makes the team work smoothly. Having unique skill sets is important, but Abhishek explains overlap is important as well because you can speak the same language and push each other for the best solutions.
When you come from similar backgrounds, no one is the authority and ideas get pressure tested. One of the challenges is using this overlap of skills for good - not letting it paralyze you. Another challenge they faced is knowing where to question and press industry standards, versus where to accept and excel at current practices. When thinking over their challenges and journey they offer some advice to new founders. Ryan stresses, “stop trying to get into things.” People can fall into the trap of trying to get into college, programs, and industries, and end up giving up some of their productivity and creativity to others. He also encourages people to know their partners and communicate with them about everything. Abhishek says people should divorce the idea of leaving their job from starting a company. Instead you should decide if you’re ready to leave your current job and then if you want to go to a new company or start your own.
 
0:00 - Intro
1:40 - Listeners are introduced to co-founders of Material Security and the episode ahead.
3:05 - Ryan and Abhishek introduce themselves. 
5:38 - How do engineering and cyber security intersect?
8:39 - Why did Ryan and Abhishek decide to go into security?
1]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1969</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>110</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 109 - Honest Security with Jason Meller</title>
        <itunes:title>Episode 109 - Honest Security with Jason Meller</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-109-making-security-honest-with-jason-meller/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-109-making-security-honest-with-jason-meller/#comments</comments>        <pubDate>Tue, 08 Dec 2020 04:08:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6450e1e5-8ea2-34c6-8207-6cab7bb6fbe2</guid>
                                    <description><![CDATA[<p>In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Jason Meller, Founder, and CEO of Kolide. Jason has over 10 years of experience in managing and leading security organizations. Jason’s interest in technology and cybersecurity began in the 1990s when he began programming in Visual Basic and building AOL Instant Messenger bots. Building offensive tools accelerated Jason’s interest in defending networks and helped him learn how much honesty plays part in building security solutions. </p>
<p>Jason mentions that the security monitoring software at most organizations have the same functionality as spyware or surveillance tools. In addition, these tools are designed to scrutinize all the actions that occur on a device. COVID-19 has increased the rate of organizations going through a digital transformation; as a result, users at an organization are not in a cubicle but at their home. This could mean that security teams have an extremely elevated level of access to devices without transparency as to what is being monitored to protect an organization. This is why Honest Security was created - to create a transparent relationship between security teams and end-users. </p>
<p>Jason has collaborated with Jesse Kriss from Netflix who is actively working towards incorporating user-focused security. Jason describes that organizations should build a culture based on trusting users, treating them like adults, giving them the tools that they need to do their job, and not treating them as suspects from day one. Instead, organizations and security teams should seek teachable moments by giving recommendations and educating users.</p>
<p>Throughout the episode, Jason describes situations that involve users and security team members maneuvering around security tooling obstacles to get their job done. Since working at home, traditional tools have created friction in the user experience. For instance, not having the ability to use USB ports on work devices, disabling corporate VPN to watch a YouTube video, and having to create a ticket to install software to help them with their job. When this friction is created, users will resort to using their personal devices for work activities and miss the opportunity to benefit from security. In some cases, there are “evil” applications found on a device created by a user - but often bad applications installed by users are Chrome extensions or helper utilities that are sending browsing history to a marketing firm.</p>
<p>In the Honest Security manifesto, there’s a section on empathetic intelligence, Jason describes this concept as thinking of the daily life users, thinking of what challenges are users attempting to solve in their workflow, and what part of that workflow could pose a risk to the organization. An example of this would be a security team member trying to empathize with someone who is a developer- and thinking of their daily workflow. When empathizing the security team may realize that the developer is attempting to fix issues on a production application. While fixing the production application, the developer may try to bring a copy of the application database to their local device. Creating a local copy of the database could pose a security risk the copy of the database is not deleted in a reasonable time or the user has their device auto-backup folders to their corporate or personal cloud storage solution (ie. Google Drive). Creating education for avoiding this mistake is a prime example of empathic intelligence when practicing Honest Security.</p>
<p>As the episode progresses, Jason goes into depth and explains more tenants of Honest Security - The goal is not to give unlimited power to the user or security team but to enable everyone to be in the position to make the right decisions and give appropriate recommendations. When consequences are articulated, users can understand that when maneuvering around security tools can pose a risk to their device and organization. Ie) disconnecting from the corporate VPN. When coaching and education are put as a priority when practicing security, James describes it as empowering the user to be successful and more transparent.</p>
<p> </p>
<p>0:00 - Intro</p>
<p>2:28 - This episode features Jason Meller, Founder, and CEO of Kolide!</p>
<p>2:54 - Jason shares his background and his path into cybersecurity.</p>
<p>4:07 - What is Honest Security?</p>
<p>5:22 - Jason’s examples of dishonest security</p>
<p>8:08 - Collaboration with Netflix and User-Focused Security</p>
<p>16:00 - Jason describes Empathetic Security</p>
<p>19:17 - Tenants of Honest Security</p>
<p>35:32 - Wrap Up and Resources for Honest Security</p>
<p>

</p>
<p>Links:</p>
<p>Learn more about <a href='https://www.linkedin.com/in/jason-meller-04498230/'>Jason Meller</a> and connect with him on LinkedIn.</p>
<p>Learn more about <a href='https://honest.security/'>Honest Security</a> and read the manifesto.</p>
<p>Learn more about Jason’s company <a href='https://www.kolide.com/'>Kolide</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Jason Meller, Founder, and CEO of Kolide. Jason has over 10 years of experience in managing and leading security organizations. Jason’s interest in technology and cybersecurity began in the 1990s when he began programming in Visual Basic and building AOL Instant Messenger bots. Building offensive tools accelerated Jason’s interest in defending networks and helped him learn how much honesty plays part in building security solutions. </p>
<p>Jason mentions that the security monitoring software at most organizations have the same functionality as spyware or surveillance tools. In addition, these tools are designed to scrutinize all the actions that occur on a device. COVID-19 has increased the rate of organizations going through a digital transformation; as a result, users at an organization are not in a cubicle but at their home. This could mean that security teams have an extremely elevated level of access to devices without transparency as to what is being monitored to protect an organization. This is why Honest Security was created - to create a transparent relationship between security teams and end-users. </p>
<p>Jason has collaborated with Jesse Kriss from Netflix who is actively working towards incorporating user-focused security. Jason describes that organizations should build a culture based on trusting users, treating them like adults, giving them the tools that they need to do their job, and not treating them as suspects from day one. Instead, organizations and security teams should seek teachable moments by giving recommendations and educating users.</p>
<p>Throughout the episode, Jason describes situations that involve users and security team members maneuvering around security tooling obstacles to get their job done. Since working at home, traditional tools have created friction in the user experience. For instance, not having the ability to use USB ports on work devices, disabling corporate VPN to watch a YouTube video, and having to create a ticket to install software to help them with their job. When this friction is created, users will resort to using their personal devices for work activities and miss the opportunity to benefit from security. In some cases, there are “evil” applications found on a device created by a user - but often bad applications installed by users are Chrome extensions or helper utilities that are sending browsing history to a marketing firm.</p>
<p>In the Honest Security manifesto, there’s a section on empathetic intelligence, Jason describes this concept as thinking of the daily life users, thinking of what challenges are users attempting to solve in their workflow, and what part of that workflow could pose a risk to the organization. An example of this would be a security team member trying to empathize with someone who is a developer- and thinking of their daily workflow. When empathizing the security team may realize that the developer is attempting to fix issues on a production application. While fixing the production application, the developer may try to bring a copy of the application database to their local device. Creating a local copy of the database could pose a security risk the copy of the database is not deleted in a reasonable time or the user has their device auto-backup folders to their corporate or personal cloud storage solution (ie. Google Drive). Creating education for avoiding this mistake is a prime example of empathic intelligence when practicing Honest Security.</p>
<p>As the episode progresses, Jason goes into depth and explains more tenants of Honest Security - The goal is not to give unlimited power to the user or security team but to enable everyone to be in the position to make the right decisions and give appropriate recommendations. When consequences are articulated, users can understand that when maneuvering around security tools can pose a risk to their device and organization. Ie) disconnecting from the corporate VPN. When coaching and education are put as a priority when practicing security, James describes it as empowering the user to be successful and more transparent.</p>
<p> </p>
<p>0:00 - Intro</p>
<p>2:28 - This episode features Jason Meller, Founder, and CEO of Kolide!</p>
<p>2:54 - Jason shares his background and his path into cybersecurity.</p>
<p>4:07 - What is Honest Security?</p>
<p>5:22 - Jason’s examples of dishonest security</p>
<p>8:08 - Collaboration with Netflix and User-Focused Security</p>
<p>16:00 - Jason describes Empathetic Security</p>
<p>19:17 - Tenants of Honest Security</p>
<p>35:32 - Wrap Up and Resources for Honest Security</p>
<p><br>
<br>
</p>
<p>Links:</p>
<p>Learn more about <a href='https://www.linkedin.com/in/jason-meller-04498230/'>Jason Meller</a> and connect with him on LinkedIn.</p>
<p>Learn more about <a href='https://honest.security/'>Honest Security</a> and read the manifesto.</p>
<p>Learn more about Jason’s company <a href='https://www.kolide.com/'>Kolide</a></p>
<p>Learn more about <a href='https://hackervalley.com/'>Hacker Valley Studio</a>.</p>
<p>Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p>Follow Hacker Valley Studio on <a href='https://twitter.com/thehackervalley'>Twitter</a>.</p>
<p>Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p>Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/q634w4/Jason_Meller_Fianl_MIX7ck29.mp3" length="35514624" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of Hacker Valley Studio podcast, Ron and Chris are joined by Jason Meller, Founder, and CEO of Kolide. Jason has over 10 years of experience in managing and leading security organizations. Jason’s interest in technology and cybersecurity began in the 1990s when he began programming in Visual Basic and building AOL Instant Messenger bots. Building offensive tools accelerated Jason’s interest in defending networks and helped him learn how much honesty plays part in building security solutions. 
Jason mentions that the security monitoring software at most organizations have the same functionality as spyware or surveillance tools. In addition, these tools are designed to scrutinize all the actions that occur on a device. COVID-19 has increased the rate of organizations going through a digital transformation; as a result, users at an organization are not in a cubicle but at their home. This could mean that security teams have an extremely elevated level of access to devices without transparency as to what is being monitored to protect an organization. This is why Honest Security was created - to create a transparent relationship between security teams and end-users. 
Jason has collaborated with Jesse Kriss from Netflix who is actively working towards incorporating user-focused security. Jason describes that organizations should build a culture based on trusting users, treating them like adults, giving them the tools that they need to do their job, and not treating them as suspects from day one. Instead, organizations and security teams should seek teachable moments by giving recommendations and educating users.
Throughout the episode, Jason describes situations that involve users and security team members maneuvering around security tooling obstacles to get their job done. Since working at home, traditional tools have created friction in the user experience. For instance, not having the ability to use USB ports on work devices, disabling corporate VPN to watch a YouTube video, and having to create a ticket to install software to help them with their job. When this friction is created, users will resort to using their personal devices for work activities and miss the opportunity to benefit from security. In some cases, there are “evil” applications found on a device created by a user - but often bad applications installed by users are Chrome extensions or helper utilities that are sending browsing history to a marketing firm.
In the Honest Security manifesto, there’s a section on empathetic intelligence, Jason describes this concept as thinking of the daily life users, thinking of what challenges are users attempting to solve in their workflow, and what part of that workflow could pose a risk to the organization. An example of this would be a security team member trying to empathize with someone who is a developer- and thinking of their daily workflow. When empathizing the security team may realize that the developer is attempting to fix issues on a production application. While fixing the production application, the developer may try to bring a copy of the application database to their local device. Creating a local copy of the database could pose a security risk the copy of the database is not deleted in a reasonable time or the user has their device auto-backup folders to their corporate or personal cloud storage solution (ie. Google Drive). Creating education for avoiding this mistake is a prime example of empathic intelligence when practicing Honest Security.
As the episode progresses, Jason goes into depth and explains more tenants of Honest Security - The goal is not to give unlimited power to the user or security team but to enable everyone to be in the position to make the right decisions and give appropriate recommendations. When consequences are articulated, users can understand that when maneuvering around security tools can pose a risk to their device and organization. Ie) disconnecting from ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2215</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>109</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 108 - Behind the Mic with Carole Theriault</title>
        <itunes:title>Episode 108 - Behind the Mic with Carole Theriault</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-108-behind-the-mic-with-carole-theriault/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-108-behind-the-mic-with-carole-theriault/#comments</comments>        <pubDate>Wed, 02 Dec 2020 16:50:54 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c8d8f187-03ff-343e-870d-349ff6d7931c</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, Ron and Chris host a special episode featuring one of their favorite guests.  Carole Theriault is the co-host of both the <a href='https://www.smashingsecurity.com/'>Smashing Security</a> podcast and the <a href='https://twitter.com/StickyPickles'>Sticky Pickles</a> podcast, and she is also the founder and director of her own company, <a href='https://www.ticktocksocial.com/'>Tick Tock Social</a>.  Carole joins Ron and Chris to talk about her passion for being behind the mic, the impact of COVID-19 on the 2020 holiday season, and more!</p>
<p class="p1">As the interview gets underway, Ron and Chris ask Carole about her background and what she’s up to now.  At this point, Carole says, she’s in “podcast land.”  She works in tech and IT security, as well, and in her work with Tick Tock Social, she aims to help people simplify their messaging and make it palatable for the representatives of companies they’re propositioning.  Turning to her podcasts, Carole shares about her co-host for Smashing Security, <a href='https://www.smashingsecurity.com/hosts/graham-cluley'>Graham Cluley</a>, her friend (or frenemy, perhaps?) with whom she also previously worked for <a href='https://www.sophos.com/en-us.aspx'>Sophos</a>.  To conclude her brief personal introduction, Carole notes that she also fills some of her time with hobbies, such as yoga, baking bread, and painting.  </p>
<p class="p1">Moving forward in the conversation, Ron and Chris are first curious about how Carole got into podcasting in the first place.  She explains that a business trip for Sophos involved her listening to <a href='https://www.thisamericanlife.org/'>This American Life </a>and falling in love with the podcast medium.  After she stopped working for Sophos, she started her own projects, and she was eventually able to convince Graham to host a podcast with her. </p>
<p class="p1">And it is this podcast that once included <a href='https://www.smashingsecurity.com/guests/chris-cochran'>Chris as a guest</a>!  So, Chris asks, how did he do?  The question kick starts a conversation about quality podcast and radio production, which involves voice quality, radio technique, and more.  Fortunately, Carole finds that Chris (like Ron) has a great radio voice, and (unlike Graham) she also finds him to have a good laugh.  While it can be challenging to find guests with strong radio presence, one benefit of 2020 is that people have had lots of opportunity in lockdown to work on the relevant skills!</p>
<p class="p1">Another area in which potential guests often struggle is that of communicating and making themselves the “star,” so to speak.  Carole skillfully takes pressure off of guests and highlights them herself, and she is able to do so because she is not running her show for a boss or a company, but for herself and in order to have fun.  Her work is designed to be light!</p>
<p class="p1">The lightness is born out of experience, though, as Carole is able to choose content for the show because of a well-developed instinct.  She developed her instinct, in part, through her work at Sophos.  Looking back, Carole details her transition away from Sophos.  Over her 15 years there, the company grew and changed, Carole took on too much, and she found she needed to leave.  She and Graham decided on the same day to leave Sophos, not knowing where their friendship was yet to lead!</p>
<p class="p1">Carole’s journey has certainly been one of stepping into her personal power, and her philosophy in all her endeavors is to be herself.  While missing personal contact, she has navigated the pandemic well in her professional life.  More personally, she, Ron, and Chris look ahead to the upcoming holidays, which will certainly be usual!  They also share a benefit of the pandemic: people having more free time to join podcasts as guests.  In fact, Carole is excited to feature <a href='https://timharford.com/'>Tim Harford</a> of the BBC’s <a href='https://www.bbc.co.uk/programmes/p02nrss1/episodes/downloads'>More or Less</a> podcast soon (and, hopefully in 2021, Ron!).</p>
<p class="p1">As the conversation winds toward a close, Carole explains her approach to finding guests, which focuses on finding “win-win” scenarios.  She likens the departure of co-host Anna (from Sticky Pickles) to a breakup, asks about Ron and Chris’s friendship, and offers advice both to a new podcaster and listeners looking to ensure their cybersecurity this holiday season!</p>
<p class="p2">0:00 - Intro</p>
<p class="p1">1:40 - This special episode features Carole Theriault!</p>
<p class="p1">2:44 - Turning to Carole, the hosts ask her to share her background and what she’s up to now.</p>
<p class="p1">5:00 - How did Carole get into podcasting in the first place?</p>
<p class="p1">6:50 - Chris asks, “How did I do?”</p>
<p class="p1">10:03 - What are some techniques to highlight a guest and make him/her the star?</p>
<p class="p1">12:10 - Carole and her hosts get into content selection.</p>
<p class="p1">15:13 - Carole tells the story of her decision to leave Sophos.</p>
<p class="p1">19:00 - This journey has been an experience of stepping into her own power.</p>
<p class="p1">21:01 - She is herself in her work; COVID-19 has not hindered this (though she misses people!)</p>
<p class="p1">23:26 - The group talks holiday preparations.</p>
<p class="p1">27:49 - Next, they talk future podcast guests and how to choose guests.</p>
<p class="p1">30:07 - How long have Ron and Chris known each other?</p>
<p class="p1">32:32 - What’s Carole’s advice for new podcasters and for holiday cybersecurity?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Learn more about <a href='https://www.smashingsecurity.com/hosts/carole-theriault'>Carole Theriault</a> and connect with her on <a href='https://twitter.com/caroletheriault?lang=en'>Twitter</a>.</p>
<p class="p1">Learn more about the <a href='https://www.smashingsecurity.com/'>Smashing Security</a> podcast and connect on <a href='https://twitter.com/SmashinSecurity'>Twitter</a>.</p>
<p class="p1">Learn more about the <a href='https://audioboom.com/channels/5035494'>Sticky Pickles</a> podcast and connect on <a href='https://twitter.com/StickyPickles'>Twitter</a>.</p>
<p class="p1">Learn more about <a href='https://www.ticktocksocial.com/'>Tick Tock Social</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, Ron and Chris host a special episode featuring one of their favorite guests.  Carole Theriault is the co-host of both the <a href='https://www.smashingsecurity.com/'><em>Smashing Security</em></a><em> </em>podcast and the <a href='https://twitter.com/StickyPickles'><em>Sticky Pickles</em></a> podcast, and she is also the founder and director of her own company, <a href='https://www.ticktocksocial.com/'>Tick Tock Social</a>.  Carole joins Ron and Chris to talk about her passion for being behind the mic, the impact of COVID-19 on the 2020 holiday season, and more!</p>
<p class="p1">As the interview gets underway, Ron and Chris ask Carole about her background and what she’s up to now.  At this point, Carole says, she’s in “podcast land.”  She works in tech and IT security, as well, and in her work with Tick Tock Social, she aims to help people simplify their messaging and make it palatable for the representatives of companies they’re propositioning.  Turning to her podcasts, Carole shares about her co-host for <em>Smashing Security</em>, <a href='https://www.smashingsecurity.com/hosts/graham-cluley'>Graham Cluley</a>, her friend (or frenemy, perhaps?) with whom she also previously worked for <a href='https://www.sophos.com/en-us.aspx'>Sophos</a>.  To conclude her brief personal introduction, Carole notes that she also fills some of her time with hobbies, such as yoga, baking bread, and painting.  </p>
<p class="p1">Moving forward in the conversation, Ron and Chris are first curious about how Carole got into podcasting in the first place.  She explains that a business trip for Sophos involved her listening to <a href='https://www.thisamericanlife.org/'><em>This American Life </em></a>and falling in love with the podcast medium.  After she stopped working for Sophos, she started her own projects, and she was eventually able to convince Graham to host a podcast with her. </p>
<p class="p1">And it is this podcast that once included <a href='https://www.smashingsecurity.com/guests/chris-cochran'>Chris as a guest</a>!  So, Chris asks, how did he do?  The question kick starts a conversation about quality podcast and radio production, which involves voice quality, radio technique, and more.  Fortunately, Carole finds that Chris (like Ron) has a great radio voice, and (unlike Graham) she also finds him to have a good laugh.  While it can be challenging to find guests with strong radio presence, one benefit of 2020 is that people have had lots of opportunity in lockdown to work on the relevant skills!</p>
<p class="p1">Another area in which potential guests often struggle is that of communicating and making themselves the “star,” so to speak.  Carole skillfully takes pressure off of guests and highlights them herself, and she is able to do so because she is not running her show for a boss or a company, but for herself and in order to have fun.  Her work is designed to be light!</p>
<p class="p1">The lightness is born out of experience, though, as Carole is able to choose content for the show because of a well-developed instinct.  She developed her instinct, in part, through her work at Sophos.  Looking back, Carole details her transition away from Sophos.  Over her 15 years there, the company grew and changed, Carole took on too much, and she found she needed to leave.  She and Graham decided on the same day to leave Sophos, not knowing where their friendship was yet to lead!</p>
<p class="p1">Carole’s journey has certainly been one of stepping into her personal power, and her philosophy in all her endeavors is to be herself.  While missing personal contact, she has navigated the pandemic well in her professional life.  More personally, she, Ron, and Chris look ahead to the upcoming holidays, which will certainly be usual!  They also share a benefit of the pandemic: people having more free time to join podcasts as guests.  In fact, Carole is excited to feature <a href='https://timharford.com/'>Tim Harford</a> of the BBC’s <a href='https://www.bbc.co.uk/programmes/p02nrss1/episodes/downloads'><em>More or Less</em></a> podcast soon (and, hopefully in 2021, Ron!).</p>
<p class="p1">As the conversation winds toward a close, Carole explains her approach to finding guests, which focuses on finding “win-win” scenarios.  She likens the departure of co-host Anna (from <em>Sticky Pickles</em>) to a breakup, asks about Ron and Chris’s friendship, and offers advice both to a new podcaster and listeners looking to ensure their cybersecurity this holiday season!</p>
<p class="p2">0:00 - Intro</p>
<p class="p1">1:40 - This special episode features Carole Theriault!</p>
<p class="p1">2:44 - Turning to Carole, the hosts ask her to share her background and what she’s up to now.</p>
<p class="p1">5:00 - How did Carole get into podcasting in the first place?</p>
<p class="p1">6:50 - Chris asks, “How did I do?”</p>
<p class="p1">10:03 - What are some techniques to highlight a guest and make him/her the star?</p>
<p class="p1">12:10 - Carole and her hosts get into content selection.</p>
<p class="p1">15:13 - Carole tells the story of her decision to leave Sophos.</p>
<p class="p1">19:00 - This journey has been an experience of stepping into her own power.</p>
<p class="p1">21:01 - She is herself in her work; COVID-19 has not hindered this (though she misses people!)</p>
<p class="p1">23:26 - The group talks holiday preparations.</p>
<p class="p1">27:49 - Next, they talk future podcast guests and how to choose guests.</p>
<p class="p1">30:07 - How long have Ron and Chris known each other?</p>
<p class="p1">32:32 - What’s Carole’s advice for new podcasters and for holiday cybersecurity?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Learn more about <a href='https://www.smashingsecurity.com/hosts/carole-theriault'>Carole Theriault</a> and connect with her on <a href='https://twitter.com/caroletheriault?lang=en'>Twitter</a>.</p>
<p class="p1">Learn more about the <a href='https://www.smashingsecurity.com/'><em>Smashing Security</em></a> podcast and connect on <a href='https://twitter.com/SmashinSecurity'>Twitter</a>.</p>
<p class="p1">Learn more about the <a href='https://audioboom.com/channels/5035494'><em>Sticky Pickles</em></a> podcast and connect on <a href='https://twitter.com/StickyPickles'>Twitter</a>.</p>
<p class="p1">Learn more about <a href='https://www.ticktocksocial.com/'>Tick Tock Social</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about our sponsor <a href='https://www.bytechek.com/'>ByteChek</a>. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/uh57ts/Hacker_Valley_Studio_Carole_Episode_MIX.mp3" length="92816195" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, Ron and Chris host a special episode featuring one of their favorite guests.  Carole Theriault is the co-host of both the Smashing Security podcast and the Sticky Pickles podcast, and she is also the founder and director of her own company, Tick Tock Social.  Carole joins Ron and Chris to talk about her passion for being behind the mic, the impact of COVID-19 on the 2020 holiday season, and more!
As the interview gets underway, Ron and Chris ask Carole about her background and what she’s up to now.  At this point, Carole says, she’s in “podcast land.”  She works in tech and IT security, as well, and in her work with Tick Tock Social, she aims to help people simplify their messaging and make it palatable for the representatives of companies they’re propositioning.  Turning to her podcasts, Carole shares about her co-host for Smashing Security, Graham Cluley, her friend (or frenemy, perhaps?) with whom she also previously worked for Sophos.  To conclude her brief personal introduction, Carole notes that she also fills some of her time with hobbies, such as yoga, baking bread, and painting.  
Moving forward in the conversation, Ron and Chris are first curious about how Carole got into podcasting in the first place.  She explains that a business trip for Sophos involved her listening to This American Life and falling in love with the podcast medium.  After she stopped working for Sophos, she started her own projects, and she was eventually able to convince Graham to host a podcast with her. 
And it is this podcast that once included Chris as a guest!  So, Chris asks, how did he do?  The question kick starts a conversation about quality podcast and radio production, which involves voice quality, radio technique, and more.  Fortunately, Carole finds that Chris (like Ron) has a great radio voice, and (unlike Graham) she also finds him to have a good laugh.  While it can be challenging to find guests with strong radio presence, one benefit of 2020 is that people have had lots of opportunity in lockdown to work on the relevant skills!
Another area in which potential guests often struggle is that of communicating and making themselves the “star,” so to speak.  Carole skillfully takes pressure off of guests and highlights them herself, and she is able to do so because she is not running her show for a boss or a company, but for herself and in order to have fun.  Her work is designed to be light!
The lightness is born out of experience, though, as Carole is able to choose content for the show because of a well-developed instinct.  She developed her instinct, in part, through her work at Sophos.  Looking back, Carole details her transition away from Sophos.  Over her 15 years there, the company grew and changed, Carole took on too much, and she found she needed to leave.  She and Graham decided on the same day to leave Sophos, not knowing where their friendship was yet to lead!
Carole’s journey has certainly been one of stepping into her personal power, and her philosophy in all her endeavors is to be herself.  While missing personal contact, she has navigated the pandemic well in her professional life.  More personally, she, Ron, and Chris look ahead to the upcoming holidays, which will certainly be usual!  They also share a benefit of the pandemic: people having more free time to join podcasts as guests.  In fact, Carole is excited to feature Tim Harford of the BBC’s More or Less podcast soon (and, hopefully in 2021, Ron!).
As the conversation winds toward a close, Carole explains her approach to finding guests, which focuses on finding “win-win” scenarios.  She likens the departure of co-host Anna (from Sticky Pickles) to a breakup, asks about Ron and Chris’s friendship, and offers advice both to a new podcaster and listeners looking to ensure their cybersecurity this holiday season!
0:00 - Intro
1:40 - This special episode features Carole Theriault!
2:44 - Turning to Caro]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2320</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>108</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Introducing the Marqeta Leads Podcast</title>
        <itunes:title>Introducing the Marqeta Leads Podcast</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/introducing-the-marqeta-leads-podcast/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/introducing-the-marqeta-leads-podcast/#comments</comments>        <pubDate>Mon, 30 Nov 2020 18:16:17 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/11fb9f1a-58a9-3dfa-87f9-77f26789703f</guid>
                                    <description><![CDATA[<p>Hello HVS family! We are beyond proud to introduce a new leadership focused show for you listening pleasure. This account is still the home of the HVS episode you know and love but to subscribe to this show be sure to visit the link below!</p>
<p><a href='https://link.chtbl.com/marqetaleadslaunch'>https://link.chtbl.com/marqetaleadslaunch</a></p>
<p> </p>
<p>In this inaugural episode, Ron and Chris sit down with Marqeta CEO, Jason Gardner, to discuss his journey through leadership and explain the tools he has used over his successful entrepreneurial career.</p>
<p> </p>
<p>0:00 - Intro</p>
<p dir="ltr">1:00 - 3:00  — Learn about Jason’s first business venture and starting business in tech. Jason speaks about mindsets for entrepreneurship. </p>
<p dir="ltr">5:30 — Jason speaks about the importance of leading from values and finding his own style of communication. </p>
<p dir="ltr">7:30 — Learn where Jason’s leadership comes from and how it lent itself to a more steady vision.</p>
<p dir="ltr">10:00-12:00 — Communication is key, Jason speaks about his superpower and why he views leadership as a type of service.</p>
<p dir="ltr">13:00-15:00  — Jason shares about the weight of responsibility that a leader must become accustomed to. He shares how he navigated a very difficult time in Marqeta’s development as a company and platform.</p>
<p dir="ltr">16:00-20:00  — How Jason adjusted to physically distanced work and the gifts and challenges it has presented. </p>
<p dir="ltr">20:00 — Jason speaks a bit about leadership culture and why is it important to Marqeta’s values.</p>
<p dir="ltr">22:00 — Some advice from Jason on how to be a leader. If you want to keep up with what’s going on with Marqeta and Jason, follow Marqeta on social media!</p>
<p dir="ltr"> </p>
<p dir="ltr">Thanks for listening please do check out our social media for the latest.</p>
<p dir="ltr"><a href='https://twitter.com/marqeta'>Marqeta's Twitter</a>   <a href='https://www.linkedin.com/company/marqeta-inc'>Marqeta's Linkedin</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Hello HVS family! We are beyond proud to introduce a new leadership focused show for you listening pleasure. This account is still the home of the HVS episode you know and love but to subscribe to this show be sure to visit the link below!</p>
<p><a href='https://link.chtbl.com/marqetaleadslaunch'>https://link.chtbl.com/marqetaleadslaunch</a></p>
<p> </p>
<p>In this inaugural episode, Ron and Chris sit down with Marqeta CEO, Jason Gardner, to discuss his journey through leadership and explain the tools he has used over his successful entrepreneurial career.</p>
<p> </p>
<p>0:00 - Intro</p>
<p dir="ltr">1:00 - 3:00  — Learn about Jason’s first business venture and starting business in tech. Jason speaks about mindsets for entrepreneurship. </p>
<p dir="ltr">5:30 — Jason speaks about the importance of leading from values and finding his own style of communication. </p>
<p dir="ltr">7:30 — Learn where Jason’s leadership comes from and how it lent itself to a more steady vision.</p>
<p dir="ltr">10:00-12:00 — Communication is key, Jason speaks about his superpower and why he views leadership as a type of service.</p>
<p dir="ltr">13:00-15:00  — Jason shares about the weight of responsibility that a leader must become accustomed to. He shares how he navigated a very difficult time in Marqeta’s development as a company and platform.</p>
<p dir="ltr">16:00-20:00  — How Jason adjusted to physically distanced work and the gifts and challenges it has presented. </p>
<p dir="ltr">20:00 — Jason speaks a bit about leadership culture and why is it important to Marqeta’s values.</p>
<p dir="ltr">22:00 — Some advice from Jason on how to be a leader. If you want to keep up with what’s going on with Marqeta and Jason, follow Marqeta on social media!</p>
<p dir="ltr"> </p>
<p dir="ltr">Thanks for listening please do check out our social media for the latest.</p>
<p dir="ltr"><a href='https://twitter.com/marqeta'>Marqeta's Twitter</a>   <a href='https://www.linkedin.com/company/marqeta-inc'>Marqeta's Linkedin</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vtn7cj/HVS_ML_Ep962fd.mp3" length="25242689" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hello HVS family! We are beyond proud to introduce a new leadership focused show for you listening pleasure. This account is still the home of the HVS episode you know and love but to subscribe to this show be sure to visit the link below!
https://link.chtbl.com/marqetaleadslaunch
 
In this inaugural episode, Ron and Chris sit down with Marqeta CEO, Jason Gardner, to discuss his journey through leadership and explain the tools he has used over his successful entrepreneurial career.
 
0:00 - Intro
1:00 - 3:00  — Learn about Jason’s first business venture and starting business in tech. Jason speaks about mindsets for entrepreneurship. 
5:30 — Jason speaks about the importance of leading from values and finding his own style of communication. 
7:30 — Learn where Jason’s leadership comes from and how it lent itself to a more steady vision.
10:00-12:00 — Communication is key, Jason speaks about his superpower and why he views leadership as a type of service.
13:00-15:00  — Jason shares about the weight of responsibility that a leader must become accustomed to. He shares how he navigated a very difficult time in Marqeta’s development as a company and platform.
16:00-20:00  — How Jason adjusted to physically distanced work and the gifts and challenges it has presented. 
20:00 — Jason speaks a bit about leadership culture and why is it important to Marqeta’s values.
22:00 — Some advice from Jason on how to be a leader. If you want to keep up with what’s going on with Marqeta and Jason, follow Marqeta on social media!
 
Thanks for listening please do check out our social media for the latest.
Marqeta's Twitter   Marqeta's Linkedin]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1573</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>107</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 106 - Stacking the Deck of Success with AJ Yawn</title>
        <itunes:title>Episode 106 - Stacking the Deck of Success with AJ Yawn</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-106-stacking-the-deck-of-success-with-aj-yawn/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-106-stacking-the-deck-of-success-with-aj-yawn/#comments</comments>        <pubDate>Tue, 24 Nov 2020 07:04:17 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6f5f44e8-e13c-3e55-b1f7-2ece3a73807f</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview AJ Yawn in an episode that is a mix between a master class and a founder’s journey.  AJ is the founder and CEO of ByteCheck, with a personal and company goal to “make compliance suck less.”  He is a cloud security expert, and brings to the conversation a wealth of wisdom on cybersecurity, leadership, and personal growth.  The episode focuses on topics surrounding a major event in the past week for AJ and ByteChek, addressing AJ’s background, the work surrounding ByteCheck’s genesis, AJ’s thoughts on compliance, and more!  </p>
<p class="p1">The interview begins with a look at AJ’s background.  AJ grew up a military brat, and eventually found himself in the Army for a time.  While he did not place much consideration on technology before he entered the Army, it was during his Army career that AJ developed an interest in cybersecurity.  He became passionate about cybersecurity and the cloud, and he went all in!  After he left the service, he began a job in cybersecurity consulting, and he’s been in the field ever since.  </p>
<p class="p1">This episode is recorded at another momentous shift in AJ’s career, though, and Ron and Chris invite him to share about the past week, focusing on highs and lows.  AJ shares about how he and his friend Jeff just launched ByteChek days ago, choosing as their launch date the significant holiday of Veterans Day!  This choice was a way to honor AJ’s family members who served before him, and Ron and Chris also thank AJ for his own service to his country.  </p>
<p class="p1">In light of this exciting time, AJ explains what the early days of the company have been like and considers some influences that have shaped him.  In this stage of his company, AJ has capitalized on LinkedIn.  He had previously not been accustomed to using the site or to the more general task of business promotion, but he’s found that networking on LinkedIn is a great way to grow a new business.  He also explores ways in which his background in sports and as a middle child among nine siblings have shaped him as a cybersecurity worker and entrepreneur.  Such factors of his youth helped him to foster a growth mindset and competitive nature, and also taught him to stand in his power. </p>
<p class="p1">Next, AJ talks about the thinking behind the tagline, “make compliance suck less,” which is honest, humorous, and relevant to the problem that drove AJ to start the company.  As he navigates issues of business, compliance, and the like, AJ demonstrates remarkable capacities for focus.  Ron and Chris wonder how he manages to focus on a single subject and to stay intentional for months or even years at a time, and AJ answers that he focuses on the process.  In order to do so, he relies on the 90-91 model (which calls for the first 90 minutes of his day to be centered on a certain thing), as well as an array of goals.</p>
<p class="p1">AJ is also deeply committed to an active pursuit of personal growth.  One of the clearest demonstrations of this commitment came in the years leading up to the launch of ByteChek.  AJ saw the need for such a company years ago and had it in mind to start his own company, knowing that he needed to take a chance to make the impact he wanted to make.  However, he also knew that he was not yet ready to start a business, so he created a masterclass for himself to prepare.  Since, in first forming the company, he needed to place special focus on learning the business and marketing side of things, his successful navigation of LinkedIn is just one testament to the effectiveness of his intentional training.</p>
<p class="p1">Even in the midst of the fear surrounding the COVID-19 pandemic (and many problems for businesses), AJ was confident in betting on himself and launching ByteChek.  And he’s confident in the future of the company, as well.  He invests himself in making compliance exciting for clients, and among his projections for the future of compliance, he even includes plans for a ByteChek Academy!  As the conversation reaches a close, AJ provides listeners with a final nugget of wisdom pertaining to the two most prominent themes of the conversation: betting on oneself and stepping into one’s personal power.  </p>
<p class="p2"> </p>
<p class="p1">1:35 - This episode features AJ Yawn!</p>
<p class="p1">2:53 - AJ and his hosts turn to background info and what AJ is doing today.</p>
<p class="p1">4:35 - This past week has been huge for AJ because of his company launch!</p>
<p class="p1">6:33 - Did AJ’s interest in cybersecurity start while he was in the Army?</p>
<p class="p1">8:49 - The group speaks of AJ’s family background, including the fact that he is one of nine kids!</p>
<p class="p1">10:00 - Has being in the middle of a big family and playing sports shaped AJ?</p>
<p class="p1">12:52 - AJ and his hosts consider ByteChek’s tagline.</p>
<p class="p1">15:21 - How does AJ focus so well?</p>
<p class="p1">17:18 - Why did he launch the company now, even in the midst of COVID-19?</p>
<p class="p1">21:21 - AJ created a masterclass for himself.</p>
<p class="p1">25:38 - How does AJ make compliance exciting?</p>
<p class="p1">29:39- AJ is asked about the future of compliance.</p>
<p class="p1">33:45 - What’s one nugget of wisdom AJ can offer concerning two main themes of the episode?</p>
<p> </p>
<p class="p1">Links:</p>
<p class="p1">Connect with AJ on <a href='https://www.linkedin.com/in/ajyawn/'>LinkedIn</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about <a href='https://www.bytechek.com/'>ByteChek</a>, and mention Hacker Valley Studio to receive a limited time offer!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris interview AJ Yawn in an episode that is a mix between a master class and a founder’s journey.  AJ is the founder and CEO of ByteCheck, with a personal and company goal to “make compliance suck less.”  He is a cloud security expert, and brings to the conversation a wealth of wisdom on cybersecurity, leadership, and personal growth.  The episode focuses on topics surrounding a major event in the past week for AJ and ByteChek, addressing AJ’s background, the work surrounding ByteCheck’s genesis, AJ’s thoughts on compliance, and more!  </p>
<p class="p1">The interview begins with a look at AJ’s background.  AJ grew up a military brat, and eventually found himself in the Army for a time.  While he did not place much consideration on technology before he entered the Army, it was during his Army career that AJ developed an interest in cybersecurity.  He became passionate about cybersecurity and the cloud, and he went all in!  After he left the service, he began a job in cybersecurity consulting, and he’s been in the field ever since.  </p>
<p class="p1">This episode is recorded at another momentous shift in AJ’s career, though, and Ron and Chris invite him to share about the past week, focusing on highs and lows.  AJ shares about how he and his friend Jeff just launched ByteChek days ago, choosing as their launch date the significant holiday of Veterans Day!  This choice was a way to honor AJ’s family members who served before him, and Ron and Chris also thank AJ for his own service to his country.  </p>
<p class="p1">In light of this exciting time, AJ explains what the early days of the company have been like and considers some influences that have shaped him.  In this stage of his company, AJ has capitalized on LinkedIn.  He had previously not been accustomed to using the site or to the more general task of business promotion, but he’s found that networking on LinkedIn is a great way to grow a new business.  He also explores ways in which his background in sports and as a middle child among nine siblings have shaped him as a cybersecurity worker and entrepreneur.  Such factors of his youth helped him to foster a growth mindset and competitive nature, and also taught him to stand in his power. </p>
<p class="p1">Next, AJ talks about the thinking behind the tagline, “make compliance suck less,” which is honest, humorous, and relevant to the problem that drove AJ to start the company.  As he navigates issues of business, compliance, and the like, AJ demonstrates remarkable capacities for focus.  Ron and Chris wonder how he manages to focus on a single subject and to stay intentional for months or even years at a time, and AJ answers that he focuses on the process.  In order to do so, he relies on the 90-91 model (which calls for the first 90 minutes of his day to be centered on a certain thing), as well as an array of goals.</p>
<p class="p1">AJ is also deeply committed to an active pursuit of personal growth.  One of the clearest demonstrations of this commitment came in the years leading up to the launch of ByteChek.  AJ saw the need for such a company years ago and had it in mind to start his own company, knowing that he needed to take a chance to make the impact he wanted to make.  However, he also knew that he was not yet ready to start a business, so he created a masterclass for himself to prepare.  Since, in first forming the company, he needed to place special focus on learning the business and marketing side of things, his successful navigation of LinkedIn is just one testament to the effectiveness of his intentional training.</p>
<p class="p1">Even in the midst of the fear surrounding the COVID-19 pandemic (and many problems for businesses), AJ was confident in betting on himself and launching ByteChek.  And he’s confident in the future of the company, as well.  He invests himself in making compliance exciting for clients, and among his projections for the future of compliance, he even includes plans for a ByteChek Academy!  As the conversation reaches a close, AJ provides listeners with a final nugget of wisdom pertaining to the two most prominent themes of the conversation: betting on oneself and stepping into one’s personal power.  </p>
<p class="p2"> </p>
<p class="p1">1:35 - This episode features AJ Yawn!</p>
<p class="p1">2:53 - AJ and his hosts turn to background info and what AJ is doing today.</p>
<p class="p1">4:35 - This past week has been huge for AJ because of his company launch!</p>
<p class="p1">6:33 - Did AJ’s interest in cybersecurity start while he was in the Army?</p>
<p class="p1">8:49 - The group speaks of AJ’s family background, including the fact that he is one of nine kids!</p>
<p class="p1">10:00 - Has being in the middle of a big family and playing sports shaped AJ?</p>
<p class="p1">12:52 - AJ and his hosts consider ByteChek’s tagline.</p>
<p class="p1">15:21 - How does AJ focus so well?</p>
<p class="p1">17:18 - Why did he launch the company now, even in the midst of COVID-19?</p>
<p class="p1">21:21 - AJ created a masterclass for himself.</p>
<p class="p1">25:38 - How does AJ make compliance exciting?</p>
<p class="p1">29:39- AJ is asked about the future of compliance.</p>
<p class="p1">33:45 - What’s one nugget of wisdom AJ can offer concerning two main themes of the episode?</p>
<p> </p>
<p class="p1">Links:</p>
<p class="p1">Connect with AJ on <a href='https://www.linkedin.com/in/ajyawn/'>LinkedIn</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about <a href='https://www.bytechek.com/'>ByteChek</a>, and mention <em>Hacker Valley Studio</em> to receive a limited time offer!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/yrfeq3/Hacker_Valley_Studio_AJ_Yawn_MIX.mp3" length="37794506" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview AJ Yawn in an episode that is a mix between a master class and a founder’s journey.  AJ is the founder and CEO of ByteCheck, with a personal and company goal to “make compliance suck less.”  He is a cloud security expert, and brings to the conversation a wealth of wisdom on cybersecurity, leadership, and personal growth.  The episode focuses on topics surrounding a major event in the past week for AJ and ByteChek, addressing AJ’s background, the work surrounding ByteCheck’s genesis, AJ’s thoughts on compliance, and more!  
The interview begins with a look at AJ’s background.  AJ grew up a military brat, and eventually found himself in the Army for a time.  While he did not place much consideration on technology before he entered the Army, it was during his Army career that AJ developed an interest in cybersecurity.  He became passionate about cybersecurity and the cloud, and he went all in!  After he left the service, he began a job in cybersecurity consulting, and he’s been in the field ever since.  
This episode is recorded at another momentous shift in AJ’s career, though, and Ron and Chris invite him to share about the past week, focusing on highs and lows.  AJ shares about how he and his friend Jeff just launched ByteChek days ago, choosing as their launch date the significant holiday of Veterans Day!  This choice was a way to honor AJ’s family members who served before him, and Ron and Chris also thank AJ for his own service to his country.  
In light of this exciting time, AJ explains what the early days of the company have been like and considers some influences that have shaped him.  In this stage of his company, AJ has capitalized on LinkedIn.  He had previously not been accustomed to using the site or to the more general task of business promotion, but he’s found that networking on LinkedIn is a great way to grow a new business.  He also explores ways in which his background in sports and as a middle child among nine siblings have shaped him as a cybersecurity worker and entrepreneur.  Such factors of his youth helped him to foster a growth mindset and competitive nature, and also taught him to stand in his power. 
Next, AJ talks about the thinking behind the tagline, “make compliance suck less,” which is honest, humorous, and relevant to the problem that drove AJ to start the company.  As he navigates issues of business, compliance, and the like, AJ demonstrates remarkable capacities for focus.  Ron and Chris wonder how he manages to focus on a single subject and to stay intentional for months or even years at a time, and AJ answers that he focuses on the process.  In order to do so, he relies on the 90-91 model (which calls for the first 90 minutes of his day to be centered on a certain thing), as well as an array of goals.
AJ is also deeply committed to an active pursuit of personal growth.  One of the clearest demonstrations of this commitment came in the years leading up to the launch of ByteChek.  AJ saw the need for such a company years ago and had it in mind to start his own company, knowing that he needed to take a chance to make the impact he wanted to make.  However, he also knew that he was not yet ready to start a business, so he created a masterclass for himself to prepare.  Since, in first forming the company, he needed to place special focus on learning the business and marketing side of things, his successful navigation of LinkedIn is just one testament to the effectiveness of his intentional training.
Even in the midst of the fear surrounding the COVID-19 pandemic (and many problems for businesses), AJ was confident in betting on himself and launching ByteChek.  And he’s confident in the future of the company, as well.  He invests himself in making compliance exciting for clients, and among his projections for the future of compliance, he even includes plans for a ByteChek Academy!  As the conversation re]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2362</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>106</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 105 - Striving for Impact with David Tsao</title>
        <itunes:title>Episode 105 - Striving for Impact with David Tsao</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-105-striving-for-impact-with-david-tsao/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-105-striving-for-impact-with-david-tsao/#comments</comments>        <pubDate>Wed, 18 Nov 2020 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7a6b612a-8502-3176-8d02-3601a7eac1ee</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview longtime friend David Tsao.  David is a security advisor who leads security engineering at <a href='https://www.marqeta.com/'>Marqeta</a>, and he is an ever-innovating wealth of knowledge.  Ron and Chris ask David about his background, philosophy of leadership, and more! </p>
<p class="p1">David took a nontraditional route into the security field, as he had a background in chemistry and pharma before breaking into the security community.  Ron and Chris ask David to explain various aspects of his experience, including decisions regarding when to buy or build things, how vendors may find problems to tackle, and his own founder’s journey as a team builder.  David’s story of team-building opens the door to conversation about his role as a leader in the field, and he tells Ron and Chris about his expectations about leadership and how they matched reality, strategies for assuring opportunity for team impact and giving individual employees opportunities, and what he looks for in his work of hiring employees.</p>
<p class="p1">Another major topic of conversation is David’s philosophy concerning the social commentary of the day.  More specifically, Ron and Chris wonder how he thinks about issues surrounding both diversity and inclusion and wealth and income gaps.  David explains his thoughts and desire to partner with others in work for change, and also shares the story of a past experience tasting social change and feeling like he made a difference.  Finally, David offers advice to listeners eager to make an impact on their own community, as well as listeners looking with a broad vision and wanting to bring change to the world. </p>
<p class="p1">1:34 - This episode features David Tsao and starts with a look at his background.</p>
<p class="p1">3:48 - David handles questions of building vs. buying and operating as a vendor.</p>
<p class="p1">9:54 - The conversation turns to David’s founder’s journey.</p>
<p class="p1">13:26 - David is asked about his first step into leadership, including expectations and reality.</p>
<p class="p1">15:05 -David gets into some team strategies and ways to best serve individual employees. </p>
<p class="p1">20:48 - What does David look for in hiring people new to the security field?</p>
<p class="p1">23:59 - Ron and Chris want to know David’s philosophy on social commentary going on now.</p>
<p class="p1">28:14 - They ask David to share a story about seeing and contributing to social change.</p>
<p class="p1">30:47 - Where should people who want to make a community impact start?</p>
<p class="p1">33:37 - What’s one piece of advice to listeners wanting to bring change in the world?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Connect with David on <a href='https://www.linkedin.com/in/tsaodavid/'>LinkedIn</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about <a href='https://www.bytechek.com/'>ByteChek</a>, and mention Hacker Valley Studio to receive a limited time offer!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris interview longtime friend David Tsao.  David is a security advisor who leads security engineering at <a href='https://www.marqeta.com/'>Marqeta</a>, and he is an ever-innovating wealth of knowledge.  Ron and Chris ask David about his background, philosophy of leadership, and more! </p>
<p class="p1">David took a nontraditional route into the security field, as he had a background in chemistry and pharma before breaking into the security community.  Ron and Chris ask David to explain various aspects of his experience, including decisions regarding when to buy or build things, how vendors may find problems to tackle, and his own founder’s journey as a team builder.  David’s story of team-building opens the door to conversation about his role as a leader in the field, and he tells Ron and Chris about his expectations about leadership and how they matched reality, strategies for assuring opportunity for team impact and giving individual employees opportunities, and what he looks for in his work of hiring employees.</p>
<p class="p1">Another major topic of conversation is David’s philosophy concerning the social commentary of the day.  More specifically, Ron and Chris wonder how he thinks about issues surrounding both diversity and inclusion and wealth and income gaps.  David explains his thoughts and desire to partner with others in work for change, and also shares the story of a past experience tasting social change and feeling like he made a difference.  Finally, David offers advice to listeners eager to make an impact on their own community, as well as listeners looking with a broad vision and wanting to bring change to the world. </p>
<p class="p1">1:34 - This episode features David Tsao and starts with a look at his background.</p>
<p class="p1">3:48 - David handles questions of building vs. buying and operating as a vendor.</p>
<p class="p1">9:54 - The conversation turns to David’s founder’s journey.</p>
<p class="p1">13:26 - David is asked about his first step into leadership, including expectations and reality.</p>
<p class="p1">15:05 -David gets into some team strategies and ways to best serve individual employees. </p>
<p class="p1">20:48 - What does David look for in hiring people new to the security field?</p>
<p class="p1">23:59 - Ron and Chris want to know David’s philosophy on social commentary going on now.</p>
<p class="p1">28:14 - They ask David to share a story about seeing and contributing to social change.</p>
<p class="p1">30:47 - Where should people who want to make a community impact start?</p>
<p class="p1">33:37 - What’s one piece of advice to listeners wanting to bring change in the world?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Connect with David on <a href='https://www.linkedin.com/in/tsaodavid/'>LinkedIn</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about <a href='https://www.bytechek.com/'>ByteChek</a>, and mention <em>Hacker Valley Studio</em> to receive a limited time offer!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mcn7np/David_Tsao_Episodebvhw9.mp3" length="35008896" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview longtime friend David Tsao.  David is a security advisor who leads security engineering at Marqeta, and he is an ever-innovating wealth of knowledge.  Ron and Chris ask David about his background, philosophy of leadership, and more! 
David took a nontraditional route into the security field, as he had a background in chemistry and pharma before breaking into the security community.  Ron and Chris ask David to explain various aspects of his experience, including decisions regarding when to buy or build things, how vendors may find problems to tackle, and his own founder’s journey as a team builder.  David’s story of team-building opens the door to conversation about his role as a leader in the field, and he tells Ron and Chris about his expectations about leadership and how they matched reality, strategies for assuring opportunity for team impact and giving individual employees opportunities, and what he looks for in his work of hiring employees.
Another major topic of conversation is David’s philosophy concerning the social commentary of the day.  More specifically, Ron and Chris wonder how he thinks about issues surrounding both diversity and inclusion and wealth and income gaps.  David explains his thoughts and desire to partner with others in work for change, and also shares the story of a past experience tasting social change and feeling like he made a difference.  Finally, David offers advice to listeners eager to make an impact on their own community, as well as listeners looking with a broad vision and wanting to bring change to the world. 
1:34 - This episode features David Tsao and starts with a look at his background.
3:48 - David handles questions of building vs. buying and operating as a vendor.
9:54 - The conversation turns to David’s founder’s journey.
13:26 - David is asked about his first step into leadership, including expectations and reality.
15:05 -David gets into some team strategies and ways to best serve individual employees. 
20:48 - What does David look for in hiring people new to the security field?
23:59 - Ron and Chris want to know David’s philosophy on social commentary going on now.
28:14 - They ask David to share a story about seeing and contributing to social change.
30:47 - Where should people who want to make a community impact start?
33:37 - What’s one piece of advice to listeners wanting to bring change in the world?
 
Links:
Connect with David on LinkedIn.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about ByteChek, and mention Hacker Valley Studio to receive a limited time offer!]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2183</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>105</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 104 - Analyzing the Enemy with Robin Black</title>
        <itunes:title>Episode 104 - Analyzing the Enemy with Robin Black</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-104-analyzing-the-enemy-with-robin-black/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-104-analyzing-the-enemy-with-robin-black/#comments</comments>        <pubDate>Wed, 11 Nov 2020 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6e01d3e8-5d47-3a44-9bfd-bc5c9c92f478</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris provide a very special episode as they interview Robin Black.  Robin is a martial arts practitioner and commentator, and he is arguably the best martial arts analyst in the world.  He believes secrets to the universe lie in the sacred moments of combat - and that couldn’t be any more true in cyber security.  So what does cyber security have to do with martial arts and analysis?  Ron and Chris invite listeners into the conversation to find out!</p>
<p class="p1">As the conversation begins, Robin shares about his background, emphasizing the fact that he has the privilege of doing what he loves.  Robin’s work involves taking events and crafting a story in real time; the task is in many ways similar to that of cyber security, but as a general rule,  it requires more speed.  And so, Ron and Chris wonder, what is Robin’s mindset as an analyst?  Robin explains how he developed his interest and skill as an analyst, slowly building skill, sharpening his ability with language, and consciously deciding to go back to the roots of martial arts in his analysis rather than approaching the work as a television announcer typically would.  He is an art curator of violence, so to speak, and is committed to “nutrient rich” commentary. </p>
<p class="p1">Moving forward in the conversation, Ron and Chris wonder about what advice Robin would offer to the “little guy.”  Using the example of Brazilian Jiu Jitsu, Robin explains the value of knowing more, having more knowledge, being able to change, and being confident.  Such strengths help the apparent underdog in both fighting and cyber security.  Much like they considered unhackability with previous guests, Ron and Chris also raise the notion of an unbeatable fighter, and Robin details the reasons why such a fighter is a myth.  Listeners will learn about such things as the cracks and flaws in fighting (which are located in the root of fighting - within belief systems), the workings and danger of muscle memory, how Robin dissects fighters, and how Robin thinks about cyber security!</p>
<p class="p2"> </p>
<p class="p1">1:45 - This special episode features Robin Black!</p>
<p class="p1">3:19 - The conversation first turns to Robin’s background and what he’s doing today.</p>
<p class="p1">5:31 - What is Robin’s mindset as an analyst?</p>
<p class="p1">11:21 - Ron and Chris wonder what advice Robin would give to the “little guy.”</p>
<p class="p1">14:02 - Is there such a thing as an unbeatable fighter?</p>
<p class="p1">17:17 - The episode turns to the flaws and cracks within fighting.</p>
<p class="p1">20:54 - What is the component of muscle memory, and what role does it play?</p>
<p class="p1">24:31 - Ron and Chris want to know how Robin dissects fighters.</p>
<p class="p1">33:24 - Does Robin have any questions about cyber security?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Follow Robin on <a href='https://twitter.com/robinblackmma?ref_src=twsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor'>Twitter</a>, <a href='https://www.instagram.com/robinblackmartialarts/?hl=en'>Instagram</a>.</p>
<p class="p1">Follow Bellator MMA on <a href='https://www.youtube.com/user/BellatorMMA'>Youtube</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about <a href='https://www.bytechek.com/'>ByteChek</a>, and mention Hacker Valley Studio to receive a limited time offer!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris provide a very special episode as they interview Robin Black.  Robin is a martial arts practitioner and commentator, and he is arguably the best martial arts analyst in the world.  He believes secrets to the universe lie in the sacred moments of combat - and that couldn’t be any more true in cyber security.  So what does cyber security have to do with martial arts and analysis?  Ron and Chris invite listeners into the conversation to find out!</p>
<p class="p1">As the conversation begins, Robin shares about his background, emphasizing the fact that he has the privilege of doing what he loves.  Robin’s work involves taking events and crafting a story in real time; the task is in many ways similar to that of cyber security, but as a general rule,  it requires more speed.  And so, Ron and Chris wonder, what is Robin’s mindset as an analyst?  Robin explains how he developed his interest and skill as an analyst, slowly building skill, sharpening his ability with language, and consciously deciding to go back to the roots of martial arts in his analysis rather than approaching the work as a television announcer typically would.  He is an art curator of violence, so to speak, and is committed to “nutrient rich” commentary. </p>
<p class="p1">Moving forward in the conversation, Ron and Chris wonder about what advice Robin would offer to the “little guy.”  Using the example of Brazilian Jiu Jitsu, Robin explains the value of knowing more, having more knowledge, being able to change, and being confident.  Such strengths help the apparent underdog in both fighting and cyber security.  Much like they considered unhackability with previous guests, Ron and Chris also raise the notion of an unbeatable fighter, and Robin details the reasons why such a fighter is a myth.  Listeners will learn about such things as the cracks and flaws in fighting (which are located in the root of fighting - within belief systems), the workings and danger of muscle memory, how Robin dissects fighters, and how Robin thinks about cyber security!</p>
<p class="p2"> </p>
<p class="p1">1:45 - This special episode features Robin Black!</p>
<p class="p1">3:19 - The conversation first turns to Robin’s background and what he’s doing today.</p>
<p class="p1">5:31 - What is Robin’s mindset as an analyst?</p>
<p class="p1">11:21 - Ron and Chris wonder what advice Robin would give to the “little guy.”</p>
<p class="p1">14:02 - Is there such a thing as an unbeatable fighter?</p>
<p class="p1">17:17 - The episode turns to the flaws and cracks within fighting.</p>
<p class="p1">20:54 - What is the component of muscle memory, and what role does it play?</p>
<p class="p1">24:31 - Ron and Chris want to know how Robin dissects fighters.</p>
<p class="p1">33:24 - Does Robin have any questions about cyber security?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">Follow Robin on <a href='https://twitter.com/robinblackmma?ref_src=twsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor'>Twitter</a>, <a href='https://www.instagram.com/robinblackmartialarts/?hl=en'>Instagram</a>.</p>
<p class="p1">Follow Bellator MMA on <a href='https://www.youtube.com/user/BellatorMMA'>Youtube</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
<p class="p1">Learn more about <a href='https://www.bytechek.com/'>ByteChek</a>, and mention <em>Hacker Valley Studio</em> to receive a limited time offer!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rwzxk3/Hacker_Valley_Studio_Robin_Black_Mix.mp3" length="35254142" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris provide a very special episode as they interview Robin Black.  Robin is a martial arts practitioner and commentator, and he is arguably the best martial arts analyst in the world.  He believes secrets to the universe lie in the sacred moments of combat - and that couldn’t be any more true in cyber security.  So what does cyber security have to do with martial arts and analysis?  Ron and Chris invite listeners into the conversation to find out!
As the conversation begins, Robin shares about his background, emphasizing the fact that he has the privilege of doing what he loves.  Robin’s work involves taking events and crafting a story in real time; the task is in many ways similar to that of cyber security, but as a general rule,  it requires more speed.  And so, Ron and Chris wonder, what is Robin’s mindset as an analyst?  Robin explains how he developed his interest and skill as an analyst, slowly building skill, sharpening his ability with language, and consciously deciding to go back to the roots of martial arts in his analysis rather than approaching the work as a television announcer typically would.  He is an art curator of violence, so to speak, and is committed to “nutrient rich” commentary. 
Moving forward in the conversation, Ron and Chris wonder about what advice Robin would offer to the “little guy.”  Using the example of Brazilian Jiu Jitsu, Robin explains the value of knowing more, having more knowledge, being able to change, and being confident.  Such strengths help the apparent underdog in both fighting and cyber security.  Much like they considered unhackability with previous guests, Ron and Chris also raise the notion of an unbeatable fighter, and Robin details the reasons why such a fighter is a myth.  Listeners will learn about such things as the cracks and flaws in fighting (which are located in the root of fighting - within belief systems), the workings and danger of muscle memory, how Robin dissects fighters, and how Robin thinks about cyber security!
 
1:45 - This special episode features Robin Black!
3:19 - The conversation first turns to Robin’s background and what he’s doing today.
5:31 - What is Robin’s mindset as an analyst?
11:21 - Ron and Chris wonder what advice Robin would give to the “little guy.”
14:02 - Is there such a thing as an unbeatable fighter?
17:17 - The episode turns to the flaws and cracks within fighting.
20:54 - What is the component of muscle memory, and what role does it play?
24:31 - Ron and Chris want to know how Robin dissects fighters.
33:24 - Does Robin have any questions about cyber security?
 
Links:
Follow Robin on Twitter, Instagram.
Follow Bellator MMA on Youtube.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
Learn more about ByteChek, and mention Hacker Valley Studio to receive a limited time offer!]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2203</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>104</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 103 - Social Influence and Voting in Cyber with Kiersten Todd</title>
        <itunes:title>Episode 103 - Social Influence and Voting in Cyber with Kiersten Todd</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-103-social-influence-and-voting-in-cyber-with-kiersten-todd/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-103-social-influence-and-voting-in-cyber-with-kiersten-todd/#comments</comments>        <pubDate>Mon, 02 Nov 2020 16:57:59 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3fedb310-669e-3d08-b0e1-7615875f462f</guid>
                                    <description><![CDATA[<p>In this episode, our guest is Kiersten Todd, a cybersecurity innovator for small and medium sized businesses. Kiersten is also behind creating the legislation for Department of Homeland security. There are very few subjects that Kiersten doesn't have experience on in cybersecurity. She's also the managing director of the cyber readiness Institute. Chris and Ron had a great time speaking to Kiersten and she comes with a wealth of knowledge. </p>
<p> </p>
<p><a href='https://cyberreadinessinstitute.org/'>The Cyber Readiness Institute </a></p>
<p><a href='https://www.linkedin.com/in/kiersten-e-todt-73b81359/'>Kiersten's LinkedIn</a></p>
<p>Email: <a href='mailto:ktodt@cyberreadinessinstitute.org'>ktodt@cyberreadinessinstitute.org </a></p>
<p>Take our Free AttackIQ course and earn your badge here: <a href='http://www.hackervalley.com/easy'>www.hackervalley.com/easy</a></p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, our guest is Kiersten Todd, a cybersecurity innovator for small and medium sized businesses. Kiersten is also behind creating the legislation for Department of Homeland security. There are very few subjects that Kiersten doesn't have experience on in cybersecurity. She's also the managing director of the cyber readiness Institute. Chris and Ron had a great time speaking to Kiersten and she comes with a wealth of knowledge. </p>
<p> </p>
<p><a href='https://cyberreadinessinstitute.org/'>The Cyber Readiness Institute </a></p>
<p><a href='https://www.linkedin.com/in/kiersten-e-todt-73b81359/'>Kiersten's LinkedIn</a></p>
<p>Email: <a href='mailto:ktodt@cyberreadinessinstitute.org'>ktodt@cyberreadinessinstitute.org </a></p>
<p>Take our Free AttackIQ course and earn your badge here: <a href='http://www.hackervalley.com/easy'>www.hackervalley.com/easy</a></p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xgzkp7/HVS_Ron_Template78uoy.mp3" length="28937856" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, our guest is Kiersten Todd, a cybersecurity innovator for small and medium sized businesses. Kiersten is also behind creating the legislation for Department of Homeland security. There are very few subjects that Kiersten doesn't have experience on in cybersecurity. She's also the managing director of the cyber readiness Institute. Chris and Ron had a great time speaking to Kiersten and she comes with a wealth of knowledge. 
 
The Cyber Readiness Institute 
Kiersten's LinkedIn
Email: ktodt@cyberreadinessinstitute.org 
Take our Free AttackIQ course and earn your badge here: www.hackervalley.com/easy
Get your free audiobook from Audible.com
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1804</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>103</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 102 - Tale of Three C's Craig, Corey, and Cyvatar</title>
        <itunes:title>Episode 102 - Tale of Three C's Craig, Corey, and Cyvatar</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-102-tale-of-three-cs-craig-corey-and-cyvatar/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-102-tale-of-three-cs-craig-corey-and-cyvatar/#comments</comments>        <pubDate>Wed, 28 Oct 2020 17:06:18 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/6c1ff716-0b8a-3c90-b830-d7311ca8af03</guid>
                                    <description><![CDATA[<p class="p1">In this one-of-a-kind episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview two amazing founders who are disrupting the industry and bringing in unique perspectives.  They are Corey White and Craig Goodwin, the founders of <a href='https://cyvatar.ai/'>Cyvatar</a>, a cybersecurity-as-a-service startup.  The conversation centers on the business itself, Corey and Craig’s journey as founders, and more!</p>
<p class="p1">The conversation starts with Craig and Corey sharing a bit about their respective backgrounds.  Craig has been a CISO for about 20 years, having moved into that line of work after spending the previous years working for the government of the UK and in security services.  Corey has been in his current industry for about 25 years, and he details his work with companies such as Foundstone and Cylance that eventually led him to his present work.  Craig and Corey share an entrepreneurial spirit that they’ve each had since childhood, but they have complementary backgrounds that help them to work well together, with Corey approaching the company from an industry perspective, and Craig from a CISO perspective.</p>
<p class="p1">Corey and Craig talk with their hosts about Cyvatar.  They share about their first seed round, the gaining of their first customers, and their aim to be cyber avatars for their customers - putting customer needs first and taking a background role to make the customers look good.  Further, Corey and Craig discuss the way they navigate dynamics of team synergy and collaboration when they live on different sides of the world, address their decision to include services with their startup, explain their slogan and the terminology they’ve developed, and finally share lessons they’ve learned from their journey.</p>
<p class="p1">0:56 - This is a one-of-a-kind episode!</p>
<p class="p1">2:05 - The conversation turns to Corey and Craig’s respective backgrounds.</p>
<p class="p1">5:18 - What is the background of the company?</p>
<p class="p1">8:45 - The focus shifts to Craig and Corey’s complementary skills.</p>
<p class="p1">13:19 - How did Corey and Craig realize they had an entrepreneurial spirit?</p>
<p class="p1">17:06 - A team needs synergy and collaboration.</p>
<p class="p1">20:40 - Corey and Craig decided to include services with their startup.</p>
<p class="p1">24:57 - The two founders introduced new technology.</p>
<p class="p1">27:21 - Corey and Craig are asked about lessons they’ve learned.</p>
<p class="p2"> </p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p1">Connect with Cyvatar on <a href='https://www.linkedin.com/company/cyvatar-ai/'>LinkedIn</a>.</p>
<p class="p1">Follow Cyvatar on <a href='https://twitter.com/cyvatar?lang=en'>Twitter</a>.</p>
<p class="p1">Connect with Corey White on <a href='https://www.linkedin.com/in/coreydwhite/'>LinkedIn</a>.</p>
<p class="p1">Follow Corey White on <a href='https://twitter.com/CeeDdub'>Twitter</a>.</p>
<p class="p1">Connect with Craig Goodwin on <a href='https://www.linkedin.com/in/craiggoodwin/'>LinkedIn</a>.</p>
<p class="p1">Follow Craig Goodwin on <a href='https://twitter.com/MrCraigGoodwin'>Twitter</a>.</p>
<p class="p3">Email Corey at <a href='mailto:corey@cyvatar.ai'>corey@cyvatar.ai</a></p>
<p class="p3">Email Craig at <a href='mailto:craig@cyvatar.ai'>craig@cyvatar.ai</a></p>
<p class="p1">Learn about Cyvatar’s recent <a href='https://www.crunchbase.com/funding_round/cyvatar-ai-inc-seed--fa914f5e'>seed round</a> and <a href='https://apnews.com/press-release/news-direct-corporation/technology-business-corporate-news-north-america-products-and-services-3276064e1cae317bdf60abd5cbed53fb'>press release</a>.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this one-of-a-kind episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris interview two amazing founders who are disrupting the industry and bringing in unique perspectives.  They are Corey White and Craig Goodwin, the founders of <a href='https://cyvatar.ai/'>Cyvatar</a>, a cybersecurity-as-a-service startup.  The conversation centers on the business itself, Corey and Craig’s journey as founders, and more!</p>
<p class="p1">The conversation starts with Craig and Corey sharing a bit about their respective backgrounds.  Craig has been a CISO for about 20 years, having moved into that line of work after spending the previous years working for the government of the UK and in security services.  Corey has been in his current industry for about 25 years, and he details his work with companies such as Foundstone and Cylance that eventually led him to his present work.  Craig and Corey share an entrepreneurial spirit that they’ve each had since childhood, but they have complementary backgrounds that help them to work well together, with Corey approaching the company from an industry perspective, and Craig from a CISO perspective.</p>
<p class="p1">Corey and Craig talk with their hosts about Cyvatar.  They share about their first seed round, the gaining of their first customers, and their aim to be cyber avatars for their customers - putting customer needs first and taking a background role to make the customers look good.  Further, Corey and Craig discuss the way they navigate dynamics of team synergy and collaboration when they live on different sides of the world, address their decision to include services with their startup, explain their slogan and the terminology they’ve developed, and finally share lessons they’ve learned from their journey.</p>
<p class="p1">0:56 - This is a one-of-a-kind episode!</p>
<p class="p1">2:05 - The conversation turns to Corey and Craig’s respective backgrounds.</p>
<p class="p1">5:18 - What is the background of the company?</p>
<p class="p1">8:45 - The focus shifts to Craig and Corey’s complementary skills.</p>
<p class="p1">13:19 - How did Corey and Craig realize they had an entrepreneurial spirit?</p>
<p class="p1">17:06 - A team needs synergy and collaboration.</p>
<p class="p1">20:40 - Corey and Craig decided to include services with their startup.</p>
<p class="p1">24:57 - The two founders introduced new technology.</p>
<p class="p1">27:21 - Corey and Craig are asked about lessons they’ve learned.</p>
<p class="p2"> </p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p1">Connect with Cyvatar on <a href='https://www.linkedin.com/company/cyvatar-ai/'>LinkedIn</a>.</p>
<p class="p1">Follow Cyvatar on <a href='https://twitter.com/cyvatar?lang=en'>Twitter</a>.</p>
<p class="p1">Connect with Corey White on <a href='https://www.linkedin.com/in/coreydwhite/'>LinkedIn</a>.</p>
<p class="p1">Follow Corey White on <a href='https://twitter.com/CeeDdub'>Twitter</a>.</p>
<p class="p1">Connect with Craig Goodwin on <a href='https://www.linkedin.com/in/craiggoodwin/'>LinkedIn</a>.</p>
<p class="p1">Follow Craig Goodwin on <a href='https://twitter.com/MrCraigGoodwin'>Twitter</a>.</p>
<p class="p3">Email Corey at <a href='mailto:corey@cyvatar.ai'>corey@cyvatar.ai</a></p>
<p class="p3">Email Craig at <a href='mailto:craig@cyvatar.ai'>craig@cyvatar.ai</a></p>
<p class="p1">Learn about Cyvatar’s recent <a href='https://www.crunchbase.com/funding_round/cyvatar-ai-inc-seed--fa914f5e'>seed round</a> and <a href='https://apnews.com/press-release/news-direct-corporation/technology-business-corporate-news-north-america-products-and-services-3276064e1cae317bdf60abd5cbed53fb'>press release</a>.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/26svtg/Hacker_Valley_Studio_Cyvatar_Mix_2_8upn9.mp3" length="29828972" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this one-of-a-kind episode of the Hacker Valley Studio podcast, hosts Ron and Chris interview two amazing founders who are disrupting the industry and bringing in unique perspectives.  They are Corey White and Craig Goodwin, the founders of Cyvatar, a cybersecurity-as-a-service startup.  The conversation centers on the business itself, Corey and Craig’s journey as founders, and more!
The conversation starts with Craig and Corey sharing a bit about their respective backgrounds.  Craig has been a CISO for about 20 years, having moved into that line of work after spending the previous years working for the government of the UK and in security services.  Corey has been in his current industry for about 25 years, and he details his work with companies such as Foundstone and Cylance that eventually led him to his present work.  Craig and Corey share an entrepreneurial spirit that they’ve each had since childhood, but they have complementary backgrounds that help them to work well together, with Corey approaching the company from an industry perspective, and Craig from a CISO perspective.
Corey and Craig talk with their hosts about Cyvatar.  They share about their first seed round, the gaining of their first customers, and their aim to be cyber avatars for their customers - putting customer needs first and taking a background role to make the customers look good.  Further, Corey and Craig discuss the way they navigate dynamics of team synergy and collaboration when they live on different sides of the world, address their decision to include services with their startup, explain their slogan and the terminology they’ve developed, and finally share lessons they’ve learned from their journey.
0:56 - This is a one-of-a-kind episode!
2:05 - The conversation turns to Corey and Craig’s respective backgrounds.
5:18 - What is the background of the company?
8:45 - The focus shifts to Craig and Corey’s complementary skills.
13:19 - How did Corey and Craig realize they had an entrepreneurial spirit?
17:06 - A team needs synergy and collaboration.
20:40 - Corey and Craig decided to include services with their startup.
24:57 - The two founders introduced new technology.
27:21 - Corey and Craig are asked about lessons they’ve learned.
 
Get your free audiobook from Audible.com
Learn more about Hacker Valley Studio
Connect with Cyvatar on LinkedIn.
Follow Cyvatar on Twitter.
Connect with Corey White on LinkedIn.
Follow Corey White on Twitter.
Connect with Craig Goodwin on LinkedIn.
Follow Craig Goodwin on Twitter.
Email Corey at corey@cyvatar.ai
Email Craig at craig@cyvatar.ai
Learn about Cyvatar’s recent seed round and press release.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1864</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>102</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 101 - US CyberWeek With Congresswoman Yvette Clarke and Laura Robbins</title>
        <itunes:title>Episode 101 - US CyberWeek With Congresswoman Yvette Clarke and Laura Robbins</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-101-us-cyberweek-with-congresswoman-yvette-clarke-and-laura-robbins/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-101-us-cyberweek-with-congresswoman-yvette-clarke-and-laura-robbins/#comments</comments>        <pubDate>Thu, 22 Oct 2020 22:42:44 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/265e18fd-defc-36fc-9130-95bfae55217e</guid>
                                    <description><![CDATA[<p>The Daniel Initiative was kind enough to involve us in a special event for CyberWeek. We produced a live podcast session called "Our Space". Ron and Chris, from the award-winning podcast Hacker Valley Studio, interviewed Congresswoman Yvette Clarke (NY-9th) and Laura Cathcart Robbins from "The Only One in the Room Podcast".</p>
<p>Both interviews focused on representation, people of color in technology leadership, and occupying our place in society.</p>
<p> </p>
<p>Congresswoman Yvette Clarke's Social</p>
<p><a href='https://www.instagram.com/repyvetteclarke/'>https://www.instagram.com/repyvetteclarke/</a>
<a href='https://twitter.com/VoteYvette'>https://twitter.com/VoteYvette</a>
<a href='https://www.linkedin.com/in/yvette-clarke-9b3aa810/'>https://www.linkedin.com/in/yvette-clarke-9b3aa810/</a></p>
<p> </p>
<p>Laura Robbins' Social</p>
<p><a href='https://theonlyonepod.com/'>https://theonlyonepod.com/</a>
<a href='https://www.instagram.com/lauracathcartrobbins/'>https://www.instagram.com/lauracathcartrobbins/</a>
<a href='https://twitter.com/lauracrobbins?lang=en'>https://twitter.com/lauracrobbins?lang=en</a>
<a href='https://twitter.com/TheOnlyOnePodc1'>https://twitter.com/TheOnlyOnePodc1</a></p>
<p> </p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The Daniel Initiative was kind enough to involve us in a special event for CyberWeek. We produced a live podcast session called "Our Space". Ron and Chris, from the award-winning podcast Hacker Valley Studio, interviewed Congresswoman Yvette Clarke (NY-9th) and Laura Cathcart Robbins from "The Only One in the Room Podcast".</p>
<p>Both interviews focused on representation, people of color in technology leadership, and occupying our place in society.</p>
<p> </p>
<p>Congresswoman Yvette Clarke's Social</p>
<p><a href='https://www.instagram.com/repyvetteclarke/'>https://www.instagram.com/repyvetteclarke/</a><br>
<a href='https://twitter.com/VoteYvette'>https://twitter.com/VoteYvette</a><br>
<a href='https://www.linkedin.com/in/yvette-clarke-9b3aa810/'>https://www.linkedin.com/in/yvette-clarke-9b3aa810/</a></p>
<p> </p>
<p>Laura Robbins' Social</p>
<p><a href='https://theonlyonepod.com/'>https://theonlyonepod.com/</a><br>
<a href='https://www.instagram.com/lauracathcartrobbins/'>https://www.instagram.com/lauracathcartrobbins/</a><br>
<a href='https://twitter.com/lauracrobbins?lang=en'>https://twitter.com/lauracrobbins?lang=en</a><br>
<a href='https://twitter.com/TheOnlyOnePodc1'>https://twitter.com/TheOnlyOnePodc1</a></p>
<p> </p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/kzid2j/Episode_101_US_Cyber_Week9pdwg.mp3" length="54604032" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The Daniel Initiative was kind enough to involve us in a special event for CyberWeek. We produced a live podcast session called "Our Space". Ron and Chris, from the award-winning podcast Hacker Valley Studio, interviewed Congresswoman Yvette Clarke (NY-9th) and Laura Cathcart Robbins from "The Only One in the Room Podcast".
Both interviews focused on representation, people of color in technology leadership, and occupying our place in society.
 
Congresswoman Yvette Clarke's Social
https://www.instagram.com/repyvetteclarke/https://twitter.com/VoteYvettehttps://www.linkedin.com/in/yvette-clarke-9b3aa810/
 
Laura Robbins' Social
https://theonlyonepod.com/https://www.instagram.com/lauracathcartrobbins/https://twitter.com/lauracrobbins?lang=enhttps://twitter.com/TheOnlyOnePodc1
 
Get your free audiobook from Audible.com
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3408</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>101</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 100 - A Very Special Episode</title>
        <itunes:title>Episode 100 - A Very Special Episode</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-100-a-very-special-episode-1603304344/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-100-a-very-special-episode-1603304344/#comments</comments>        <pubDate>Wed, 21 Oct 2020 13:19:04 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/26b14b68-2fd1-36f5-866d-c8097a289590</guid>
                                    <description><![CDATA[<p>In this special 100th episode we dip into the Hacker Valley Studio vault to bring you never before heard content from some brilliant experts in their field. We will be releasing these episodes in their entirety on our Patreon page down below.</p>
<p><a href='https://www.linkedin.com/in/travismcpeak/'>Travis McPeak</a></p>
<p><a href='https://www.linkedin.com/in/bhargavarishi/'>Rishi Bhargava</a></p>
<p><a href='https://www.linkedin.com/in/simransakraney/'>Simran S. Sakraney</a></p>
<p><a href='https://www.linkedin.com/in/gary-berman-8aa36475/'>Gary Berman</a></p>
<p><a href='https://www.instagram.com/getchimpy/?hl=en'>Josh Halbert</a></p>
<p><a href='https://www.linkedin.com/in/nickvigier/'>Nick Vigier</a></p>
<p><a href='https://www.linkedin.com/in/daviottenheimer/'>Davi Ottenheimer</a></p>
<p><a href='https://www.linkedin.com/in/christinamorillo/'>Christina Morillo</a></p>
<p><a href='https://www.linkedin.com/in/rafael-nunez-167347148/'>Rafael Nunez</a></p>
<p> </p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this special 100th episode we dip into the Hacker Valley Studio vault to bring you never before heard content from some brilliant experts in their field. We will be releasing these episodes in their entirety on our Patreon page down below.</p>
<p><a href='https://www.linkedin.com/in/travismcpeak/'>Travis McPeak</a></p>
<p><a href='https://www.linkedin.com/in/bhargavarishi/'>Rishi Bhargava</a></p>
<p><a href='https://www.linkedin.com/in/simransakraney/'>Simran S. Sakraney</a></p>
<p><a href='https://www.linkedin.com/in/gary-berman-8aa36475/'>Gary Berman</a></p>
<p><a href='https://www.instagram.com/getchimpy/?hl=en'>Josh Halbert</a></p>
<p><a href='https://www.linkedin.com/in/nickvigier/'>Nick Vigier</a></p>
<p><a href='https://www.linkedin.com/in/daviottenheimer/'>Davi Ottenheimer</a></p>
<p><a href='https://www.linkedin.com/in/christinamorillo/'>Christina Morillo</a></p>
<p><a href='https://www.linkedin.com/in/rafael-nunez-167347148/'>Rafael Nunez</a></p>
<p> </p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4em3ht/Episode_100_Final_Version_57eufo.mp3" length="61674240" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this special 100th episode we dip into the Hacker Valley Studio vault to bring you never before heard content from some brilliant experts in their field. We will be releasing these episodes in their entirety on our Patreon page down below.
Travis McPeak
Rishi Bhargava
Simran S. Sakraney
Gary Berman
Josh Halbert
Nick Vigier
Davi Ottenheimer
Christina Morillo
Rafael Nunez
 
Get your free audiobook from Audible.com
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3850</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>100</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 99 -  Securityweek's 2020 CISO Forum: HVS Style</title>
        <itunes:title>Episode 99 -  Securityweek's 2020 CISO Forum: HVS Style</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-99-securityweeks-ciso-forum-hvs-style/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-99-securityweeks-ciso-forum-hvs-style/#comments</comments>        <pubDate>Mon, 12 Oct 2020 15:54:31 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/470eee8d-8bc7-3109-b6db-a1cfad263fa0</guid>
                                    <description><![CDATA[<p>In this special live recording of the <a href='http://www.hackervalley.com/'>Hacker Valley Studio podcast</a>,  Chris and Ron are joined by Fredrick 'Flee' Lee, chief security officer at Gusto and an inspirational cybersecurity leader who is focused on making security "lovable" across the organization.</p>
<p>Securityweek’s CISO Forum is designed for senior level security leaders to discuss, share and learn innovative information security and risk management strategies. The forum addresses issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.</p>
<p>The Hacker Valley Studio podcast explores the human element of cybersecurity programs and the inspirational stories and knowledge to elevate culture and quality of security programs.</p>
<p> </p>
<p><a href='https://www.cisoforum.com/'>Learn more about Securityweek’s CISO Forum</a></p>
<p><a href='https://twitter.com/fredrickl'>Follow Flee on Twitter</a></p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this special live recording of the <a href='http://www.hackervalley.com/'>Hacker Valley Studio podcast</a>,  Chris and Ron are joined by Fredrick 'Flee' Lee, chief security officer at Gusto and an inspirational cybersecurity leader who is focused on making security "lovable" across the organization.</p>
<p>Securityweek’s CISO Forum is designed for senior level security leaders to discuss, share and learn innovative information security and risk management strategies. The forum addresses issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.</p>
<p>The Hacker Valley Studio podcast explores the human element of cybersecurity programs and the inspirational stories and knowledge to elevate culture and quality of security programs.</p>
<p> </p>
<p><a href='https://www.cisoforum.com/'>Learn more about Securityweek’s CISO Forum</a></p>
<p><a href='https://twitter.com/fredrickl'>Follow Flee on Twitter</a></p>
<p><a href='http://www.audibletrack.com/click.track?CID=102175&AFID=468319'>Get your free audiobook from Audible.com</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qcjun7/Security_Week_CISO_Forum_Flee_Episodebvz9c.mp3" length="30221184" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this special live recording of the Hacker Valley Studio podcast,  Chris and Ron are joined by Fredrick 'Flee' Lee, chief security officer at Gusto and an inspirational cybersecurity leader who is focused on making security "lovable" across the organization.
Securityweek’s CISO Forum is designed for senior level security leaders to discuss, share and learn innovative information security and risk management strategies. The forum addresses issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.
The Hacker Valley Studio podcast explores the human element of cybersecurity programs and the inspirational stories and knowledge to elevate culture and quality of security programs.
 
Learn more about Securityweek’s CISO Forum
Follow Flee on Twitter
Get your free audiobook from Audible.com]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1884</itunes:duration>
        <itunes:season>3</itunes:season>
        <itunes:episode>99</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Finale - Marco Figueroa</title>
        <itunes:title>Hacker Valley Red Finale - Marco Figueroa</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-finale-marco-figeroua/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-finale-marco-figeroua/#comments</comments>        <pubDate>Tue, 06 Oct 2020 15:02:05 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7e492c94-272a-3743-80f5-074e074911a0</guid>
                                    <description><![CDATA[<p class="p1">This episode of the Hacker Valley Studio podcast concludes the Hacker Valley Red series.  In this finale, Ron and Chris interview their friend - and formerly their shared roommate - Marco Figueroa.  Marco is a security researcher and cybersecurity speaker, and he is also a bug bounty enthusiast.  He and the hosts constant improvement, bug bounty, and more, while also looking back at the conversations thus far in the season.</p>
<p class="p2"> </p>
<p class="p1">At the start of the conversation, Marco shares about his background and what he’s doing now.  He runs through the past 7-8 years of his career, ultimately arriving at his current transition to Sentinel.  Ron and Chris jump in to thank him for his contributions to their podcast, and to share with listeners about their friendship with Marco.  Moving forward, Marco talks about how he first got into the security community, and eventually found a niche in reverse-engineering malware.  He also involved himself in the bug bounty community, and in his various spheres of life, he is committed to building relationships and staying relevant.  Marco explains his system of scheduling calls, his practice of (and future plans for) content creation, and love of learning and feedback.</p>
<p class="p2"> </p>
<p class="p1">Throughout the conversation, Ron and Chris lead the conversation to cover a wide variety of topics.  They ask about the possibility of an unhackable device (which Marco denies), the mindset of a hacker, Marco’s philosophy in protection work, and the question of whether or not coding experience is needed for hacking.  The group looks back to former conversation about the hacker mindset (with Ted), about community (with Alex), and about social engineering (with Rachel).  In view of the whole season, the group considers two main takeaways: the value of mentorship and the need to put oneself out there and take a first shot.  Marco shares a lot from his own experience, and makes sure listeners know to press on and trust the process.</p>
<p class="p2"> </p>
<p class="p1">-The episode features Marco Figueroa, and listeners are introduced to the content ahead.</p>
<p class="p1">-What is Marco’s background, and what is he doing now?</p>
<p class="p1">-Is there such a thing as an unhackable device?</p>
<p class="p1">-The group talks about Marco’s philosophy in his protection work, the place of social engineering, and the value of building relationships.</p>
<p class="p1">-What is the hacker mindset, and do you need coding experience to be a good hacker?</p>
<p class="p1">-If interested in the red side of the field, what should someone do first?</p>
<p class="p1">-Marco shares about what he sees on the horizon.</p>
<p class="p1">-The group considers two major season takeaways: the value of mentorship and the need to put yourself out there and take the first shot.</p>
<p class="p1">-Where is Marco planning to take his contact creation from here?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://twitter.com/marcofigueroa?lang=en'>Connect with Marco Figueroa on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/marco-figueroa-bb250314/'>Connect with Marco on LinkedIn</a></p>
<p class="p3"><a href='https://www.pscp.tv/marcomcse/1eaKbzzAOZkKX'>Follow Marco’s Livestream</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This episode of the <em>Hacker Valley Studio</em> podcast concludes the <em>Hacker Valley Red</em> series.  In this finale, Ron and Chris interview their friend - and formerly their shared roommate - Marco Figueroa.  Marco is a security researcher and cybersecurity speaker, and he is also a bug bounty enthusiast.  He and the hosts constant improvement, bug bounty, and more, while also looking back at the conversations thus far in the season.</p>
<p class="p2"> </p>
<p class="p1">At the start of the conversation, Marco shares about his background and what he’s doing now.  He runs through the past 7-8 years of his career, ultimately arriving at his current transition to Sentinel.  Ron and Chris jump in to thank him for his contributions to their podcast, and to share with listeners about their friendship with Marco.  Moving forward, Marco talks about how he first got into the security community, and eventually found a niche in reverse-engineering malware.  He also involved himself in the bug bounty community, and in his various spheres of life, he is committed to building relationships and staying relevant.  Marco explains his system of scheduling calls, his practice of (and future plans for) content creation, and love of learning and feedback.</p>
<p class="p2"> </p>
<p class="p1">Throughout the conversation, Ron and Chris lead the conversation to cover a wide variety of topics.  They ask about the possibility of an unhackable device (which Marco denies), the mindset of a hacker, Marco’s philosophy in protection work, and the question of whether or not coding experience is needed for hacking.  The group looks back to former conversation about the hacker mindset (with Ted), about community (with Alex), and about social engineering (with Rachel).  In view of the whole season, the group considers two main takeaways: the value of mentorship and the need to put oneself out there and take a first shot.  Marco shares a lot from his own experience, and makes sure listeners know to press on and trust the process.</p>
<p class="p2"> </p>
<p class="p1">-The episode features Marco Figueroa, and listeners are introduced to the content ahead.</p>
<p class="p1">-What is Marco’s background, and what is he doing now?</p>
<p class="p1">-Is there such a thing as an unhackable device?</p>
<p class="p1">-The group talks about Marco’s philosophy in his protection work, the place of social engineering, and the value of building relationships.</p>
<p class="p1">-What is the hacker mindset, and do you need coding experience to be a good hacker?</p>
<p class="p1">-If interested in the red side of the field, what should someone do first?</p>
<p class="p1">-Marco shares about what he sees on the horizon.</p>
<p class="p1">-The group considers two major season takeaways: the value of mentorship and the need to put yourself out there and take the first shot.</p>
<p class="p1">-Where is Marco planning to take his contact creation from here?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://twitter.com/marcofigueroa?lang=en'>Connect with Marco Figueroa on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/marco-figueroa-bb250314/'>Connect with Marco on LinkedIn</a></p>
<p class="p3"><a href='https://www.pscp.tv/marcomcse/1eaKbzzAOZkKX'>Follow Marco’s Livestream</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/iz8rih/Hacker_Valley_Red_Season_Finale_MIX.mp3" length="45116609" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This episode of the Hacker Valley Studio podcast concludes the Hacker Valley Red series.  In this finale, Ron and Chris interview their friend - and formerly their shared roommate - Marco Figueroa.  Marco is a security researcher and cybersecurity speaker, and he is also a bug bounty enthusiast.  He and the hosts constant improvement, bug bounty, and more, while also looking back at the conversations thus far in the season.
 
At the start of the conversation, Marco shares about his background and what he’s doing now.  He runs through the past 7-8 years of his career, ultimately arriving at his current transition to Sentinel.  Ron and Chris jump in to thank him for his contributions to their podcast, and to share with listeners about their friendship with Marco.  Moving forward, Marco talks about how he first got into the security community, and eventually found a niche in reverse-engineering malware.  He also involved himself in the bug bounty community, and in his various spheres of life, he is committed to building relationships and staying relevant.  Marco explains his system of scheduling calls, his practice of (and future plans for) content creation, and love of learning and feedback.
 
Throughout the conversation, Ron and Chris lead the conversation to cover a wide variety of topics.  They ask about the possibility of an unhackable device (which Marco denies), the mindset of a hacker, Marco’s philosophy in protection work, and the question of whether or not coding experience is needed for hacking.  The group looks back to former conversation about the hacker mindset (with Ted), about community (with Alex), and about social engineering (with Rachel).  In view of the whole season, the group considers two main takeaways: the value of mentorship and the need to put oneself out there and take a first shot.  Marco shares a lot from his own experience, and makes sure listeners know to press on and trust the process.
 
-The episode features Marco Figueroa, and listeners are introduced to the content ahead.
-What is Marco’s background, and what is he doing now?
-Is there such a thing as an unhackable device?
-The group talks about Marco’s philosophy in his protection work, the place of social engineering, and the value of building relationships.
-What is the hacker mindset, and do you need coding experience to be a good hacker?
-If interested in the red side of the field, what should someone do first?
-Marco shares about what he sees on the horizon.
-The group considers two major season takeaways: the value of mentorship and the need to put yourself out there and take the first shot.
-Where is Marco planning to take his contact creation from here?
 
Links:
Connect with Marco Figueroa on Twitter
Connect with Marco on LinkedIn
Follow Marco’s Livestream
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about the season sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2819</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>8</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Episode 7 - Maurice Ashley</title>
        <itunes:title>Hacker Valley Red Episode 7 - Maurice Ashley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-7-maurice-ashley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-7-maurice-ashley/#comments</comments>        <pubDate>Tue, 06 Oct 2020 15:00:39 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/26963043-9efc-3d2f-b10f-82dd720e0b64</guid>
                                    <description><![CDATA[<p class="p1">This episode of Hacker Valley Studio podcast’s Hacker Valley Red Series features guest Maurice Ashley, a chess grandmaster and author of<a href='https://www.amazon.com/Chess-Success-Using-Strengths-Children/dp/0767915682'> Chess for Success</a>. Maurice is a chess guru and has been playing it ever since his high school years. He is currently involved in commentating for chess events, teaching chess, and training national chess champions. In this episode, Maurice and the hosts talk about Maurice’s chess journey along with some parallels between chess and cyber security.</p>
<p class="p1">The hosts, Ron and Chris, start off the interview by pointing out one parallel between chess and cybersecurity: the art of training. Maurice responds by sharing about the rigorous training of chess, and of the different strategies and techniques that must be learned. He also takes some time to explain his own journey with training in chess and how it progressed through the years. In high school, he started playing with his brother, and then moved to playing in more formal settings with more challenging opponents. This eventually led to earning the title of chess grandmaster. Being the first black male to receive the Chess Grandmaster title, Maurice speaks on how this accomplishment inspired others to reach for their goals.</p>
<p class="p1">Circling back to the parallels between chess and cyber security, Maurice touches on the importance of practicing for performance. This means knowing your opponent, studying their strategies, and using their energy against them. Chris and Ron highlight how this parallels with cyber security in knowing how to approach the opponent. They then ask Maurice about his thoughts on an unbeatable chess player and how it relates to an unhackable system. Maurice responds by explaining that in the game if chess with its millions of possible outcomes, having an unbeatable player is impossible. Additionally, He emphasizes how this truth relates to cyber security. Rather than focusing on being unbeatable, Maurice encourages focus to be spent on readiness which is acquired through practice. In cyber security, Chris and Ron explain how readiness means having the ability to respond automatically to situations. They ask Maurice about blitz and bullet chess and how it relates to this kind of practice. According to Maurice, blitz and bullet chess rely heavily on instinct and experience.</p>
<p class="p1">The conversation ends as the hosts ask Maurice to share some tips for people interested in learning chess. Maurice encourages people interested in chess to download his new app,<a href='https://mauriceashley.com/learn-chess-with-maurice-ashley-app-2/'> Learn Chess with Maurice Ashley</a>, where he provides lessons on chess. He closes by encouraging others to reach for the greatness inside them. According to Maurice, greatness is defined as having the right mindset, doing the hard work, making the sacrifices, and learning through the process. This is the greatness that will be reflected in the end goal.</p>
<p class="p1">2:49 - Maurice introduces himself</p>
<p class="p1">6:46 - Maurice’s journey of becoming a grandmaster</p>
<p class="p1">9:20 - The impact of Exposure</p>
<p class="p1">11:07 - Maurice tells of the significance of being the first black male to earn the title of Chess Grandmaster.</p>
<p class="p1">15:00 - Maurice tells of the influence of his family in earning the title of Chess Grandmaster.</p>
<p class="p1">17:58 - Maurice speaks on practicing for performance and how it relates to cyber security.</p>
<p class="p1">22:00 -The parallels between an unbeatable chess player and an unhackable system</p>
<p class="p1">25:18 - Maurice explains blitz and bullet chess and how it relates to cyber security.</p>
<p class="p1">33:25 - Maurice gives some tips on how to get started playing chess.</p>
<p class="p1">37:04 - Maurice gives advice on how to reach greatness.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">To learn more about Maurice Ashley, visit<a href='https://mauriceashley.com'> https://mauriceashley.com</a></p>
<p class="p1">Follow Maurice Ashley on <a href='https://twitter.com/MauriceAshley?ref_src=twsrc%25255Egoogle%25257Ctwcamp%25255Eserp%25257Ctwgr%25255Eauthor'> Twitter</a> and<a href='https://www.instagram.com/mauriceashleychess/?hl=en'> Instagram</a></p>
<p class="p1">Learn more about Maurice Ashley’s book<a href='https://www.amazon.com/Chess-Success-Using-Strengths-Children/dp/0767915682'> Chess for Success</a> and his app<a href='https://mauriceashley.com/learn-chess-with-maurice-ashley-app-2/'> Learn Chess with Maurice Ashley</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This episode of <em>Hacker Valley Studio</em> podcast’s <em>Hacker Valley Red Series</em> features guest Maurice Ashley, a chess grandmaster and author of<a href='https://www.amazon.com/Chess-Success-Using-Strengths-Children/dp/0767915682'> Chess for Success</a>. Maurice is a chess guru and has been playing it ever since his high school years. He is currently involved in commentating for chess events, teaching chess, and training national chess champions. In this episode, Maurice and the hosts talk about Maurice’s chess journey along with some parallels between chess and cyber security.</p>
<p class="p1">The hosts, Ron and Chris, start off the interview by pointing out one parallel between chess and cybersecurity: the art of training. Maurice responds by sharing about the rigorous training of chess, and of the different strategies and techniques that must be learned. He also takes some time to explain his own journey with training in chess and how it progressed through the years. In high school, he started playing with his brother, and then moved to playing in more formal settings with more challenging opponents. This eventually led to earning the title of chess grandmaster. Being the first black male to receive the Chess Grandmaster title, Maurice speaks on how this accomplishment inspired others to reach for their goals.</p>
<p class="p1">Circling back to the parallels between chess and cyber security, Maurice touches on the importance of practicing for performance. This means knowing your opponent, studying their strategies, and using their energy against them. Chris and Ron highlight how this parallels with cyber security in knowing how to approach the opponent. They then ask Maurice about his thoughts on an unbeatable chess player and how it relates to an unhackable system. Maurice responds by explaining that in the game if chess with its millions of possible outcomes, having an unbeatable player is impossible. Additionally, He emphasizes how this truth relates to cyber security. Rather than focusing on being unbeatable, Maurice encourages focus to be spent on readiness which is acquired through practice. In cyber security, Chris and Ron explain how readiness means having the ability to respond automatically to situations. They ask Maurice about blitz and bullet chess and how it relates to this kind of practice. According to Maurice, blitz and bullet chess rely heavily on instinct and experience.</p>
<p class="p1">The conversation ends as the hosts ask Maurice to share some tips for people interested in learning chess. Maurice encourages people interested in chess to download his new app,<a href='https://mauriceashley.com/learn-chess-with-maurice-ashley-app-2/'> Learn Chess with Maurice Ashley</a>, where he provides lessons on chess. He closes by encouraging others to reach for the greatness inside them. According to Maurice, greatness is defined as having the right mindset, doing the hard work, making the sacrifices, and learning through the process. This is the greatness that will be reflected in the end goal.</p>
<p class="p1">2:49 - Maurice introduces himself</p>
<p class="p1">6:46 - Maurice’s journey of becoming a grandmaster</p>
<p class="p1">9:20 - The impact of Exposure</p>
<p class="p1">11:07 - Maurice tells of the significance of being the first black male to earn the title of Chess Grandmaster.</p>
<p class="p1">15:00 - Maurice tells of the influence of his family in earning the title of Chess Grandmaster.</p>
<p class="p1">17:58 - Maurice speaks on practicing for performance and how it relates to cyber security.</p>
<p class="p1">22:00 -The parallels between an unbeatable chess player and an unhackable system</p>
<p class="p1">25:18 - Maurice explains blitz and bullet chess and how it relates to cyber security.</p>
<p class="p1">33:25 - Maurice gives some tips on how to get started playing chess.</p>
<p class="p1">37:04 - Maurice gives advice on how to reach greatness.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p1">To learn more about Maurice Ashley, visit<a href='https://mauriceashley.com'> https://mauriceashley.com</a></p>
<p class="p1">Follow Maurice Ashley on <a href='https://twitter.com/MauriceAshley?ref_src=twsrc%25255Egoogle%25257Ctwcamp%25255Eserp%25257Ctwgr%25255Eauthor'> Twitter</a> and<a href='https://www.instagram.com/mauriceashleychess/?hl=en'> Instagram</a></p>
<p class="p1">Learn more about Maurice Ashley’s book<a href='https://www.amazon.com/Chess-Success-Using-Strengths-Children/dp/0767915682'> Chess for Success</a> and his app<a href='https://mauriceashley.com/learn-chess-with-maurice-ashley-app-2/'> Learn Chess with Maurice Ashley</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hbckxn/Maurice_Final_MP3acdyg.mp3" length="39646080" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This episode of Hacker Valley Studio podcast’s Hacker Valley Red Series features guest Maurice Ashley, a chess grandmaster and author of Chess for Success. Maurice is a chess guru and has been playing it ever since his high school years. He is currently involved in commentating for chess events, teaching chess, and training national chess champions. In this episode, Maurice and the hosts talk about Maurice’s chess journey along with some parallels between chess and cyber security.
The hosts, Ron and Chris, start off the interview by pointing out one parallel between chess and cybersecurity: the art of training. Maurice responds by sharing about the rigorous training of chess, and of the different strategies and techniques that must be learned. He also takes some time to explain his own journey with training in chess and how it progressed through the years. In high school, he started playing with his brother, and then moved to playing in more formal settings with more challenging opponents. This eventually led to earning the title of chess grandmaster. Being the first black male to receive the Chess Grandmaster title, Maurice speaks on how this accomplishment inspired others to reach for their goals.
Circling back to the parallels between chess and cyber security, Maurice touches on the importance of practicing for performance. This means knowing your opponent, studying their strategies, and using their energy against them. Chris and Ron highlight how this parallels with cyber security in knowing how to approach the opponent. They then ask Maurice about his thoughts on an unbeatable chess player and how it relates to an unhackable system. Maurice responds by explaining that in the game if chess with its millions of possible outcomes, having an unbeatable player is impossible. Additionally, He emphasizes how this truth relates to cyber security. Rather than focusing on being unbeatable, Maurice encourages focus to be spent on readiness which is acquired through practice. In cyber security, Chris and Ron explain how readiness means having the ability to respond automatically to situations. They ask Maurice about blitz and bullet chess and how it relates to this kind of practice. According to Maurice, blitz and bullet chess rely heavily on instinct and experience.
The conversation ends as the hosts ask Maurice to share some tips for people interested in learning chess. Maurice encourages people interested in chess to download his new app, Learn Chess with Maurice Ashley, where he provides lessons on chess. He closes by encouraging others to reach for the greatness inside them. According to Maurice, greatness is defined as having the right mindset, doing the hard work, making the sacrifices, and learning through the process. This is the greatness that will be reflected in the end goal.
2:49 - Maurice introduces himself
6:46 - Maurice’s journey of becoming a grandmaster
9:20 - The impact of Exposure
11:07 - Maurice tells of the significance of being the first black male to earn the title of Chess Grandmaster.
15:00 - Maurice tells of the influence of his family in earning the title of Chess Grandmaster.
17:58 - Maurice speaks on practicing for performance and how it relates to cyber security.
22:00 -The parallels between an unbeatable chess player and an unhackable system
25:18 - Maurice explains blitz and bullet chess and how it relates to cyber security.
33:25 - Maurice gives some tips on how to get started playing chess.
37:04 - Maurice gives advice on how to reach greatness.
 
Links:
To learn more about Maurice Ashley, visit https://mauriceashley.com
Follow Maurice Ashley on  Twitter and Instagram
Learn more about Maurice Ashley’s book Chess for Success and his app Learn Chess with Maurice Ashley
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about the season sponsor, RiskI]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2473</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>7</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Episode 6 - Lisa Jiggetts</title>
        <itunes:title>Hacker Valley Red Episode 6 - Lisa Jiggetts</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-6-lisa-jiggetts/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-6-lisa-jiggetts/#comments</comments>        <pubDate>Tue, 06 Oct 2020 14:46:24 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/791adab7-3044-34f0-9d42-829e8f5fb3df</guid>
                                    <description><![CDATA[<p class="p1">On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Lisa Jiggetts, founder of Women’s Society of Cyberjutsu. Their conversation covers Lisa’s background, her current work and her involvement as a penetration tester.</p>
<p class="p2"> </p>
<p class="p1">Lisa says she’s always been a techie who loved gadgets, breaking things and trying to understand how they fit together. She knew she wanted to work with computers, but wasn’t sure what that meant, exactly. Out of high school she joined the military working in IT, but knew she wanted to be a hacker. Eventually, she made her way to pentesting apps and systems in the cloud. Lisa loves the game aspect of pentesting and the red team. She says she enjoys the challenge of trying to get into the box and “level up,” trying more and more ways in before reaching out for help.</p>
<p class="p2"> </p>
<p class="p1">In between jobs a few years ago, Lisa began dreaming of a hands on training group for women like herself. It began as a meet-up group, which grew into the Women’s Society of Cyberjutsu, (WSC). She wanted hands-on workshops and an opportunity for networking and building a network of mentors and mentees. The first workshops and members were women in IT and even outside of tech, who were looking for a change and challenge in their career. Now the organization is in a state of growth with chapters across the country. To anyone interested, she says WSC gives the opportunity for hands-on training and a network of support.</p>
<p class="p2"> </p>
<p class="p1">As the episode ends, Lisa shares her advice to anyone interested in the red team or the world of cyber security in general. Her number one piece of advice is networking, because that’s the way she’s found a lot of her work in the past. She also encourages listeners, regardless of where they’re starting, to get their skills up any way they can. The field is always changing, Lisa says, so the initiative to work and show up is invaluable.</p>
<p class="p2"> </p>
<p class="p1">2:12 - The episode and guest are introduced.</p>
<p class="p1">3:50 - Lisa gives an overview of her background.</p>
<p class="p1">10:00 - Lisa explains her breaker mentality.</p>
<p class="p1">15:57 - What made Lisa commit to pentesting and the red team?</p>
<p class="p1">20:34 - Lisa discusses the founding of the Women’s Society of Cyberjutsu.</p>
<p class="p1">29:44 - Lisa’s advice for listeners interested in the red team and cyber security.</p>
<p class="p1"> </p>
<p class="p1">Links:</p>
<p class="p2"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p2"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p2"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p2"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p2"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p2"><a href='https://womenscyberjutsu.org/'>Learn more about WSC</a></p>
<p class="p2"><a href='https://twitter.com/lisajiggetts'>Follow Lisa Jiggetts on Twitter</a></p>
<a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a>]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">On this episode of <em>Hacker Valley Studio, </em>hosts Ron and Chris speak with Lisa Jiggetts, founder of Women’s Society of Cyberjutsu. Their conversation covers Lisa’s background, her current work and her involvement as a penetration tester.</p>
<p class="p2"> </p>
<p class="p1">Lisa says she’s always been a techie who loved gadgets, breaking things and trying to understand how they fit together. She knew she wanted to work with computers, but wasn’t sure what that meant, exactly. Out of high school she joined the military working in IT, but knew she wanted to be a hacker. Eventually, she made her way to pentesting apps and systems in the cloud. Lisa loves the game aspect of pentesting and the red team. She says she enjoys the challenge of trying to get into the box and “level up,” trying more and more ways in before reaching out for help.</p>
<p class="p2"> </p>
<p class="p1">In between jobs a few years ago, Lisa began dreaming of a hands on training group for women like herself. It began as a meet-up group, which grew into the Women’s Society of Cyberjutsu, (WSC). She wanted hands-on workshops and an opportunity for networking and building a network of mentors and mentees. The first workshops and members were women in IT and even outside of tech, who were looking for a change and challenge in their career. Now the organization is in a state of growth with chapters across the country. To anyone interested, she says WSC gives the opportunity for hands-on training and a network of support.</p>
<p class="p2"> </p>
<p class="p1">As the episode ends, Lisa shares her advice to anyone interested in the red team or the world of cyber security in general. Her number one piece of advice is networking, because that’s the way she’s found a lot of her work in the past. She also encourages listeners, regardless of where they’re starting, to get their skills up any way they can. The field is always changing, Lisa says, so the initiative to work and show up is invaluable.</p>
<p class="p2"> </p>
<p class="p1">2:12 - The episode and guest are introduced.</p>
<p class="p1">3:50 - Lisa gives an overview of her background.</p>
<p class="p1">10:00 - Lisa explains her breaker mentality.</p>
<p class="p1">15:57 - What made Lisa commit to pentesting and the red team?</p>
<p class="p1">20:34 - Lisa discusses the founding of the Women’s Society of Cyberjutsu.</p>
<p class="p1">29:44 - Lisa’s advice for listeners interested in the red team and cyber security.</p>
<p class="p1"> </p>
<p class="p1">Links:</p>
<p class="p2"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p2"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p2"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p2"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p2"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p2"><a href='https://womenscyberjutsu.org/'>Learn more about WSC</a></p>
<p class="p2"><a href='https://twitter.com/lisajiggetts'>Follow Lisa Jiggetts on Twitter</a></p>
<a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a>]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/cvvvsq/Hacker_Valley_Red_Episode_6_Mix.mp3" length="32834708" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Lisa Jiggetts, founder of Women’s Society of Cyberjutsu. Their conversation covers Lisa’s background, her current work and her involvement as a penetration tester.
 
Lisa says she’s always been a techie who loved gadgets, breaking things and trying to understand how they fit together. She knew she wanted to work with computers, but wasn’t sure what that meant, exactly. Out of high school she joined the military working in IT, but knew she wanted to be a hacker. Eventually, she made her way to pentesting apps and systems in the cloud. Lisa loves the game aspect of pentesting and the red team. She says she enjoys the challenge of trying to get into the box and “level up,” trying more and more ways in before reaching out for help.
 
In between jobs a few years ago, Lisa began dreaming of a hands on training group for women like herself. It began as a meet-up group, which grew into the Women’s Society of Cyberjutsu, (WSC). She wanted hands-on workshops and an opportunity for networking and building a network of mentors and mentees. The first workshops and members were women in IT and even outside of tech, who were looking for a change and challenge in their career. Now the organization is in a state of growth with chapters across the country. To anyone interested, she says WSC gives the opportunity for hands-on training and a network of support.
 
As the episode ends, Lisa shares her advice to anyone interested in the red team or the world of cyber security in general. Her number one piece of advice is networking, because that’s the way she’s found a lot of her work in the past. She also encourages listeners, regardless of where they’re starting, to get their skills up any way they can. The field is always changing, Lisa says, so the initiative to work and show up is invaluable.
 
2:12 - The episode and guest are introduced.
3:50 - Lisa gives an overview of her background.
10:00 - Lisa explains her breaker mentality.
15:57 - What made Lisa commit to pentesting and the red team?
20:34 - Lisa discusses the founding of the Women’s Society of Cyberjutsu.
29:44 - Lisa’s advice for listeners interested in the red team and cyber security.
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about WSC
Follow Lisa Jiggetts on Twitter
Learn more about the season sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2052</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>6</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Episode 5 - Ted Harrington</title>
        <itunes:title>Hacker Valley Red Episode 5 - Ted Harrington</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-5-ted-harrington/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-5-ted-harrington/#comments</comments>        <pubDate>Tue, 06 Oct 2020 14:44:10 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ee649869-83ff-3180-a493-1f8659e1205a</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast’s Hacker Valley Red series, this time featuring guest Ted Harrington.  Ted is an Executive Partner at<a href='https://www.ise.io/'> ISE Security</a>, an author, and a professional speaker. Hosts Ron and Chris speak with Ted about the concept of unhackability, his experience in the security field, an interesting story of an attack in real time, and more!</p>
<p class="p2"> </p>
<p class="p1">To start off the interview, Ted shares about his background.  He currently works for a consulting firm that focuses on ethical hacking and aims to help companies solve their security problems, and his interest in the work of hacking goes back to a car-hacking experience in which he and his colleagues were inspired by a claim of unhackability and disproved the claim.  Ted clarifies that there is effectively no such thing as an unhackable device or application, but that his work centers on closing attack vectors and making security systems stronger.  In fact, he wants his legacy in the field to center on making things better.  He shares about his own energy and motivation, and also explains the mindset of a hacker, which involves creativity and a certain way of thinking about and solving problems.</p>
<p class="p2"> </p>
<p class="p1">Ted has learned a great deal in his years in the hacking field, and Ron and Chris are eager to draw lessons out for listeners.  Ted explains misconceptions about the red side of security before providing an extended example of hacking in real time: an example of cryptocurrency wallets that involved Ted and his team happening upon a real thief at work.  Ted explains that people should not have a laissez-faire attitude about security, and that they should foster a right mindset and right partnerships.  He clarifies that he sees many breakers start as builders, explains the utility of thinking from the perspective of a buyer, and offers advice for listeners looking to enter the field.  This advice centers on mindset and hands-on activity; there are lots of opportunities to get involved with <a href='https://www.defcon.org/'>DEF CON</a>, talks, contests, and even internships (including <a href='https://www.ise.io/careers/'>some at Ted’s company</a>). </p>
<p class="p2"> </p>
<p class="p1">1:50 - The episode features Ted Harrington; listeners are introduced to him and the episode ahead.</p>
<p class="p1">3:05 - The conversation begins with Ted’s background.</p>
<p class="p1">7:21 - The group considers the term “unhackable,” closing attack vectors, and breakers starting as builders.</p>
<p class="p1">14:02 - “Think like a hacker.”</p>
<p class="p1">20:02 - Ted explains some lessons from real-life work, focusing on a cryptocurrency wallet example.</p>
<p class="p1">25:13 - What should people learn and do?</p>
<p class="p1">30:38 - Where do Ted’s energy and motivation come from, and what is the most interesting part of his work?</p>
<p class="p1">34:32 - Ted offers advice and shares what he hopes his legacy in the field will be.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://www.linkedin.com/in/securityted/'>Connect with Ted on LinkedIn</a> or email him at <a href='mailto:ted@ise.io'>ted@ise.io</a></p>
<p class="p3"><a href='https://www.hackablebook.com/'>Learn about Ted’s book, Hackable</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast’s <em>Hacker Valley Red</em> series, this time featuring guest Ted Harrington.  Ted is an Executive Partner at<a href='https://www.ise.io/'> ISE Security</a>, an author, and a professional speaker. Hosts Ron and Chris speak with Ted about the concept of unhackability, his experience in the security field, an interesting story of an attack in real time, and more!</p>
<p class="p2"> </p>
<p class="p1">To start off the interview, Ted shares about his background.  He currently works for a consulting firm that focuses on ethical hacking and aims to help companies solve their security problems, and his interest in the work of hacking goes back to a car-hacking experience in which he and his colleagues were inspired by a claim of unhackability and disproved the claim.  Ted clarifies that there is effectively no such thing as an unhackable device or application, but that his work centers on closing attack vectors and making security systems stronger.  In fact, he wants his legacy in the field to center on making things better.  He shares about his own energy and motivation, and also explains the mindset of a hacker, which involves creativity and a certain way of thinking about and solving problems.</p>
<p class="p2"> </p>
<p class="p1">Ted has learned a great deal in his years in the hacking field, and Ron and Chris are eager to draw lessons out for listeners.  Ted explains misconceptions about the red side of security before providing an extended example of hacking in real time: an example of cryptocurrency wallets that involved Ted and his team happening upon a real thief at work.  Ted explains that people should not have a laissez-faire attitude about security, and that they should foster a right mindset and right partnerships.  He clarifies that he sees many breakers start as builders, explains the utility of thinking from the perspective of a buyer, and offers advice for listeners looking to enter the field.  This advice centers on mindset and hands-on activity; there are lots of opportunities to get involved with <a href='https://www.defcon.org/'>DEF CON</a>, talks, contests, and even internships (including <a href='https://www.ise.io/careers/'>some at Ted’s company</a>). </p>
<p class="p2"> </p>
<p class="p1">1:50 - The episode features Ted Harrington; listeners are introduced to him and the episode ahead.</p>
<p class="p1">3:05 - The conversation begins with Ted’s background.</p>
<p class="p1">7:21 - The group considers the term “unhackable,” closing attack vectors, and breakers starting as builders.</p>
<p class="p1">14:02 - “Think like a hacker.”</p>
<p class="p1">20:02 - Ted explains some lessons from real-life work, focusing on a cryptocurrency wallet example.</p>
<p class="p1">25:13 - What should people learn and do?</p>
<p class="p1">30:38 - Where do Ted’s energy and motivation come from, and what is the most interesting part of his work?</p>
<p class="p1">34:32 - Ted offers advice and shares what he hopes his legacy in the field will be.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://www.linkedin.com/in/securityted/'>Connect with Ted on LinkedIn</a> or email him at <a href='mailto:ted@ise.io'>ted@ise.io</a></p>
<p class="p3"><a href='https://www.hackablebook.com/'>Learn about Ted’s book, <em>Hackable</em></a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/uupicv/Hacker_Valley_Red_Episode_5_Mix.mp3" length="39851150" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast’s Hacker Valley Red series, this time featuring guest Ted Harrington.  Ted is an Executive Partner at ISE Security, an author, and a professional speaker. Hosts Ron and Chris speak with Ted about the concept of unhackability, his experience in the security field, an interesting story of an attack in real time, and more!
 
To start off the interview, Ted shares about his background.  He currently works for a consulting firm that focuses on ethical hacking and aims to help companies solve their security problems, and his interest in the work of hacking goes back to a car-hacking experience in which he and his colleagues were inspired by a claim of unhackability and disproved the claim.  Ted clarifies that there is effectively no such thing as an unhackable device or application, but that his work centers on closing attack vectors and making security systems stronger.  In fact, he wants his legacy in the field to center on making things better.  He shares about his own energy and motivation, and also explains the mindset of a hacker, which involves creativity and a certain way of thinking about and solving problems.
 
Ted has learned a great deal in his years in the hacking field, and Ron and Chris are eager to draw lessons out for listeners.  Ted explains misconceptions about the red side of security before providing an extended example of hacking in real time: an example of cryptocurrency wallets that involved Ted and his team happening upon a real thief at work.  Ted explains that people should not have a laissez-faire attitude about security, and that they should foster a right mindset and right partnerships.  He clarifies that he sees many breakers start as builders, explains the utility of thinking from the perspective of a buyer, and offers advice for listeners looking to enter the field.  This advice centers on mindset and hands-on activity; there are lots of opportunities to get involved with DEF CON, talks, contests, and even internships (including some at Ted’s company). 
 
1:50 - The episode features Ted Harrington; listeners are introduced to him and the episode ahead.
3:05 - The conversation begins with Ted’s background.
7:21 - The group considers the term “unhackable,” closing attack vectors, and breakers starting as builders.
14:02 - “Think like a hacker.”
20:02 - Ted explains some lessons from real-life work, focusing on a cryptocurrency wallet example.
25:13 - What should people learn and do?
30:38 - Where do Ted’s energy and motivation come from, and what is the most interesting part of his work?
34:32 - Ted offers advice and shares what he hopes his legacy in the field will be.
 
Links:
Connect with Ted on LinkedIn or email him at ted@ise.io
Learn about Ted’s book, Hackable
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about the season sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2490</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>5</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Episode 4 - Alissa Knight</title>
        <itunes:title>Hacker Valley Red Episode 4 - Alissa Knight</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-4-alissa-knight/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-4-alissa-knight/#comments</comments>        <pubDate>Tue, 06 Oct 2020 14:42:22 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c6391e60-0dc4-32e3-96ee-a9d7acc0a0a3</guid>
                                    <description><![CDATA[<p class="p1">On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Alissa Knight, author of the book Hacking Connected Cars and self described “recovering hacker.” Their conversation covers content creation, API’s and hacking cars.</p>
<p class="p2"> </p>
<p class="p1">Alissa grew up in Seattle, Washington where there was a big art scene. She began building her own computers and running her own boards at an early age. She says a lot of people don’t know that she started out in the BBS scene back in the 90’s. At seventeen she hacked into a government network and was arrested. Eventually, the charges were dropped on a technicality and she went on to work for the US Intelligence Community in cyber warfare.</p>
<p class="p2"> </p>
<p class="p1">Alissa’s first start-up was a web design company where she ran a Lennox webserver around the time the teardrop attack in Lennox servers. The people she rented office space from were teardropping her web hosting server. She picked up a book on cyber security, and got introduced into the world of cyber security through necessity. She had a passion for finding vulnerabilities, and understanding things that were difficult to understand, which is what brought her to embedded systems. The rest she says is history.</p>
<p class="p2"> </p>
<p class="p1">As the episode ends, Alissa talks about her YouTube Channel, KnighTV. She says she’s always been an artist, and always wanted to do things at 200%. Her following is relatively new, at the beginning of 2019 she only had 4 followers on Twitter and now she’s passed the threshold to be part of the YouTube Partner Program. She wanted a cinematic experience for the viewer to stand out and not be just another video for the viewer. For anyone interested in getting started in being a breaker, she’s posted a couple videos on the topic, and explains there are many resources at their disposal. She says this line of work takes grit, and in her opinion a passion for reading.</p>
<p class="p2"> </p>
<p class="p3">2:08 - The episode and guest are introduced.</p>
<p class="p3">3:19 - Alissa gives an overview of her background.</p>
<p class="p3">6:29 - How Alissa’s career began.</p>
<p class="p3">10:16 - Do you have to program to hack?</p>
<p class="p3">14:26 - What led Alissa to hacking cars?</p>
<p class="p3">24:55 - Alissa explains what people get wrong about the red team.</p>
<p class="p3">29:25 - Alissa answers the question, “is there an unhackable device?”</p>
<p class="p3">36:54 - How KnightTV came into being.</p>
<p class="p3">41:08 - Alissa gives her advice on where to start getting into cyber security</p>
<p class="p4"> </p>
<p class="p3">Links:</p>
<p class="p5"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/alissaknight'>Follow Alissa Knight on Twitter</a></p>
<p class="p5"><a href='https://www.youtube.com/channel/UCejZj1i5m_UlwPqu_7IqBwQ'>Subscribe to Alissa’s YouTube Channel</a></p>
<p class="p5"><a href='http://www.riskiq.com'>Learn more about the season sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">On this episode of <em>Hacker Valley Studio, </em>hosts Ron and Chris speak with Alissa Knight, author of the book <em>Hacking Connected Cars</em> and self described “recovering hacker.” Their conversation covers content creation, API’s and hacking cars.</p>
<p class="p2"> </p>
<p class="p1">Alissa grew up in Seattle, Washington where there was a big art scene. She began building her own computers and running her own boards at an early age. She says a lot of people don’t know that she started out in the BBS scene back in the 90’s. At seventeen she hacked into a government network and was arrested. Eventually, the charges were dropped on a technicality and she went on to work for the US Intelligence Community in cyber warfare.</p>
<p class="p2"> </p>
<p class="p1">Alissa’s first start-up was a web design company where she ran a Lennox webserver around the time the teardrop attack in Lennox servers. The people she rented office space from were teardropping her web hosting server. She picked up a book on cyber security, and got introduced into the world of cyber security through necessity. She had a passion for finding vulnerabilities, and understanding things that were difficult to understand, which is what brought her to embedded systems. The rest she says is history.</p>
<p class="p2"> </p>
<p class="p1">As the episode ends, Alissa talks about her YouTube Channel, KnighTV. She says she’s always been an artist, and always wanted to do things at 200%. Her following is relatively new, at the beginning of 2019 she only had 4 followers on Twitter and now she’s passed the threshold to be part of the YouTube Partner Program. She wanted a cinematic experience for the viewer to stand out and not be just another video for the viewer. For anyone interested in getting started in being a breaker, she’s posted a couple videos on the topic, and explains there are many resources at their disposal. She says this line of work takes grit, and in her opinion a passion for reading.</p>
<p class="p2"> </p>
<p class="p3">2:08 - The episode and guest are introduced.</p>
<p class="p3">3:19 - Alissa gives an overview of her background.</p>
<p class="p3">6:29 - How Alissa’s career began.</p>
<p class="p3">10:16 - Do you have to program to hack?</p>
<p class="p3">14:26 - What led Alissa to hacking cars?</p>
<p class="p3">24:55 - Alissa explains what people get wrong about the red team.</p>
<p class="p3">29:25 - Alissa answers the question, “is there an unhackable device?”</p>
<p class="p3">36:54 - How KnightTV came into being.</p>
<p class="p3">41:08 - Alissa gives her advice on where to start getting into cyber security</p>
<p class="p4"> </p>
<p class="p3">Links:</p>
<p class="p5"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p5"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p5"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p5"><a href='https://twitter.com/alissaknight'>Follow Alissa Knight on Twitter</a></p>
<p class="p5"><a href='https://www.youtube.com/channel/UCejZj1i5m_UlwPqu_7IqBwQ'>Subscribe to Alissa’s YouTube Channel</a></p>
<p class="p5"><a href='http://www.riskiq.com'>Learn more about the season sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/pshqsg/Hacker_Valley_Studio_Hacker_Valley_Red_Episode_4_MIX.mp3" length="44375552" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Alissa Knight, author of the book Hacking Connected Cars and self described “recovering hacker.” Their conversation covers content creation, API’s and hacking cars.
 
Alissa grew up in Seattle, Washington where there was a big art scene. She began building her own computers and running her own boards at an early age. She says a lot of people don’t know that she started out in the BBS scene back in the 90’s. At seventeen she hacked into a government network and was arrested. Eventually, the charges were dropped on a technicality and she went on to work for the US Intelligence Community in cyber warfare.
 
Alissa’s first start-up was a web design company where she ran a Lennox webserver around the time the teardrop attack in Lennox servers. The people she rented office space from were teardropping her web hosting server. She picked up a book on cyber security, and got introduced into the world of cyber security through necessity. She had a passion for finding vulnerabilities, and understanding things that were difficult to understand, which is what brought her to embedded systems. The rest she says is history.
 
As the episode ends, Alissa talks about her YouTube Channel, KnighTV. She says she’s always been an artist, and always wanted to do things at 200%. Her following is relatively new, at the beginning of 2019 she only had 4 followers on Twitter and now she’s passed the threshold to be part of the YouTube Partner Program. She wanted a cinematic experience for the viewer to stand out and not be just another video for the viewer. For anyone interested in getting started in being a breaker, she’s posted a couple videos on the topic, and explains there are many resources at their disposal. She says this line of work takes grit, and in her opinion a passion for reading.
 
2:08 - The episode and guest are introduced.
3:19 - Alissa gives an overview of her background.
6:29 - How Alissa’s career began.
10:16 - Do you have to program to hack?
14:26 - What led Alissa to hacking cars?
24:55 - Alissa explains what people get wrong about the red team.
29:25 - Alissa answers the question, “is there an unhackable device?”
36:54 - How KnightTV came into being.
41:08 - Alissa gives her advice on where to start getting into cyber security
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Follow Alissa Knight on Twitter
Subscribe to Alissa’s YouTube Channel
Learn more about the season sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2773</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>4</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Episode 3 - Alex Rice</title>
        <itunes:title>Hacker Valley Red Episode 3 - Alex Rice</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-3-alex-rice/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-3-alex-rice/#comments</comments>        <pubDate>Tue, 06 Oct 2020 14:40:20 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/574f1a99-ac90-3ace-8100-78ab4c9ea9b0</guid>
                                    <description><![CDATA[<p class="p1">This episode of the Hacker Valley Studio podcast continues the Hacker Valley Red series by featuring Alex Rice.  Alex is the CTO and co-founder of <a href='https://www.hackerone.com/'>HackerOne</a>, and he joins hosts Ron and Chris for a conversation about such topics as the beginnings of the researcher community, bug bounty, and the term “hacker.” </p>
<p class="p2"> </p>
<p class="p1">Alex first shares about his background leading up to what he’s doing today.  He worked as a developer, and then about 20 years ago, he moved into the security field.  Part of his career trajectory was motivated by his frustration over a lack of feedback loops, and he explains both how HackerOne came to be and some details about bug bounty.  Ron and Chris are particularly interested in why HackerOne has the term “hacker” in it, even though the term can carry with it negative connotations (however inaccurate they may be).  Alex clarifies that he and his colleagues do not want to beat around the bush, but want to be part of the work of dismantling false stereotypes about hacking. </p>
<p class="p2"> </p>
<p class="p1">Moving forward in the conversation, Alex covers a variety of topics related to his work.  He addresses changes in hackers’ experiences with cease and desist orders, the bug bounty community, and the gamification of security and hacking.  He shares about different motivations of security researchers, teenagers making a lot of income through bug bounty, hacking outliers and their personas, impacts of COVID-19, and writing reports.  Ron and Chris ask Alex about whether or not unhackability is possible (spoiler: it’s not!), as well as about the closest thing to unhackable that can be achieved.  Alex explains what he’s looking toward in the future, talks about his love of outdoor work, and finally offers encouragement to the person in bug bounty looking to keep progressing in the field.</p>
<p class="p2"> </p>
<p class="p1">1:34 - Listeners are introduced to Alex Rice and the conversation to come.</p>
<p class="p1">2:41 - What is Alex’s background, and what is he doing today?</p>
<p class="p1">7:45 - Alex explains why the term “hacker” is included in his company’s name.</p>
<p class="p1">10:45 - The group considers cease and desist orders, bug bounty community, and gamification of security and hacking.</p>
<p class="p1">18:11 - Alex addresses the reality of teenagers making millions through bug bounty, as well as the personas of hacking outliers.</p>
<p class="p1">22:43 - Alex talks bug bounty, COVID-19, and writing reports.</p>
<p class="p1">25:41 - Is unhackability possible?  If not, what’s the closest we can get to it?</p>
<p class="p1">30:02 - The conversation concludes with Alex’s thoughts on the future, hobbies, and encouragement to people in bug bounty looking to continue in the field.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://twitter.com/senorarroz?lang=en'>Connect with Alex Rice on Twitter</a></p>
<p class="p3"><a href='https://hackerone.com/hacktivity'>Connect with the Bug Bounty Community at hackerone.com/hacktivity</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This episode of the <em>Hacker Valley Studio</em> podcast continues the <em>Hacker Valley Red</em> series by featuring Alex Rice.  Alex is the CTO and co-founder of <a href='https://www.hackerone.com/'>HackerOne</a>, and he joins hosts Ron and Chris for a conversation about such topics as the beginnings of the researcher community, bug bounty, and the term “hacker.” </p>
<p class="p2"> </p>
<p class="p1">Alex first shares about his background leading up to what he’s doing today.  He worked as a developer, and then about 20 years ago, he moved into the security field.  Part of his career trajectory was motivated by his frustration over a lack of feedback loops, and he explains both how HackerOne came to be and some details about bug bounty.  Ron and Chris are particularly interested in why HackerOne has the term “hacker” in it, even though the term can carry with it negative connotations (however inaccurate they may be).  Alex clarifies that he and his colleagues do not want to beat around the bush, but want to be part of the work of dismantling false stereotypes about hacking. </p>
<p class="p2"> </p>
<p class="p1">Moving forward in the conversation, Alex covers a variety of topics related to his work.  He addresses changes in hackers’ experiences with cease and desist orders, the bug bounty community, and the gamification of security and hacking.  He shares about different motivations of security researchers, teenagers making a lot of income through bug bounty, hacking outliers and their personas, impacts of COVID-19, and writing reports.  Ron and Chris ask Alex about whether or not unhackability is possible (spoiler: it’s not!), as well as about the closest thing to unhackable that can be achieved.  Alex explains what he’s looking toward in the future, talks about his love of outdoor work, and finally offers encouragement to the person in bug bounty looking to keep progressing in the field.</p>
<p class="p2"> </p>
<p class="p1">1:34 - Listeners are introduced to Alex Rice and the conversation to come.</p>
<p class="p1">2:41 - What is Alex’s background, and what is he doing today?</p>
<p class="p1">7:45 - Alex explains why the term “hacker” is included in his company’s name.</p>
<p class="p1">10:45 - The group considers cease and desist orders, bug bounty community, and gamification of security and hacking.</p>
<p class="p1">18:11 - Alex addresses the reality of teenagers making millions through bug bounty, as well as the personas of hacking outliers.</p>
<p class="p1">22:43 - Alex talks bug bounty, COVID-19, and writing reports.</p>
<p class="p1">25:41 - Is unhackability possible?  If not, what’s the closest we can get to it?</p>
<p class="p1">30:02 - The conversation concludes with Alex’s thoughts on the future, hobbies, and encouragement to people in bug bounty looking to continue in the field.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://twitter.com/senorarroz?lang=en'>Connect with Alex Rice on Twitter</a></p>
<p class="p3"><a href='https://hackerone.com/hacktivity'>Connect with the Bug Bounty Community at hackerone.com/hacktivity</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6kvpvy/Hacker_Valley_Red_Episode_3_MIX.mp3" length="36617732" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This episode of the Hacker Valley Studio podcast continues the Hacker Valley Red series by featuring Alex Rice.  Alex is the CTO and co-founder of HackerOne, and he joins hosts Ron and Chris for a conversation about such topics as the beginnings of the researcher community, bug bounty, and the term “hacker.” 
 
Alex first shares about his background leading up to what he’s doing today.  He worked as a developer, and then about 20 years ago, he moved into the security field.  Part of his career trajectory was motivated by his frustration over a lack of feedback loops, and he explains both how HackerOne came to be and some details about bug bounty.  Ron and Chris are particularly interested in why HackerOne has the term “hacker” in it, even though the term can carry with it negative connotations (however inaccurate they may be).  Alex clarifies that he and his colleagues do not want to beat around the bush, but want to be part of the work of dismantling false stereotypes about hacking. 
 
Moving forward in the conversation, Alex covers a variety of topics related to his work.  He addresses changes in hackers’ experiences with cease and desist orders, the bug bounty community, and the gamification of security and hacking.  He shares about different motivations of security researchers, teenagers making a lot of income through bug bounty, hacking outliers and their personas, impacts of COVID-19, and writing reports.  Ron and Chris ask Alex about whether or not unhackability is possible (spoiler: it’s not!), as well as about the closest thing to unhackable that can be achieved.  Alex explains what he’s looking toward in the future, talks about his love of outdoor work, and finally offers encouragement to the person in bug bounty looking to keep progressing in the field.
 
1:34 - Listeners are introduced to Alex Rice and the conversation to come.
2:41 - What is Alex’s background, and what is he doing today?
7:45 - Alex explains why the term “hacker” is included in his company’s name.
10:45 - The group considers cease and desist orders, bug bounty community, and gamification of security and hacking.
18:11 - Alex addresses the reality of teenagers making millions through bug bounty, as well as the personas of hacking outliers.
22:43 - Alex talks bug bounty, COVID-19, and writing reports.
25:41 - Is unhackability possible?  If not, what’s the closest we can get to it?
30:02 - The conversation concludes with Alex’s thoughts on the future, hobbies, and encouragement to people in bug bounty looking to continue in the field.
 
Links:
Connect with Alex Rice on Twitter
Connect with the Bug Bounty Community at hackerone.com/hacktivity
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about the season sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2288</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>3</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Episode 2 - Rachel Tobac</title>
        <itunes:title>Hacker Valley Red Episode 2 - Rachel Tobac</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-2-rachel-tobac/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-2-rachel-tobac/#comments</comments>        <pubDate>Tue, 06 Oct 2020 14:38:58 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5504092b-4659-3c8d-a3cd-3d872b1ad17f</guid>
                                    <description><![CDATA[<p class="p1">On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Rachel Tobac, CEO of SocialProof Security and Chair of the Women in Security and Privacy Board. Their conversation covers everything from neuroscience to spearfishing and human’s place in cyber security.</p>
<p class="p2"> </p>
<p class="p1">Rachel is a human hacker, also known as a social engineer, and she begins the episode by explaining her background in social engineering and experience in the non profit space. She credits her success in the field to her background in neuroscience and behavioral psychology as well as training in improv. Her husband works in cyber security and encouraged her into the space even though she was nervous at first because she didn’t know how to code.</p>
<p class="p2"> </p>
<p class="p1">Rachel explains that she still does not know how to code, her most important skills in social engineering are the ability to persuade and improv. When working with companies, Rachel helps client facing employees to help confirm people are who they say they are. She sits down with them to go through processes that help her close the loopholes that allow hackers to mine information. Humans are the first line of defense, so they have to have their guard up. From there, keeping the organization up  to date on the latest trends in cyber security and how hackers find their way in is key to getting the correct tools to prevent hacks.</p>
<p class="p2"> </p>
<p class="p1">As the episode ends, Rachel shares her next steps are working with hospitals to prevent ransomware and phishing attacks. She’s also turning her attention toward the election and educating people on what the 2020 Presidential election will look like and the time it may take to announce the winner. While she does not currently think elections can be done entirely from home, she considers it a goal for the future.</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p1">1:59 - Rachel Tobac and today’s episode of Hacker Valley Red is introduced.</p>
<p class="p1">8:50 - What are the skills needed to become a social engineer?</p>
<p class="p1">10:51 - Rachel leads Ron and Chris through an improv exercise.</p>
<p class="p1">13:59 - Rachel shares where she thinks technology is headed.</p>
<p class="p1">20:20 - Rachel shares the scariest part of social engineering hacks.</p>
<p class="p1">25:29 - Rachel’s key takeaways.</p>
<p class="p1">34:11 - Rachel is looking toward 2020 election security.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.amazon.com/Prince-City-Giuliani-Genius-American/dp/1594030847'>Follow Rachel Tobac on Twitter</a></p>
<p class="p3"><a href='http://www.riskiq.com'>Learn more about the season sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">On this episode of <em>Hacker Valley Studio, </em>hosts Ron and Chris speak with Rachel Tobac, CEO of SocialProof Security and Chair of the Women in Security and Privacy Board. Their conversation covers everything from neuroscience to spearfishing and human’s place in cyber security.</p>
<p class="p2"> </p>
<p class="p1">Rachel is a human hacker, also known as a social engineer, and she begins the episode by explaining her background in social engineering and experience in the non profit space. She credits her success in the field to her background in neuroscience and behavioral psychology as well as training in improv. Her husband works in cyber security and encouraged her into the space even though she was nervous at first because she didn’t know how to code.</p>
<p class="p2"> </p>
<p class="p1">Rachel explains that she still does not know how to code, her most important skills in social engineering are the ability to persuade and improv. When working with companies, Rachel helps client facing employees to help confirm people are who they say they are. She sits down with them to go through processes that help her close the loopholes that allow hackers to mine information. Humans are the first line of defense, so they have to have their guard up. From there, keeping the organization up  to date on the latest trends in cyber security and how hackers find their way in is key to getting the correct tools to prevent hacks.</p>
<p class="p2"> </p>
<p class="p1">As the episode ends, Rachel shares her next steps are working with hospitals to prevent ransomware and phishing attacks. She’s also turning her attention toward the election and educating people on what the 2020 Presidential election will look like and the time it may take to announce the winner. While she does not currently think elections can be done entirely from home, she considers it a goal for the future.</p>
<p class="p2"> </p>
<p class="p2"> </p>
<p class="p1">1:59 - Rachel Tobac and today’s episode of Hacker Valley Red is introduced.</p>
<p class="p1">8:50 - What are the skills needed to become a social engineer?</p>
<p class="p1">10:51 - Rachel leads Ron and Chris through an improv exercise.</p>
<p class="p1">13:59 - Rachel shares where she thinks technology is headed.</p>
<p class="p1">20:20 - Rachel shares the scariest part of social engineering hacks.</p>
<p class="p1">25:29 - Rachel’s key takeaways.</p>
<p class="p1">34:11 - Rachel is looking toward 2020 election security.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.amazon.com/Prince-City-Giuliani-Genius-American/dp/1594030847'>Follow Rachel Tobac on Twitter</a></p>
<p class="p3"><a href='http://www.riskiq.com'>Learn more about the season sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vtzqmd/Hacker_Valley_Studio_Hacker_Valley_Red_Episode_2_MIX.mp3" length="37015424" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On this episode of Hacker Valley Studio, hosts Ron and Chris speak with Rachel Tobac, CEO of SocialProof Security and Chair of the Women in Security and Privacy Board. Their conversation covers everything from neuroscience to spearfishing and human’s place in cyber security.
 
Rachel is a human hacker, also known as a social engineer, and she begins the episode by explaining her background in social engineering and experience in the non profit space. She credits her success in the field to her background in neuroscience and behavioral psychology as well as training in improv. Her husband works in cyber security and encouraged her into the space even though she was nervous at first because she didn’t know how to code.
 
Rachel explains that she still does not know how to code, her most important skills in social engineering are the ability to persuade and improv. When working with companies, Rachel helps client facing employees to help confirm people are who they say they are. She sits down with them to go through processes that help her close the loopholes that allow hackers to mine information. Humans are the first line of defense, so they have to have their guard up. From there, keeping the organization up  to date on the latest trends in cyber security and how hackers find their way in is key to getting the correct tools to prevent hacks.
 
As the episode ends, Rachel shares her next steps are working with hospitals to prevent ransomware and phishing attacks. She’s also turning her attention toward the election and educating people on what the 2020 Presidential election will look like and the time it may take to announce the winner. While she does not currently think elections can be done entirely from home, she considers it a goal for the future.
 
 
1:59 - Rachel Tobac and today’s episode of Hacker Valley Red is introduced.
8:50 - What are the skills needed to become a social engineer?
10:51 - Rachel leads Ron and Chris through an improv exercise.
13:59 - Rachel shares where she thinks technology is headed.
20:20 - Rachel shares the scariest part of social engineering hacks.
25:29 - Rachel’s key takeaways.
34:11 - Rachel is looking toward 2020 election security.
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Follow Rachel Tobac on Twitter
Learn more about the season sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2313</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Red Episode 1</title>
        <itunes:title>Hacker Valley Red Episode 1</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-1/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-red-episode-1/#comments</comments>        <pubDate>Tue, 06 Oct 2020 14:36:48 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5adce596-e4ed-3c2e-a873-d3b4a0908386</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris introduce the podcast’s new series: Hacker Valley Red.  After the previous season highlighted the defensive side of cyber security, this season will focus on the other side of the coin - the offensive side.  Ron and Chris spend this initial episode talking about their experience with the offensive side of cyber security, what listeners can look forward to hearing in the episodes ahead, and what sorts of questions experts will field throughout the season.</p>
<p class="p2"> </p>
<p class="p1">As the conversation gets underway, Ron and Chris introduce the season, which will cover such topics as the background and personas of red teamers, information about red teaming technology, misconceptions from the blue side, and what red teaming really looks like.  The hosts then share their own backgrounds in red teaming.  While they both had some prior experience with red teaming, they learned a lot through hosting the episodes in the season.  As they introduce the series ahead, Ron and Chris touch on the social side of red teaming, analogies by which red teaming can be explained, Ron’s exploitation video, the value and use of red teaming within organizations, the shared community of red and blue teaming, purple team engagement, the concept of unhackability, and more. </p>
<p class="p2"> </p>
<p class="p1">In the episodes ahead, Ron and Chris will ask guests what other aspects of life and technology help them with red teaming, and there are particular topics from the episodes that they are most excited to consider with listeners.  These topics include the issue between blue and red teams, the concept of a hacker, the idea of unhackability, and different perspectives of paths into the field of red teaming and to mastery within it.  Ron and Chris conclude their introductory conversation with two lessons they hope listeners will take from the season: the lesson that creation is a process and that the best red teamers learn to love the process, and the lesson that both red and blue team members are on the same team.</p>
<p class="p2"> </p>
<p class="p1">0:48 - The podcast is now moving to the other side of the coin: the offensive side of cyber security.</p>
<p class="p1">2:48 - Ron and Chris share their respective backgrounds in red teaming.</p>
<p class="p1">7:25 - What other aspects of life and technology help guests with red teaming?</p>
<p class="p1">10:50 - Chris asks about Ron’s exploitation video.</p>
<p class="p1">12:52 - The hosts address the iterative improvement of an organization’s security posture.</p>
<p class="p1">18:14 - Ron and Chris talk about purple team engagement.</p>
<p class="p1">21:12 - Is unhackability real or possible?</p>
<p class="p1">24:53 - Hacking can have to deal with a human, rather than a device or application.</p>
<p class="p1">26:34 - What key takeaways do the hosts want listeners to take from the season?</p>
<p class="p1">28:10 - What do Ron and Chris want listeners to learn?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris introduce the podcast’s new series: <em>Hacker Valley Red</em>.  After the previous season highlighted the defensive side of cyber security, this season will focus on the other side of the coin - the offensive side.  Ron and Chris spend this initial episode talking about their experience with the offensive side of cyber security, what listeners can look forward to hearing in the episodes ahead, and what sorts of questions experts will field throughout the season.</p>
<p class="p2"> </p>
<p class="p1">As the conversation gets underway, Ron and Chris introduce the season, which will cover such topics as the background and personas of red teamers, information about red teaming technology, misconceptions from the blue side, and what red teaming really looks like.  The hosts then share their own backgrounds in red teaming.  While they both had some prior experience with red teaming, they learned a lot through hosting the episodes in the season.  As they introduce the series ahead, Ron and Chris touch on the social side of red teaming, analogies by which red teaming can be explained, Ron’s exploitation video, the value and use of red teaming within organizations, the shared community of red and blue teaming, purple team engagement, the concept of unhackability, and more. </p>
<p class="p2"> </p>
<p class="p1">In the episodes ahead, Ron and Chris will ask guests what other aspects of life and technology help them with red teaming, and there are particular topics from the episodes that they are most excited to consider with listeners.  These topics include the issue between blue and red teams, the concept of a hacker, the idea of unhackability, and different perspectives of paths into the field of red teaming and to mastery within it.  Ron and Chris conclude their introductory conversation with two lessons they hope listeners will take from the season: the lesson that creation is a process and that the best red teamers learn to love the process, and the lesson that both red and blue team members are on the same team.</p>
<p class="p2"> </p>
<p class="p1">0:48 - The podcast is now moving to the other side of the coin: the offensive side of cyber security.</p>
<p class="p1">2:48 - Ron and Chris share their respective backgrounds in red teaming.</p>
<p class="p1">7:25 - What other aspects of life and technology help guests with red teaming?</p>
<p class="p1">10:50 - Chris asks about Ron’s exploitation video.</p>
<p class="p1">12:52 - The hosts address the iterative improvement of an organization’s security posture.</p>
<p class="p1">18:14 - Ron and Chris talk about purple team engagement.</p>
<p class="p1">21:12 - Is unhackability real or possible?</p>
<p class="p1">24:53 - Hacking can have to deal with a human, rather than a device or application.</p>
<p class="p1">26:34 - What key takeaways do the hosts want listeners to take from the season?</p>
<p class="p1">28:10 - What do Ron and Chris want listeners to learn?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the season sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vv7zgh/Hacker_Valley_Red_Episode_1_Mix_1_8ur7n.mp3" length="28874876" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris introduce the podcast’s new series: Hacker Valley Red.  After the previous season highlighted the defensive side of cyber security, this season will focus on the other side of the coin - the offensive side.  Ron and Chris spend this initial episode talking about their experience with the offensive side of cyber security, what listeners can look forward to hearing in the episodes ahead, and what sorts of questions experts will field throughout the season.
 
As the conversation gets underway, Ron and Chris introduce the season, which will cover such topics as the background and personas of red teamers, information about red teaming technology, misconceptions from the blue side, and what red teaming really looks like.  The hosts then share their own backgrounds in red teaming.  While they both had some prior experience with red teaming, they learned a lot through hosting the episodes in the season.  As they introduce the series ahead, Ron and Chris touch on the social side of red teaming, analogies by which red teaming can be explained, Ron’s exploitation video, the value and use of red teaming within organizations, the shared community of red and blue teaming, purple team engagement, the concept of unhackability, and more. 
 
In the episodes ahead, Ron and Chris will ask guests what other aspects of life and technology help them with red teaming, and there are particular topics from the episodes that they are most excited to consider with listeners.  These topics include the issue between blue and red teams, the concept of a hacker, the idea of unhackability, and different perspectives of paths into the field of red teaming and to mastery within it.  Ron and Chris conclude their introductory conversation with two lessons they hope listeners will take from the season: the lesson that creation is a process and that the best red teamers learn to love the process, and the lesson that both red and blue team members are on the same team.
 
0:48 - The podcast is now moving to the other side of the coin: the offensive side of cyber security.
2:48 - Ron and Chris share their respective backgrounds in red teaming.
7:25 - What other aspects of life and technology help guests with red teaming?
10:50 - Chris asks about Ron’s exploitation video.
12:52 - The hosts address the iterative improvement of an organization’s security posture.
18:14 - Ron and Chris talk about purple team engagement.
21:12 - Is unhackability real or possible?
24:53 - Hacking can have to deal with a human, rather than a device or application.
26:34 - What key takeaways do the hosts want listeners to take from the season?
28:10 - What do Ron and Chris want listeners to learn?
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about the season sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1804</itunes:duration>
        <itunes:season>2</itunes:season>
        <itunes:episode>1</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Season Finale</title>
        <itunes:title>Hacker Valley Blue Season Finale</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-season-finale/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-season-finale/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:13:41 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/acb64a48-5f00-33c1-9107-5e2c9964eafe</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series, Ron and Chris wrap up the season with a recap of its past episodes and major takeaways, as well as a look at what’s to come for them personally and for the podcast.</p>
<p class="p1">Looking back on the season, Ron and Chris consider the importance of communication in the field of threat intelligence, specifically thinking of insights from their talk with D’Arcy and lessons in poetry and delivery from Valentina.  They cover the surprise of Jack’s willingness to share personal thoughts, review their discussions of bias (specifically highlighting talks with Jon and Susan), and recount things learned about the concept of unhackability. Listeners will hear about the inevitability of mistakes in threat intelligence work, the “easy button” framework, the season theme of sharpening oneself outside of work, and the dynamic of a threat intelligence team.</p>
<p class="p1">The episode then turns toward Ron and Chris, themselves.  Ron first puts Chris in the hot seat and asks what the future of threat intelligence is for him.  Chris explains that, while he thinks his days as an individual contributor for threat intelligence are over, he is still doing some quiet, yet-to-be revealed work, and is turning much of his attention to giving back to the field.  Ron, in explaining his own work, talks about bouncing between tasks, building tools for others, distilling information into simple messages, and continuing to navigate issues of automation.  Finally, Ron and Chris thank people involved with the season and address what the future holds for the Hacker Valley Studio podcast.  Listeners hear the exciting announcement of the next season: Hacker Valley Red!</p>
<p class="p1">0:47 - Ron and Chris talk about the importance of communication in the field of threat intelligence.</p>
<p class="p1">2:56 - What was one surprise in this season?</p>
<p class="p1">3:52 - The hosts review their conversations about bias.</p>
<p class="p1">6:55 - The episode turns to the “easy button” framework and the need for personal sharpening outside of work.</p>
<p class="p1">16:15 - Ron and Chris consider the inevitability of analysts missing things and the building of a team.</p>
<p class="p1">20:22 - What is the future of threat intelligence for Chris and Ron?</p>
<p class="p1">27:50 - The hosts review their insights about the possibility of an unhackable device or app.</p>
<p class="p1">29:43 - What is next for the Hacker Valley Studio podcast?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast’s <em>Hacker Valley Blue</em> series, Ron and Chris wrap up the season with a recap of its past episodes and major takeaways, as well as a look at what’s to come for them personally and for the podcast.</p>
<p class="p1">Looking back on the season, Ron and Chris consider the importance of communication in the field of threat intelligence, specifically thinking of insights from their talk with D’Arcy and lessons in poetry and delivery from Valentina.  They cover the surprise of Jack’s willingness to share personal thoughts, review their discussions of bias (specifically highlighting talks with Jon and Susan), and recount things learned about the concept of unhackability. Listeners will hear about the inevitability of mistakes in threat intelligence work, the “easy button” framework, the season theme of sharpening oneself outside of work, and the dynamic of a threat intelligence team.</p>
<p class="p1">The episode then turns toward Ron and Chris, themselves.  Ron first puts Chris in the hot seat and asks what the future of threat intelligence is for him.  Chris explains that, while he thinks his days as an individual contributor for threat intelligence are over, he is still doing some quiet, yet-to-be revealed work, and is turning much of his attention to giving back to the field.  Ron, in explaining his own work, talks about bouncing between tasks, building tools for others, distilling information into simple messages, and continuing to navigate issues of automation.  Finally, Ron and Chris thank people involved with the season and address what the future holds for the <em>Hacker Valley Studio</em> podcast.  Listeners hear the exciting announcement of the next season: <em>Hacker Valley Red</em>!</p>
<p class="p1">0:47 - Ron and Chris talk about the importance of communication in the field of threat intelligence.</p>
<p class="p1">2:56 - What was one surprise in this season?</p>
<p class="p1">3:52 - The hosts review their conversations about bias.</p>
<p class="p1">6:55 - The episode turns to the “easy button” framework and the need for personal sharpening outside of work.</p>
<p class="p1">16:15 - Ron and Chris consider the inevitability of analysts missing things and the building of a team.</p>
<p class="p1">20:22 - What is the future of threat intelligence for Chris and Ron?</p>
<p class="p1">27:50 - The hosts review their insights about the possibility of an unhackable device or app.</p>
<p class="p1">29:43 - What is next for the <em>Hacker Valley Studio</em> podcast?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gswhw4/Hacker_Valley_Studio_Blue_Season_Finale_MIX.mp3" length="33828836" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series, Ron and Chris wrap up the season with a recap of its past episodes and major takeaways, as well as a look at what’s to come for them personally and for the podcast.
Looking back on the season, Ron and Chris consider the importance of communication in the field of threat intelligence, specifically thinking of insights from their talk with D’Arcy and lessons in poetry and delivery from Valentina.  They cover the surprise of Jack’s willingness to share personal thoughts, review their discussions of bias (specifically highlighting talks with Jon and Susan), and recount things learned about the concept of unhackability. Listeners will hear about the inevitability of mistakes in threat intelligence work, the “easy button” framework, the season theme of sharpening oneself outside of work, and the dynamic of a threat intelligence team.
The episode then turns toward Ron and Chris, themselves.  Ron first puts Chris in the hot seat and asks what the future of threat intelligence is for him.  Chris explains that, while he thinks his days as an individual contributor for threat intelligence are over, he is still doing some quiet, yet-to-be revealed work, and is turning much of his attention to giving back to the field.  Ron, in explaining his own work, talks about bouncing between tasks, building tools for others, distilling information into simple messages, and continuing to navigate issues of automation.  Finally, Ron and Chris thank people involved with the season and address what the future holds for the Hacker Valley Studio podcast.  Listeners hear the exciting announcement of the next season: Hacker Valley Red!
0:47 - Ron and Chris talk about the importance of communication in the field of threat intelligence.
2:56 - What was one surprise in this season?
3:52 - The hosts review their conversations about bias.
6:55 - The episode turns to the “easy button” framework and the need for personal sharpening outside of work.
16:15 - Ron and Chris consider the inevitability of analysts missing things and the building of a team.
20:22 - What is the future of threat intelligence for Chris and Ron?
27:50 - The hosts review their insights about the possibility of an unhackable device or app.
29:43 - What is next for the Hacker Valley Studio podcast?
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2114</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>8</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Episode 7 - D'Arcy Webb</title>
        <itunes:title>Hacker Valley Blue Episode 7 - D'Arcy Webb</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-7-darcy-webb/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-7-darcy-webb/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:13:29 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3ed89c99-83f9-335d-b5bc-0d95dc2cee64</guid>
                                    <description><![CDATA[<p class="p1">Ron and Chris host their vocal coach, D’Arcy Webb, for this episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series.  Since threat intelligence is a communications-based function, Ron and Chris look to “The Speech Diva” for insight.  She has experience as an actress, was a coach for <a href='https://www.tedxcambridge.com/'>TEDxCambridge</a>, and loves teaching people how to access the power of language to touch people’s hearts and change their minds.</p>
<p class="p1">As the conversation begins, D’Arcy explains her background to listeners.  She explains how an acting incident early in her career turned her attention to the topic of vocals, and clarifies that she has spent the last 25 years teaching and exploring this aspect of performance.  D’Arcy is passionate about treating the voice as the instrument that it is, and she works with students such as Chris and Ron to help them discover the musical and magical components to language and improve their own speaking practice.  The way we speak, she insists, impacts people, and so it is well worth pursuing excellence in this area.</p>
<p class="p1">The conversation also highlights various details pertaining to vocal training.  D’Arcy lists some of her favorite speakers and the reasons why she loves them (going out of her way to point listeners to <a href='https://www.npr.org/programs/fresh-air/'>NPR’s Fresh Air and its host, Terry Gross</a>)  She also speaks to the nature of vowels and consonants, the usefulness of pauses and variety in speech, how listeners can grow through coaching and - even today - through working on their breathing, the place of filler words in language, and the ideal of comfort with one’s own technique.  Listeners will hear about <a href='https://en.wikipedia.org/wiki/Pablo_Neruda'>Pablo Nerudo</a>, onomatopoeia, vibrations, and so much more!</p>
<p class="p1">1:29 - Listeners are introduced to D’Arcy.</p>
<p class="p1">4:35 - The group considers Ron and Chris’s progress in speech.</p>
<p class="p1">6:08 - D’Arcy believes that magic and music are inherent in language.</p>
<p class="p1">8:48 - Who are D’Arcy’s favorite speakers, and what is the value of pauses?</p>
<p class="p1">12:03 - People wanting to grow need to learn the fundamentals.</p>
<p class="p1">17:05 - D’Arcy addresses filler words.</p>
<p class="p1">19:31 - The group thinks about comfortable technique, Pablo Neruda, onomatopoeia, and more.</p>
<p class="p1">27:52 - D’Arcy speaks to the power of speech and the importance of proper breathing.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='http://www.speechdiva.com/'>Learn more about D’Arcy Webb</a></p>
<p class="p3"><a href='https://www.facebook.com/thespeechdiva/'>Connect with D’Arcy on Facebook</a></p>
<p class="p3">Email D’Arcy at <a href='mailto:darcy@darcywebb.com'>darcy@darcywebb.com</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about our sponsor RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Ron and Chris host their vocal coach, D’Arcy Webb, for this episode of the <em>Hacker Valley Studio</em> podcast’s <em>Hacker Valley Blue</em> series.  Since threat intelligence is a communications-based function, Ron and Chris look to “The Speech Diva” for insight.  She has experience as an actress, was a coach for <a href='https://www.tedxcambridge.com/'>TEDxCambridge</a>, and loves teaching people how to access the power of language to touch people’s hearts and change their minds.</p>
<p class="p1">As the conversation begins, D’Arcy explains her background to listeners.  She explains how an acting incident early in her career turned her attention to the topic of vocals, and clarifies that she has spent the last 25 years teaching and exploring this aspect of performance.  D’Arcy is passionate about treating the voice as the instrument that it is, and she works with students such as Chris and Ron to help them discover the musical and magical components to language and improve their own speaking practice.  The way we speak, she insists, impacts people, and so it is well worth pursuing excellence in this area.</p>
<p class="p1">The conversation also highlights various details pertaining to vocal training.  D’Arcy lists some of her favorite speakers and the reasons why she loves them (going out of her way to point listeners to <a href='https://www.npr.org/programs/fresh-air/'>NPR’s Fresh Air and its host, Terry Gross</a>)  She also speaks to the nature of vowels and consonants, the usefulness of pauses and variety in speech, how listeners can grow through coaching and - even today - through working on their breathing, the place of filler words in language, and the ideal of comfort with one’s own technique.  Listeners will hear about <a href='https://en.wikipedia.org/wiki/Pablo_Neruda'>Pablo Nerudo</a>, onomatopoeia, vibrations, and so much more!</p>
<p class="p1">1:29 - Listeners are introduced to D’Arcy.</p>
<p class="p1">4:35 - The group considers Ron and Chris’s progress in speech.</p>
<p class="p1">6:08 - D’Arcy believes that magic and music are inherent in language.</p>
<p class="p1">8:48 - Who are D’Arcy’s favorite speakers, and what is the value of pauses?</p>
<p class="p1">12:03 - People wanting to grow need to learn the fundamentals.</p>
<p class="p1">17:05 - D’Arcy addresses filler words.</p>
<p class="p1">19:31 - The group thinks about comfortable technique, Pablo Neruda, onomatopoeia, and more.</p>
<p class="p1">27:52 - D’Arcy speaks to the power of speech and the importance of proper breathing.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='http://www.speechdiva.com/'>Learn more about D’Arcy Webb</a></p>
<p class="p3"><a href='https://www.facebook.com/thespeechdiva/'>Connect with D’Arcy on Facebook</a></p>
<p class="p3">Email D’Arcy at <a href='mailto:darcy@darcywebb.com'>darcy@darcywebb.com</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about our sponsor RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/srmq8p/Hacker_Valley_Studio_Hacker_Valley_Blue_Episode_7_MIX.mp3" length="80806137" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ron and Chris host their vocal coach, D’Arcy Webb, for this episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series.  Since threat intelligence is a communications-based function, Ron and Chris look to “The Speech Diva” for insight.  She has experience as an actress, was a coach for TEDxCambridge, and loves teaching people how to access the power of language to touch people’s hearts and change their minds.
As the conversation begins, D’Arcy explains her background to listeners.  She explains how an acting incident early in her career turned her attention to the topic of vocals, and clarifies that she has spent the last 25 years teaching and exploring this aspect of performance.  D’Arcy is passionate about treating the voice as the instrument that it is, and she works with students such as Chris and Ron to help them discover the musical and magical components to language and improve their own speaking practice.  The way we speak, she insists, impacts people, and so it is well worth pursuing excellence in this area.
The conversation also highlights various details pertaining to vocal training.  D’Arcy lists some of her favorite speakers and the reasons why she loves them (going out of her way to point listeners to NPR’s Fresh Air and its host, Terry Gross)  She also speaks to the nature of vowels and consonants, the usefulness of pauses and variety in speech, how listeners can grow through coaching and - even today - through working on their breathing, the place of filler words in language, and the ideal of comfort with one’s own technique.  Listeners will hear about Pablo Nerudo, onomatopoeia, vibrations, and so much more!
1:29 - Listeners are introduced to D’Arcy.
4:35 - The group considers Ron and Chris’s progress in speech.
6:08 - D’Arcy believes that magic and music are inherent in language.
8:48 - Who are D’Arcy’s favorite speakers, and what is the value of pauses?
12:03 - People wanting to grow need to learn the fundamentals.
17:05 - D’Arcy addresses filler words.
19:31 - The group thinks about comfortable technique, Pablo Neruda, onomatopoeia, and more.
27:52 - D’Arcy speaks to the power of speech and the importance of proper breathing.
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about D’Arcy Webb
Connect with D’Arcy on Facebook
Email D’Arcy at darcy@darcywebb.com
Learn more about our sponsor RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2020</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>7</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Episode 6 - Brandon Dixon</title>
        <itunes:title>Hacker Valley Blue Episode 6 - Brandon Dixon</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-6-brandon-dixon/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-6-brandon-dixon/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:13:13 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8d1f051c-4c93-3ba8-83a5-64e85458e504</guid>
                                    <description><![CDATA[<p class="p1">This episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series is a bit unique.  It features Brandon Dixon, the VP of Strategy at RiskIQ, a major sponsor of the podcast.  Brandon co-founded Passive Total in 2014, and it was later purchased by RiskIQ.  He is the quintessential guest, invested in fitness, philosophy, tech, and leadership.  He is an expert in both the practice and business of threat intelligence, and he shares with Ron and Chris about himself, his work, and the field.</p>
<p class="p1">Much of the conversation focuses on Brandon and his work background.  Brandon explains his journey into the threat intelligence field, from his early interest, through jobs in tech and academia, and to work in espionage research.  Eventually, he and friend Steve McGinty saw a need and tried to solve it; their efforts took shape in the company they co-founded, Passive Total.  Brandon explains to listeners the process by which he and Steve created Passive Total, as well as the way in which they arrived at the deal to sell Passive Total to RiskIQ.  Brandon was heavily involved in the integration of Passive Total into RiskIQ, before eventually settling into a specific role within RiskIQ that capitalizes his love of the business side of the field.  He aims to work in light of his personal philosophy on life and success, which he also details.</p>
<p class="p1">The conversation touches on many practically relevant details of the threat intelligence field, as well.  Brandon addresses the changes in the field and motivation he draws from these changes, bias and intelligence collection, and lessons that have arisen through his specific experiences.  Other topics covered include intelligence leads and the future of threat intelligence, unhackability, the place of circumstances in life and business, and how intelligence leaders can improve their programs.  As Brandon anticipates that threat intelligence will only become a more pervasive field, listeners will doubtless benefit from his own insights, as well as his recommendations of such resources as<a href='https://www.amazon.com/Outliers-Story-Success-Malcolm-Gladwell/dp/0316017930'> Malcolm Gladwell’s Outliers</a> and <a href='https://community.riskiq.com/'> RiskIQ workshops</a>.</p>
<p class="p1">0:26 - The conversation begins with an introduction to this unique episode, its guest, and his background.</p>
<p class="p1">2:43 - The group considers the changing business of threat intelligence and what drives Brandon.</p>
<p class="p1">8:24 - The next topics are bias and intelligence collection, as well as what surprises Brandon.</p>
<p class="p1">13:00 - Brandon shares the story of Passive Total and its integration into RiskIQ, also addressing the business side of the field and lessons learned through his experience.</p>
<p class="p1">24:04 - Brandon addresses intelligence leads and the question of unhackability.</p>
<p class="p1">34:44 - What is Brandon’s philosophy on life and success?</p>
<p class="p1">39:37 - Brandon explains what threat intelligence leaders need to do to improve their programs.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/9bplus'>Follow Brandon on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about our sponsor RiskIQ</a></p>
<p class="p3"><a href='https://twitter.com/RiskIQ?ref_src=twsrc%25255Egoogle%25257Ctwcamp%25255Eserp%25257Ctwgr%25255Eauthor'>Follow RiskIQ on Twitter</a></p>
<p class="p3"><a href='https://www.youtube.com/channel/UC-hOtzE-1I0XWOMF9zBEJ0w'>Connect with RiskIQ on YouTube</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This episode of the <em>Hacker Valley Studio</em> podcast’s <em>Hacker Valley Blue</em> series is a bit unique.  It features Brandon Dixon, the VP of Strategy at RiskIQ, a major sponsor of the podcast.  Brandon co-founded Passive Total in 2014, and it was later purchased by RiskIQ.  He is the quintessential guest, invested in fitness, philosophy, tech, and leadership.  He is an expert in both the practice and business of threat intelligence, and he shares with Ron and Chris about himself, his work, and the field.</p>
<p class="p1">Much of the conversation focuses on Brandon and his work background.  Brandon explains his journey into the threat intelligence field, from his early interest, through jobs in tech and academia, and to work in espionage research.  Eventually, he and friend Steve McGinty saw a need and tried to solve it; their efforts took shape in the company they co-founded, Passive Total.  Brandon explains to listeners the process by which he and Steve created Passive Total, as well as the way in which they arrived at the deal to sell Passive Total to RiskIQ.  Brandon was heavily involved in the integration of Passive Total into RiskIQ, before eventually settling into a specific role within RiskIQ that capitalizes his love of the business side of the field.  He aims to work in light of his personal philosophy on life and success, which he also details.</p>
<p class="p1">The conversation touches on many practically relevant details of the threat intelligence field, as well.  Brandon addresses the changes in the field and motivation he draws from these changes, bias and intelligence collection, and lessons that have arisen through his specific experiences.  Other topics covered include intelligence leads and the future of threat intelligence, unhackability, the place of circumstances in life and business, and how intelligence leaders can improve their programs.  As Brandon anticipates that threat intelligence will only become a more pervasive field, listeners will doubtless benefit from his own insights, as well as his recommendations of such resources as<a href='https://www.amazon.com/Outliers-Story-Success-Malcolm-Gladwell/dp/0316017930'> Malcolm Gladwell’s <em>Outliers</em></a> and <a href='https://community.riskiq.com/'> RiskIQ workshops</a>.</p>
<p class="p1">0:26 - The conversation begins with an introduction to this unique episode, its guest, and his background.</p>
<p class="p1">2:43 - The group considers the changing business of threat intelligence and what drives Brandon.</p>
<p class="p1">8:24 - The next topics are bias and intelligence collection, as well as what surprises Brandon.</p>
<p class="p1">13:00 - Brandon shares the story of Passive Total and its integration into RiskIQ, also addressing the business side of the field and lessons learned through his experience.</p>
<p class="p1">24:04 - Brandon addresses intelligence leads and the question of unhackability.</p>
<p class="p1">34:44 - What is Brandon’s philosophy on life and success?</p>
<p class="p1">39:37 - Brandon explains what threat intelligence leaders need to do to improve their programs.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/9bplus'>Follow Brandon on Twitter</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about our sponsor RiskIQ</a></p>
<p class="p3"><a href='https://twitter.com/RiskIQ?ref_src=twsrc%25255Egoogle%25257Ctwcamp%25255Eserp%25257Ctwgr%25255Eauthor'>Follow RiskIQ on Twitter</a></p>
<p class="p3"><a href='https://www.youtube.com/channel/UC-hOtzE-1I0XWOMF9zBEJ0w'>Connect with RiskIQ on YouTube</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gpaqku/Hacker_Valley_Blue_Episode_6_Revised_Mix.mp3" length="42164249" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This episode of the Hacker Valley Studio podcast’s Hacker Valley Blue series is a bit unique.  It features Brandon Dixon, the VP of Strategy at RiskIQ, a major sponsor of the podcast.  Brandon co-founded Passive Total in 2014, and it was later purchased by RiskIQ.  He is the quintessential guest, invested in fitness, philosophy, tech, and leadership.  He is an expert in both the practice and business of threat intelligence, and he shares with Ron and Chris about himself, his work, and the field.
Much of the conversation focuses on Brandon and his work background.  Brandon explains his journey into the threat intelligence field, from his early interest, through jobs in tech and academia, and to work in espionage research.  Eventually, he and friend Steve McGinty saw a need and tried to solve it; their efforts took shape in the company they co-founded, Passive Total.  Brandon explains to listeners the process by which he and Steve created Passive Total, as well as the way in which they arrived at the deal to sell Passive Total to RiskIQ.  Brandon was heavily involved in the integration of Passive Total into RiskIQ, before eventually settling into a specific role within RiskIQ that capitalizes his love of the business side of the field.  He aims to work in light of his personal philosophy on life and success, which he also details.
The conversation touches on many practically relevant details of the threat intelligence field, as well.  Brandon addresses the changes in the field and motivation he draws from these changes, bias and intelligence collection, and lessons that have arisen through his specific experiences.  Other topics covered include intelligence leads and the future of threat intelligence, unhackability, the place of circumstances in life and business, and how intelligence leaders can improve their programs.  As Brandon anticipates that threat intelligence will only become a more pervasive field, listeners will doubtless benefit from his own insights, as well as his recommendations of such resources as Malcolm Gladwell’s Outliers and  RiskIQ workshops.
0:26 - The conversation begins with an introduction to this unique episode, its guest, and his background.
2:43 - The group considers the changing business of threat intelligence and what drives Brandon.
8:24 - The next topics are bias and intelligence collection, as well as what surprises Brandon.
13:00 - Brandon shares the story of Passive Total and its integration into RiskIQ, also addressing the business side of the field and lessons learned through his experience.
24:04 - Brandon addresses intelligence leads and the question of unhackability.
34:44 - What is Brandon’s philosophy on life and success?
39:37 - Brandon explains what threat intelligence leaders need to do to improve their programs.
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Follow Brandon on Twitter
Learn more about our sponsor RiskIQ
Follow RiskIQ on Twitter
Connect with RiskIQ on YouTube]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2635</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>6</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Episode 5 - Susan Peediyakkal</title>
        <itunes:title>Hacker Valley Blue Episode 5 - Susan Peediyakkal</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-5-susan-peediyakkal/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-5-susan-peediyakkal/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:13:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/21c21d07-e60c-3625-a4db-de9d79b756c2</guid>
                                    <description><![CDATA[<p class="p1">This episode of the Hacker Valley Studio podcast is the fifth installment in this first season of the Hacker Valley Blue series, and features guest Susan Peediyakkal, an expert in building threat intelligence programs.  Susan is a cyber threat intelligence consultant, the founder of BSides Sacramento, and a member of the advisory boards for several cybersecurity companies.  She joins hosts Ron and Chris to speak to her background, the future of threat intelligence, and much more.</p>
<p class="p1">Susan first details her background, running through the highlights of her approximately 16 years in cybersecurity, which have focused mostly on threat intelligence.  Susan began her career in the air force, and is still a reservist.  She worked with radar, and eventually decided to cross-train and branch into IT.  The following years saw her in a number of roles with various organizations, and move decisively into the threat intelligence field.  Eventually, Susa noticed that her career trajectory was moving her toward building threat intelligence programs for government entities.  She built programs for such varied clients as the government of Abu Dhabi, USPS, US courts, and industry leaders.  She recently paused her work to pursue further education, but has since returned to work as a threat intelligence practitioner..</p>
<p class="p1">As the conversation continues, Ron and Chris ask Susan to share insights on several topics.  The group considers the importance of community and a human element within the threat intelligence field, ways Susan has faced misconceptions when starting threat intelligence programs, the concept of unhackability, and what stakeholders outside the field get wrong about it.  Returning to a topic that has been forefront on Ron and Chris’s minds recently, Susan also shares about bias in her line of work and how threat intelligence analysts go wrong in dealing with it.  Moving into more personal topics, the group discusses Susan’s podcast-worthy voice, clarity, and articulation.  Susan explains how experts in threat intelligence can cultivate a new wave of speakers, and the conversation ends with a look at what the future holds for both Susan and the field of threat intelligence.</p>
<p class="p1">1:40 - Listeners are introduced to the episode and today’s guest, Susan Peediyakkal; Susan then shares her background.</p>
<p class="p1">5:41 - The group considers the importance of community, misconceptions Susan has noticed about her field, and the artistry and human element of threat intelligence.</p>
<p class="p1">16:02 - What kind of bias is Susan running into, and where do analysts go wrong with regard to bias?</p>
<p class="p1">21:38 - Susan addresses the term “unhackable.”</p>
<p class="p1">24:35 - Susan and her hosts turn to matters of podcasting, voice, and speaking.</p>
<p class="p1">31:40 - What do people outside the field get wrong about it?</p>
<p class="p1">33:48 - What’s the future look like for Susan, her field, and the workforce?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/v33na?lang=en'>Follow Susan on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/peediyakkal/'>Connect with Susan on LinkedIn</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This episode of the <em>Hacker Valley Studio</em> podcast is the fifth installment in this first season of the <em>Hacker Valley Blue</em> series, and features guest Susan Peediyakkal, an expert in building threat intelligence programs.  Susan is a cyber threat intelligence consultant, the founder of BSides Sacramento, and a member of the advisory boards for several cybersecurity companies.  She joins hosts Ron and Chris to speak to her background, the future of threat intelligence, and much more.</p>
<p class="p1">Susan first details her background, running through the highlights of her approximately 16 years in cybersecurity, which have focused mostly on threat intelligence.  Susan began her career in the air force, and is still a reservist.  She worked with radar, and eventually decided to cross-train and branch into IT.  The following years saw her in a number of roles with various organizations, and move decisively into the threat intelligence field.  Eventually, Susa noticed that her career trajectory was moving her toward building threat intelligence programs for government entities.  She built programs for such varied clients as the government of Abu Dhabi, USPS, US courts, and industry leaders.  She recently paused her work to pursue further education, but has since returned to work as a threat intelligence practitioner..</p>
<p class="p1">As the conversation continues, Ron and Chris ask Susan to share insights on several topics.  The group considers the importance of community and a human element within the threat intelligence field, ways Susan has faced misconceptions when starting threat intelligence programs, the concept of unhackability, and what stakeholders outside the field get wrong about it.  Returning to a topic that has been forefront on Ron and Chris’s minds recently, Susan also shares about bias in her line of work and how threat intelligence analysts go wrong in dealing with it.  Moving into more personal topics, the group discusses Susan’s podcast-worthy voice, clarity, and articulation.  Susan explains how experts in threat intelligence can cultivate a new wave of speakers, and the conversation ends with a look at what the future holds for both Susan and the field of threat intelligence.</p>
<p class="p1">1:40 - Listeners are introduced to the episode and today’s guest, Susan Peediyakkal; Susan then shares her background.</p>
<p class="p1">5:41 - The group considers the importance of community, misconceptions Susan has noticed about her field, and the artistry and human element of threat intelligence.</p>
<p class="p1">16:02 - What kind of bias is Susan running into, and where do analysts go wrong with regard to bias?</p>
<p class="p1">21:38 - Susan addresses the term “unhackable.”</p>
<p class="p1">24:35 - Susan and her hosts turn to matters of podcasting, voice, and speaking.</p>
<p class="p1">31:40 - What do people outside the field get wrong about it?</p>
<p class="p1">33:48 - What’s the future look like for Susan, her field, and the workforce?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/v33na?lang=en'>Follow Susan on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/peediyakkal/'>Connect with Susan on LinkedIn</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/abfpt4/Hacker_Valley_Blue_Episode_5_Mix.mp3" length="38703983" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This episode of the Hacker Valley Studio podcast is the fifth installment in this first season of the Hacker Valley Blue series, and features guest Susan Peediyakkal, an expert in building threat intelligence programs.  Susan is a cyber threat intelligence consultant, the founder of BSides Sacramento, and a member of the advisory boards for several cybersecurity companies.  She joins hosts Ron and Chris to speak to her background, the future of threat intelligence, and much more.
Susan first details her background, running through the highlights of her approximately 16 years in cybersecurity, which have focused mostly on threat intelligence.  Susan began her career in the air force, and is still a reservist.  She worked with radar, and eventually decided to cross-train and branch into IT.  The following years saw her in a number of roles with various organizations, and move decisively into the threat intelligence field.  Eventually, Susa noticed that her career trajectory was moving her toward building threat intelligence programs for government entities.  She built programs for such varied clients as the government of Abu Dhabi, USPS, US courts, and industry leaders.  She recently paused her work to pursue further education, but has since returned to work as a threat intelligence practitioner..
As the conversation continues, Ron and Chris ask Susan to share insights on several topics.  The group considers the importance of community and a human element within the threat intelligence field, ways Susan has faced misconceptions when starting threat intelligence programs, the concept of unhackability, and what stakeholders outside the field get wrong about it.  Returning to a topic that has been forefront on Ron and Chris’s minds recently, Susan also shares about bias in her line of work and how threat intelligence analysts go wrong in dealing with it.  Moving into more personal topics, the group discusses Susan’s podcast-worthy voice, clarity, and articulation.  Susan explains how experts in threat intelligence can cultivate a new wave of speakers, and the conversation ends with a look at what the future holds for both Susan and the field of threat intelligence.
1:40 - Listeners are introduced to the episode and today’s guest, Susan Peediyakkal; Susan then shares her background.
5:41 - The group considers the importance of community, misconceptions Susan has noticed about her field, and the artistry and human element of threat intelligence.
16:02 - What kind of bias is Susan running into, and where do analysts go wrong with regard to bias?
21:38 - Susan addresses the term “unhackable.”
24:35 - Susan and her hosts turn to matters of podcasting, voice, and speaking.
31:40 - What do people outside the field get wrong about it?
33:48 - What’s the future look like for Susan, her field, and the workforce?
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Follow Susan on Twitter
Connect with Susan on LinkedIn
Learn more about the episode sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2418</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>5</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Episode 4 - Jon DiMaggio</title>
        <itunes:title>Hacker Valley Blue Episode 4 - Jon DiMaggio</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-4/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-4/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:12:48 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/41aca70d-078d-3a3e-98c7-50b2f081af95</guid>
                                    <description><![CDATA[<p class="p1">This episode of the Hacker Valley Studio podcast features Jon DiMaggio, a Senior Threat Intelligence Analyst at Symantec.  Jon is a researcher and longtime bad guy chaser, and Ron and Chris fill this installment of Hacker Valley Blue with Jon’s thoughts on ransomware, threat research, attribution, and more!</p>
<p class="p1">Jon introduces himself to listeners who may not yet know much about him, explaining that he started his career as an engineer and that his work for the government in the early 2000s forced him to focus a lot on defending against nation-state attacks.  He developed into an expert in the field, and transitioned about 13-14 years ago into his current line of work.  He now teaches alongside his work as an analyst, and he moved from a government position to Symantec in 2014.  Jon’s specialty is still nation-state, but he has also ventured into enterprise ransomware.  He shares about these areas of specialization with Ron and Chris, detailing what a nation-state is and how to combat it within the context of threat intelligence, and addressing the economics of ransomware.</p>
<p class="p1">As the conversation continues, Ron and Chris raise a variety of other topics for Jon to address.  Jon considers the threat of a future major worm attack, and provides listeners with insight on how to become established in his line of work.  There are a lot of available resources that people can use to develop their own skills and increase their visibility.  However, becoming a government hacker, and so having an offensive rather than a defensive role, is much more challenging.  Moving toward the conclusion of the conversation, Jon offers tips on navigating attribution and bias (such as being sure to have evidence before making public claims!), explains how he mentally organizes and recalls information, and speaks to the nature of strong communication.</p>
<p class="p2"> </p>
<p class="p1">1:41 - Listeners are introduced to Jon DiMaggio and the episode before Jon explains his background..</p>
<p class="p1">5:04 - The first major topic Jon shares about is that of nation-states, specifically speaking to the work of  combating nation-state attackers.</p>
<p class="p1">12:57 - The conversation turns to the economics of ransomware.</p>
<p class="p1">18:39 - What are Jon’s thoughts on the possibility of another major worm attack?</p>
<p class="p1">20:26 - Jon is asked about how people can enter his field or that of hacking.</p>
<p class="p1">24:54 - How should listeners approach attribution and bias, and how has Jon navigated bias in his own life?</p>
<p class="p1">31:31 - The group considers Jon’s mental organization, his recall of information, and the topic of communication.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.broadcom.com/'>Access the recent work and research on Symantec’s threat intelligence feed</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">This episode of the <em>Hacker Valley Studio</em> podcast features Jon DiMaggio, a Senior Threat Intelligence Analyst at Symantec.  Jon is a researcher and longtime bad guy chaser, and Ron and Chris fill this installment of <em>Hacker Valley Blue</em> with Jon’s thoughts on ransomware, threat research, attribution, and more!</p>
<p class="p1">Jon introduces himself to listeners who may not yet know much about him, explaining that he started his career as an engineer and that his work for the government in the early 2000s forced him to focus a lot on defending against nation-state attacks.  He developed into an expert in the field, and transitioned about 13-14 years ago into his current line of work.  He now teaches alongside his work as an analyst, and he moved from a government position to Symantec in 2014.  Jon’s specialty is still nation-state, but he has also ventured into enterprise ransomware.  He shares about these areas of specialization with Ron and Chris, detailing what a nation-state is and how to combat it within the context of threat intelligence, and addressing the economics of ransomware.</p>
<p class="p1">As the conversation continues, Ron and Chris raise a variety of other topics for Jon to address.  Jon considers the threat of a future major worm attack, and provides listeners with insight on how to become established in his line of work.  There are a lot of available resources that people can use to develop their own skills and increase their visibility.  However, becoming a government hacker, and so having an offensive rather than a defensive role, is much more challenging.  Moving toward the conclusion of the conversation, Jon offers tips on navigating attribution and bias (such as being sure to have evidence before making public claims!), explains how he mentally organizes and recalls information, and speaks to the nature of strong communication.</p>
<p class="p2"> </p>
<p class="p1">1:41 - Listeners are introduced to Jon DiMaggio and the episode before Jon explains his background..</p>
<p class="p1">5:04 - The first major topic Jon shares about is that of nation-states, specifically speaking to the work of  combating nation-state attackers.</p>
<p class="p1">12:57 - The conversation turns to the economics of ransomware.</p>
<p class="p1">18:39 - What are Jon’s thoughts on the possibility of another major worm attack?</p>
<p class="p1">20:26 - Jon is asked about how people can enter his field or that of hacking.</p>
<p class="p1">24:54 - How should listeners approach attribution and bias, and how has Jon navigated bias in his own life?</p>
<p class="p1">31:31 - The group considers Jon’s mental organization, his recall of information, and the topic of communication.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://www.broadcom.com/'>Access the recent work and research on Symantec’s threat intelligence feed</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7mcvew/Hacker_Valley_Studio_Hacker_Valley_Blue_Episode_4_MIX.mp3" length="96042840" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This episode of the Hacker Valley Studio podcast features Jon DiMaggio, a Senior Threat Intelligence Analyst at Symantec.  Jon is a researcher and longtime bad guy chaser, and Ron and Chris fill this installment of Hacker Valley Blue with Jon’s thoughts on ransomware, threat research, attribution, and more!
Jon introduces himself to listeners who may not yet know much about him, explaining that he started his career as an engineer and that his work for the government in the early 2000s forced him to focus a lot on defending against nation-state attacks.  He developed into an expert in the field, and transitioned about 13-14 years ago into his current line of work.  He now teaches alongside his work as an analyst, and he moved from a government position to Symantec in 2014.  Jon’s specialty is still nation-state, but he has also ventured into enterprise ransomware.  He shares about these areas of specialization with Ron and Chris, detailing what a nation-state is and how to combat it within the context of threat intelligence, and addressing the economics of ransomware.
As the conversation continues, Ron and Chris raise a variety of other topics for Jon to address.  Jon considers the threat of a future major worm attack, and provides listeners with insight on how to become established in his line of work.  There are a lot of available resources that people can use to develop their own skills and increase their visibility.  However, becoming a government hacker, and so having an offensive rather than a defensive role, is much more challenging.  Moving toward the conclusion of the conversation, Jon offers tips on navigating attribution and bias (such as being sure to have evidence before making public claims!), explains how he mentally organizes and recalls information, and speaks to the nature of strong communication.
 
1:41 - Listeners are introduced to Jon DiMaggio and the episode before Jon explains his background..
5:04 - The first major topic Jon shares about is that of nation-states, specifically speaking to the work of  combating nation-state attackers.
12:57 - The conversation turns to the economics of ransomware.
18:39 - What are Jon’s thoughts on the possibility of another major worm attack?
20:26 - Jon is asked about how people can enter his field or that of hacking.
24:54 - How should listeners approach attribution and bias, and how has Jon navigated bias in his own life?
31:31 - The group considers Jon’s mental organization, his recall of information, and the topic of communication.
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Access the recent work and research on Symantec’s threat intelligence feed
Learn more about the episode sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2401</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>4</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Episode 3 - Valentina Palacín</title>
        <itunes:title>Hacker Valley Blue Episode 3 - Valentina Palacín</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-3-valentina-palacin/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-3-valentina-palacin/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:12:30 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/104a4415-9659-395a-9fbb-f17fa389efa3</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris welcome Valentina Palacín for the third episode in the Hacker Valley Blue series.  Valentina is a threat hunter who used to work as a translator, and she is currently a senior cyber threat intelligence analyst.  She joins Ron and Chris to talk about her background in languages, poetry and the impact of words, and much more.</p>
<p class="p1">As the conversation gets underway, Valentina explains her background to listeners.  She studied translation before starting her career in that field, but transitioned to information technology about two years ago.  In her free time, she researches threat hunting in her home country of Argentina.  It was challenging for Valentina to change her career path, since she had no background in computer science, but she took multiple steps - working in web development, learning to do programming, taking courses, and more - ultimately becoming a threat intel analyst and speaker.  Though the journey was difficult, Valentina feels she was born to work in her current field, and has found her past experience, including knowledge of over 7 languages, to be helpful in her work.</p>
<p class="p1">The episode also features Valentina’s insights into threat intelligence.  She and her hosts discuss how knowledge of programming can aid a threat intel analyst, Valentina’s philosophy of MITRE, the relationship between intelligence and threat hunting, and how to keep up with changes in the field.  They arrive at the conclusion that, while it is helpful to stay up to date on political and cyber news, analysts must realize that they cannot know everything, and people in general must realize that threat intelligence is not a catch-all.  The group bridges the gap between personal and professional aspects of life by talking about the importance of hobbies outside of work; most notably, the group addresses poetry and its usefulness for threat intelligence.  Finally, the conversation turns to Valentina’s work with<a href='https://discord.com/invite/z8ZPuNZ'> BlueSpace Security</a>.</p>
<p class="p1">1:38 - Listeners are introduced to Valentina, her background, and her challenging process to enter into the large intel community in Argentina .</p>
<p class="p1">5:24 - Did knowledge of language impact Valentina’s threat intelligence work?</p>
<p class="p1">7:55 - Valentina shares about her programming experience and details her journey into threat intel.</p>
<p class="p1">14:23 - What are Valentina’s thoughts about MITRE and the relation between intelligence and threat hunting?</p>
<p class="p1">18:06 - The group considers how to keep up with changes in the field, and acknowledges that threat intelligence will not catch everything.</p>
<p class="p1">22:48 - One thing that Valentina is passionate about pursuing is hobbies outside of work.</p>
<p class="p1">27:56 - Does poetry help with threat intelligence work?</p>
<p class="p1">32:53 - The conversation turns to Valentina’s community, focusing on BlueSpace Security.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/fierytermite'>Connect with Valentina Palacín on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/valentinapalacin/?originalSubdomain=ar'>Connect with Valentina on LinkedIn</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris welcome Valentina Palacín for the third episode in the <em>Hacker Valley Blue</em> series.  Valentina is a threat hunter who used to work as a translator, and she is currently a senior cyber threat intelligence analyst.  She joins Ron and Chris to talk about her background in languages, poetry and the impact of words, and much more.</p>
<p class="p1">As the conversation gets underway, Valentina explains her background to listeners.  She studied translation before starting her career in that field, but transitioned to information technology about two years ago.  In her free time, she researches threat hunting in her home country of Argentina.  It was challenging for Valentina to change her career path, since she had no background in computer science, but she took multiple steps - working in web development, learning to do programming, taking courses, and more - ultimately becoming a threat intel analyst and speaker.  Though the journey was difficult, Valentina feels she was born to work in her current field, and has found her past experience, including knowledge of over 7 languages, to be helpful in her work.</p>
<p class="p1">The episode also features Valentina’s insights into threat intelligence.  She and her hosts discuss how knowledge of programming can aid a threat intel analyst, Valentina’s philosophy of MITRE, the relationship between intelligence and threat hunting, and how to keep up with changes in the field.  They arrive at the conclusion that, while it is helpful to stay up to date on political and cyber news, analysts must realize that they cannot know everything, and people in general must realize that threat intelligence is not a catch-all.  The group bridges the gap between personal and professional aspects of life by talking about the importance of hobbies outside of work; most notably, the group addresses poetry and its usefulness for threat intelligence.  Finally, the conversation turns to Valentina’s work with<a href='https://discord.com/invite/z8ZPuNZ'> BlueSpace Security</a>.</p>
<p class="p1">1:38 - Listeners are introduced to Valentina, her background, and her challenging process to enter into the large intel community in Argentina .</p>
<p class="p1">5:24 - Did knowledge of language impact Valentina’s threat intelligence work?</p>
<p class="p1">7:55 - Valentina shares about her programming experience and details her journey into threat intel.</p>
<p class="p1">14:23 - What are Valentina’s thoughts about MITRE and the relation between intelligence and threat hunting?</p>
<p class="p1">18:06 - The group considers how to keep up with changes in the field, and acknowledges that threat intelligence will not catch everything.</p>
<p class="p1">22:48 - One thing that Valentina is passionate about pursuing is hobbies outside of work.</p>
<p class="p1">27:56 - Does poetry help with threat intelligence work?</p>
<p class="p1">32:53 - The conversation turns to Valentina’s community, focusing on BlueSpace Security.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about <em>Hacker Valley Studio</em></a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support <em>Hacker Valley Studio</em> on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow <em>Hacker Valley Studio</em> on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/fierytermite'>Connect with Valentina Palacín on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/valentinapalacin/?originalSubdomain=ar'>Connect with Valentina on LinkedIn</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xsp2gr/Hacker_Valley_Studio_Hacker_Valley_Blue_Episode_3_MIX_1_a17wg.mp3" length="35162624" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris welcome Valentina Palacín for the third episode in the Hacker Valley Blue series.  Valentina is a threat hunter who used to work as a translator, and she is currently a senior cyber threat intelligence analyst.  She joins Ron and Chris to talk about her background in languages, poetry and the impact of words, and much more.
As the conversation gets underway, Valentina explains her background to listeners.  She studied translation before starting her career in that field, but transitioned to information technology about two years ago.  In her free time, she researches threat hunting in her home country of Argentina.  It was challenging for Valentina to change her career path, since she had no background in computer science, but she took multiple steps - working in web development, learning to do programming, taking courses, and more - ultimately becoming a threat intel analyst and speaker.  Though the journey was difficult, Valentina feels she was born to work in her current field, and has found her past experience, including knowledge of over 7 languages, to be helpful in her work.
The episode also features Valentina’s insights into threat intelligence.  She and her hosts discuss how knowledge of programming can aid a threat intel analyst, Valentina’s philosophy of MITRE, the relationship between intelligence and threat hunting, and how to keep up with changes in the field.  They arrive at the conclusion that, while it is helpful to stay up to date on political and cyber news, analysts must realize that they cannot know everything, and people in general must realize that threat intelligence is not a catch-all.  The group bridges the gap between personal and professional aspects of life by talking about the importance of hobbies outside of work; most notably, the group addresses poetry and its usefulness for threat intelligence.  Finally, the conversation turns to Valentina’s work with BlueSpace Security.
1:38 - Listeners are introduced to Valentina, her background, and her challenging process to enter into the large intel community in Argentina .
5:24 - Did knowledge of language impact Valentina’s threat intelligence work?
7:55 - Valentina shares about her programming experience and details her journey into threat intel.
14:23 - What are Valentina’s thoughts about MITRE and the relation between intelligence and threat hunting?
18:06 - The group considers how to keep up with changes in the field, and acknowledges that threat intelligence will not catch everything.
22:48 - One thing that Valentina is passionate about pursuing is hobbies outside of work.
27:56 - Does poetry help with threat intelligence work?
32:53 - The conversation turns to Valentina’s community, focusing on BlueSpace Security.
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Connect with Valentina Palacín on Twitter
Connect with Valentina on LinkedIn
Learn more about the episode sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2197</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>3</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Episode 2 - Jack Rhysider</title>
        <itunes:title>Hacker Valley Blue Episode 2 - Jack Rhysider</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-2-jack-rhysider/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-2-jack-rhysider/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:12:12 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c96f3632-a7da-3541-9eee-d94d8b56e19b</guid>
                                    <description><![CDATA[<p class="p1">Fan-favorite Jack Rhysider of the Darknet Diaries podcast joins Hacker Valley Studio hosts Ron and 
Chris for the second episode of Hacker Valley Blue! Jack joins the show again during an ideal season - one focused on threat intelligence - and this episode will focus on Jack’s past in the field of threat intelligence, as well as on a major issue faced daily by analysts in the field: that of managing bias.</p>
<p class="p1">As the conversation begins, the group focuses on threat intelligence and Jack’s work in the field.  Jack has been pouring himself into his own podcast, leaning into the fact that threat intelligence is a form of knowing what has happened in the past by his sharing of stories.  Jack explains what has surprised him recently in his work, how he maintains a sharp sense of focus, and what sort of continuity he sees between the news-sharing of his current role and a more formal practitioner role within the field of threat intelligence.  
Jack’s podcast work necessitates practical skill in his field, and demands an ability to share complex concepts through simple expression.</p>
<p class="p1">The work also necessitates strong skills of managing bias, and it is to this topic that the group turns.  Jack makes a practice of putting aside negative personal feelings about a person and looking for areas of agreement with the individual.  This practice, along with his feedback loop and his efforts to listen to actual voices, help Jack to tell both sides of the stories he shares.  In discussing the counteraction of bias, Jack touches on concepts of assumptions, bias toward self, empathy, and humanization.   And as the conversation winds toward a close, listeners will hear about Jack’s use of audio books, balancing fact and listener interest, appealing to different audiences, and navigating questions of personal privacy. </p>
<p class="p1">1:40 - Listeners are introduced to Jack and the episode ahead.</p>
<p class="p1">4:13 - How is Jack currently thinking about storytelling?</p>
<p class="p1">8:40 - The group dives into some topics related to Jack’s work: his focus and need for practical skill.</p>
<p class="p1">12:37 - The conversation turns to the subject of bias.</p>
<p class="p1">28:28 - What is Jack doing for research today, and how does he navigate technical questions of storytelling?</p>
<p class="p1">36:35 - Finally, Jack and his hosts turn to considerations of personal privacy.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://darknetdiaries.com/about/'>Learn more about Jack Rhysider</a></p>
<p class="p3"><a href='https://twitter.com/JackRhysider?ref_src=twsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor'>Follow Jack on Twitter</a></p>
<p class="p3"><a href='https://darknetdiaries.com/'>Learn more about Darknet Diaries</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Fan-favorite Jack Rhysider of the <em>Darknet Diaries </em>podcast joins <em>Hacker Valley Studio</em> hosts Ron and <br>
Chris for the second episode of <em>Hacker Valley Blue</em>! Jack joins the show again during an ideal season - one focused on threat intelligence - and this episode will focus on Jack’s past in the field of threat intelligence, as well as on a major issue faced daily by analysts in the field: that of managing bias.</p>
<p class="p1">As the conversation begins, the group focuses on threat intelligence and Jack’s work in the field.  Jack has been pouring himself into his own podcast, leaning into the fact that threat intelligence is a form of knowing what has happened in the past by his sharing of stories.  Jack explains what has surprised him recently in his work, how he maintains a sharp sense of focus, and what sort of continuity he sees between the news-sharing of his current role and a more formal practitioner role within the field of threat intelligence.  <br>
Jack’s podcast work necessitates practical skill in his field, and demands an ability to share complex concepts through simple expression.</p>
<p class="p1">The work also necessitates strong skills of managing bias, and it is to this topic that the group turns.  Jack makes a practice of putting aside negative personal feelings about a person and looking for areas of agreement with the individual.  This practice, along with his feedback loop and his efforts to listen to actual voices, help Jack to tell both sides of the stories he shares.  In discussing the counteraction of bias, Jack touches on concepts of assumptions, bias toward self, empathy, and humanization.   And as the conversation winds toward a close, listeners will hear about Jack’s use of audio books, balancing fact and listener interest, appealing to different audiences, and navigating questions of personal privacy. </p>
<p class="p1">1:40 - Listeners are introduced to Jack and the episode ahead.</p>
<p class="p1">4:13 - How is Jack currently thinking about storytelling?</p>
<p class="p1">8:40 - The group dives into some topics related to Jack’s work: his focus and need for practical skill.</p>
<p class="p1">12:37 - The conversation turns to the subject of bias.</p>
<p class="p1">28:28 - What is Jack doing for research today, and how does he navigate technical questions of storytelling?</p>
<p class="p1">36:35 - Finally, Jack and his hosts turn to considerations of personal privacy.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://darknetdiaries.com/about/'>Learn more about Jack Rhysider</a></p>
<p class="p3"><a href='https://twitter.com/JackRhysider?ref_src=twsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor'>Follow Jack on Twitter</a></p>
<p class="p3"><a href='https://darknetdiaries.com/'>Learn more about Darknet Diaries</a></p>
<p class="p3"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/dvqjmc/Hacker_Valley_Studio_Blue_Episode_2_MIX.mp3" length="43657526" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Fan-favorite Jack Rhysider of the Darknet Diaries podcast joins Hacker Valley Studio hosts Ron and Chris for the second episode of Hacker Valley Blue! Jack joins the show again during an ideal season - one focused on threat intelligence - and this episode will focus on Jack’s past in the field of threat intelligence, as well as on a major issue faced daily by analysts in the field: that of managing bias.
As the conversation begins, the group focuses on threat intelligence and Jack’s work in the field.  Jack has been pouring himself into his own podcast, leaning into the fact that threat intelligence is a form of knowing what has happened in the past by his sharing of stories.  Jack explains what has surprised him recently in his work, how he maintains a sharp sense of focus, and what sort of continuity he sees between the news-sharing of his current role and a more formal practitioner role within the field of threat intelligence.  Jack’s podcast work necessitates practical skill in his field, and demands an ability to share complex concepts through simple expression.
The work also necessitates strong skills of managing bias, and it is to this topic that the group turns.  Jack makes a practice of putting aside negative personal feelings about a person and looking for areas of agreement with the individual.  This practice, along with his feedback loop and his efforts to listen to actual voices, help Jack to tell both sides of the stories he shares.  In discussing the counteraction of bias, Jack touches on concepts of assumptions, bias toward self, empathy, and humanization.   And as the conversation winds toward a close, listeners will hear about Jack’s use of audio books, balancing fact and listener interest, appealing to different audiences, and navigating questions of personal privacy. 
1:40 - Listeners are introduced to Jack and the episode ahead.
4:13 - How is Jack currently thinking about storytelling?
8:40 - The group dives into some topics related to Jack’s work: his focus and need for practical skill.
12:37 - The conversation turns to the subject of bias.
28:28 - What is Jack doing for research today, and how does he navigate technical questions of storytelling?
36:35 - Finally, Jack and his hosts turn to considerations of personal privacy.
 
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about Jack Rhysider
Follow Jack on Twitter
Learn more about Darknet Diaries
Learn more about the episode sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2728</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Hacker Valley Blue Episode 1</title>
        <itunes:title>Hacker Valley Blue Episode 1</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-1/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hacker-valley-blue-episode-1/#comments</comments>        <pubDate>Tue, 01 Sep 2020 04:11:50 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/093a6eb2-1ba8-3a42-8877-6305baeeac58</guid>
                                    <description><![CDATA[<p class="p1">Hosts Ron and Chris welcome you to today’s episode! This episode of Hacker Valley Studio is the start of a new season, Hacker Valley Blue, a series dedicated to threat intelligence, exclusively for listeners.</p>
<p class="p1">The episode begins with Ron and Chris sharing their backgrounds in threat intelligence and cybersecurity. Chris picked intelligence as his job field in the United States Marine Corps, and eventually went on to The National Security Agency and United States Cyber Command. He focused on the how, who, and what of all the cyber-attacks happening at the time. Chris then went on to create his own company, and do consulting work in threat intelligence for over a decade.</p>
<p class="p1">Ron has always had an interest in cybersecurity, and at 16 he found a mentor who took him under his wing in the trade. After a couple of years working in offensive attacks, he transitioned to a job building intelligence tools that dealt with threat data. While Chris focused more on the operational side of threat intelligence, Ron’s was more technical, and their experience converged well.</p>
<p class="p1">Throughout the rest of the episode, you will hear about what threat intelligence can do for businesses. Ron and Chris discuss how analysts can build rapport with the employees and stakeholders using their intelligence, and what questions companies should ask of analysts for the best results. They do this by walking listeners through Chris’ EASY framework.</p>
<p class="p1">1:07 - The new season of Hacker Valley Blue is introduced.</p>
<p class="p1">3:43 - Chris shares his background in intelligence.</p>
<p class="p1">6:15 - Ron shares his background in intelligence</p>
<p class="p1">11:43 - What can threat intelligence do for an organization?</p>
<p class="p1">17:50 - The EASY Framework</p>
<p class="p1">18:41 - Elicit Requirements</p>
<p class="p1">21:40 - Asses Collection Plan</p>
<p class="p1">26:03 - Strive for Impact</p>
<p class="p1">30:24 - Yield the Feedback</p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p1"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Hosts Ron and Chris welcome you to today’s episode! This episode of <em>Hacker Valley Studio </em>is the start of a new season, Hacker Valley Blue, a series dedicated to threat intelligence, exclusively for listeners.</p>
<p class="p1">The episode begins with Ron and Chris sharing their backgrounds in threat intelligence and cybersecurity. Chris picked intelligence as his job field in the United States Marine Corps, and eventually went on to The National Security Agency and United States Cyber Command. He focused on the how, who, and what of all the cyber-attacks happening at the time. Chris then went on to create his own company, and do consulting work in threat intelligence for over a decade.</p>
<p class="p1">Ron has always had an interest in cybersecurity, and at 16 he found a mentor who took him under his wing in the trade. After a couple of years working in offensive attacks, he transitioned to a job building intelligence tools that dealt with threat data. While Chris focused more on the operational side of threat intelligence, Ron’s was more technical, and their experience converged well.</p>
<p class="p1">Throughout the rest of the episode, you will hear about what threat intelligence can do for businesses. Ron and Chris discuss how analysts can build rapport with the employees and stakeholders using their intelligence, and what questions companies should ask of analysts for the best results. They do this by walking listeners through Chris’ EASY framework.</p>
<p class="p1">1:07 - The new season of Hacker Valley Blue is introduced.</p>
<p class="p1">3:43 - Chris shares his background in intelligence.</p>
<p class="p1">6:15 - Ron shares his background in intelligence</p>
<p class="p1">11:43 - What can threat intelligence do for an organization?</p>
<p class="p1">17:50 - The EASY Framework</p>
<p class="p1">18:41 - Elicit Requirements</p>
<p class="p1">21:40 - Asses Collection Plan</p>
<p class="p1">26:03 - Strive for Impact</p>
<p class="p1">30:24 - Yield the Feedback</p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p1"><a href='https://www.riskiq.com/'>Learn more about the episode sponsor, RiskIQ</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/i3fbhx/Hacker_Valley_Studio_Blue_Episode_1_MIX.mp3" length="40298591" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hosts Ron and Chris welcome you to today’s episode! This episode of Hacker Valley Studio is the start of a new season, Hacker Valley Blue, a series dedicated to threat intelligence, exclusively for listeners.
The episode begins with Ron and Chris sharing their backgrounds in threat intelligence and cybersecurity. Chris picked intelligence as his job field in the United States Marine Corps, and eventually went on to The National Security Agency and United States Cyber Command. He focused on the how, who, and what of all the cyber-attacks happening at the time. Chris then went on to create his own company, and do consulting work in threat intelligence for over a decade.
Ron has always had an interest in cybersecurity, and at 16 he found a mentor who took him under his wing in the trade. After a couple of years working in offensive attacks, he transitioned to a job building intelligence tools that dealt with threat data. While Chris focused more on the operational side of threat intelligence, Ron’s was more technical, and their experience converged well.
Throughout the rest of the episode, you will hear about what threat intelligence can do for businesses. Ron and Chris discuss how analysts can build rapport with the employees and stakeholders using their intelligence, and what questions companies should ask of analysts for the best results. They do this by walking listeners through Chris’ EASY framework.
1:07 - The new season of Hacker Valley Blue is introduced.
3:43 - Chris shares his background in intelligence.
6:15 - Ron shares his background in intelligence
11:43 - What can threat intelligence do for an organization?
17:50 - The EASY Framework
18:41 - Elicit Requirements
21:40 - Asses Collection Plan
26:03 - Strive for Impact
30:24 - Yield the Feedback
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Learn more about the episode sponsor, RiskIQ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2518</itunes:duration>
        <itunes:season>1</itunes:season>
        <itunes:episode>1</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 82 - What is Old is New Again with Brian Romansky</title>
        <itunes:title>Episode 82 - What is Old is New Again with Brian Romansky</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-82-what-is-old-is-new-again-with-brian-romansky/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-82-what-is-old-is-new-again-with-brian-romansky/#comments</comments>        <pubDate>Mon, 24 Aug 2020 06:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3a5c1257-e9d3-3a85-8369-4dbf927a6413</guid>
                                    <description><![CDATA[<p class="p1">Hosts Ron and Chris welcome you to today’s episode! This episode of Hacker Valley Studio features Brian Romansky, the Chief Innovation Officer at Owl Cyber Defense. You will hear about his ideas, inventions, and how hardware is helping us in cybersecurity today.</p>
<p class="p2"> </p>
<p class="p1">The episode begins with Brian sharing his background, and journey into the cybersecurity space. He always knew he wanted to do something with technology and thought he may go into robotics. The transition into the cyber world was a natural one when he was working on a team that was moving mechanical postage metering to happen electronically. These machines were often trying to be hacked, and the team also began working on e-commerce and shipping platforms. From then, he continued to work on cybersecurity, data, and cryptography.</p>
<p class="p2"> </p>
<p class="p1">Today, at Owl Cyber Defense Brian works on cross domain solutions for the US Department of Defense, and other government organizations, as well as commercial customers. It gets him up in the morning because it combines many of the electrical and cryptography space that interests him, with hardware. His hope for the future, is that there is a paradigm shift in cybersecurity, making it less of a cat and mouse game by using hardware enforced mechanisms.</p>
<p class="p2"> </p>
<p class="p1">He doesn’t have a lot of free time, but as the episode wraps up, you will also hear about what Brian is interested in, and working on outside of work.</p>
<p class="p2"> </p>
<p class="p1">:29 CIO of Owl Cyber Defense, Brian Romansky is introduced to the show.</p>
<p class="p1">4:33 Brian shares his journey from electrical engineering to cybersecurity.</p>
<p class="p1">6:25 Brian explains the work he does today.</p>
<p class="p1">14:16 Brian hypothosizes on the future of cybersecurity</p>
<p class="p1">16:58 Brian answers the question “Is there an unhackable system?”</p>
<p class="p1">19:55 Advice for organizations relying more on technology during work from home.</p>
<p class="p1">27:48 What does Brian do outside of work?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://owlcyberdefense.com/'>Learn more about Owl Cyber Defense</a></p>
<p class="p3"><a href='https://owlcyberdefense.com/news/owl-cyber-defense-appoints-brian-romansky-chief-technology-officer/'>Learn more about Brian Romansky</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Hosts Ron and Chris welcome you to today’s episode! This episode of <em>Hacker Valley Studio </em>features Brian Romansky, the Chief Innovation Officer at Owl Cyber Defense. You will hear about his ideas, inventions, and how hardware is helping us in cybersecurity today.</p>
<p class="p2"> </p>
<p class="p1">The episode begins with Brian sharing his background, and journey into the cybersecurity space. He always knew he wanted to do something with technology and thought he may go into robotics. The transition into the cyber world was a natural one when he was working on a team that was moving mechanical postage metering to happen electronically. These machines were often trying to be hacked, and the team also began working on e-commerce and shipping platforms. From then, he continued to work on cybersecurity, data, and cryptography.</p>
<p class="p2"> </p>
<p class="p1">Today, at Owl Cyber Defense Brian works on cross domain solutions for the US Department of Defense, and other government organizations, as well as commercial customers. It gets him up in the morning because it combines many of the electrical and cryptography space that interests him, with hardware. His hope for the future, is that there is a paradigm shift in cybersecurity, making it less of a cat and mouse game by using hardware enforced mechanisms.</p>
<p class="p2"> </p>
<p class="p1">He doesn’t have a lot of free time, but as the episode wraps up, you will also hear about what Brian is interested in, and working on outside of work.</p>
<p class="p2"> </p>
<p class="p1">:29 CIO of Owl Cyber Defense, Brian Romansky is introduced to the show.</p>
<p class="p1">4:33 Brian shares his journey from electrical engineering to cybersecurity.</p>
<p class="p1">6:25 Brian explains the work he does today.</p>
<p class="p1">14:16 Brian hypothosizes on the future of cybersecurity</p>
<p class="p1">16:58 Brian answers the question “Is there an unhackable system?”</p>
<p class="p1">19:55 Advice for organizations relying more on technology during work from home.</p>
<p class="p1">27:48 What does Brian do outside of work?</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://owlcyberdefense.com/'>Learn more about Owl Cyber Defense</a></p>
<p class="p3"><a href='https://owlcyberdefense.com/news/owl-cyber-defense-appoints-brian-romansky-chief-technology-officer/'>Learn more about Brian Romansky</a></p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/jbpwsj/Hacker_Valley_Studio_Episode_82_What_is_Old_is_New_Again_with_Brian_Romansky_MIX.mp3" length="29613824" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Hosts Ron and Chris welcome you to today’s episode! This episode of Hacker Valley Studio features Brian Romansky, the Chief Innovation Officer at Owl Cyber Defense. You will hear about his ideas, inventions, and how hardware is helping us in cybersecurity today.
 
The episode begins with Brian sharing his background, and journey into the cybersecurity space. He always knew he wanted to do something with technology and thought he may go into robotics. The transition into the cyber world was a natural one when he was working on a team that was moving mechanical postage metering to happen electronically. These machines were often trying to be hacked, and the team also began working on e-commerce and shipping platforms. From then, he continued to work on cybersecurity, data, and cryptography.
 
Today, at Owl Cyber Defense Brian works on cross domain solutions for the US Department of Defense, and other government organizations, as well as commercial customers. It gets him up in the morning because it combines many of the electrical and cryptography space that interests him, with hardware. His hope for the future, is that there is a paradigm shift in cybersecurity, making it less of a cat and mouse game by using hardware enforced mechanisms.
 
He doesn’t have a lot of free time, but as the episode wraps up, you will also hear about what Brian is interested in, and working on outside of work.
 
:29 CIO of Owl Cyber Defense, Brian Romansky is introduced to the show.
4:33 Brian shares his journey from electrical engineering to cybersecurity.
6:25 Brian explains the work he does today.
14:16 Brian hypothosizes on the future of cybersecurity
16:58 Brian answers the question “Is there an unhackable system?”
19:55 Advice for organizations relying more on technology during work from home.
27:48 What does Brian do outside of work?
 
Links:
Learn more about Owl Cyber Defense
Learn more about Brian Romansky
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1850</itunes:duration>
                <itunes:episode>82</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 81 - Communicating in a Crisis with Christopher Budd</title>
        <itunes:title>Episode 81 - Communicating in a Crisis with Christopher Budd</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-81-communicating-in-a-crisis-with-christopher-budd/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-81-communicating-in-a-crisis-with-christopher-budd/#comments</comments>        <pubDate>Tue, 18 Aug 2020 06:04:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e4eaaa7e-7347-36e4-bd50-539dd33cff8f</guid>
                                    <description><![CDATA[<p class="p1">Security and Privacy Expert and author, Christopher Budd, is welcomed to the Hacker Valley Studio podcast! You will hear some great communication tips and how to handle people who fear worst case scenarios during a crisis. He explains how to showcase your authority and credibility during a tough situation. He talks about traits that make someone great at handling these situations, the importance of temperament, and improvisation.</p>
<p class="p1">In this episode, Christopher Budd shares his journey to becoming an expert in crisis communication. He spent ten years with the <a href='https://www.microsoft.com/en-us/msrc'>Microsoft Security Response Center</a>. He has worked with other security and technology companies as a consultant and full-time employee. He says, “...and if I can sum up what it is I do best, I always say, I take awful news and make it just bad.” Christopher gives some examples of his communication approach. 1) He says he is upfront about news being bad news. He recommends getting credibility by leading with the truth. 2) He then explains reasons why it is a bad situation. 3) Finally, he explains reasons why the situation could be better than you think it might be.</p>
<p class="p1">He explains that you are not only dealing with the situation itself but also peoples’ fears and projections of the situation. Christopher talks about different personality types and how they handle crisis management. He explains the importance of temperament, the ability to compartmentalize, and thinking about action steps. As the episode draws to a close, Christopher shares some of his thoughts on the workplace today and some of the changes in the COVID environment. He elaborates on topics like privacy and communication. He highlights how technology has allowed us to function as well as it has in the past few months.</p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ChristopherBudd?ref_src=twsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor'>Follow Christopher Budd on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/christopherbudd'>Learn more about Christopher Budd</a></p>
<p class="p3"><a href='https://christopherbudd.com/'>Check out christopherbudd.com</a></p>
<p class="p1">You can reach out to Christopher Budd at unimaginativelychristopher@christopherbudd.com</p>
<p class="p3"><a href='https://www.microsoft.com/en-us/msrc'>Learn more about the MSRC</a></p>
<p class="p1">Christopher Budd is published in <a href='https://www.amazon.com/Great-Thinkers-Z-Julian-Baggini/dp/0826467423'>Great Thinkers A-Z</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">Security and Privacy Expert and author, Christopher Budd, is welcomed to the <em>Hacker Valley Studio</em> podcast! You will hear some great communication tips and how to handle people who fear worst case scenarios during a crisis. He explains how to showcase your authority and credibility during a tough situation. He talks about traits that make someone great at handling these situations, the importance of temperament, and improvisation.</p>
<p class="p1">In this episode, Christopher Budd shares his journey to becoming an expert in crisis communication. He spent ten years with the <a href='https://www.microsoft.com/en-us/msrc'>Microsoft Security Response Center</a>. He has worked with other security and technology companies as a consultant and full-time employee. He says, “...and if I can sum up what it is I do best, I always say, I take awful news and make it <em>just bad</em>.” Christopher gives some examples of his communication approach. 1) He says he is upfront about news being bad news. He recommends getting credibility by leading with the truth. 2) He then explains reasons why it is a bad situation. 3) Finally, he explains reasons why the situation could be better than you think it might be.</p>
<p class="p1">He explains that you are not only dealing with the situation itself but also peoples’ fears and projections of the situation. Christopher talks about different personality types and how they handle crisis management. He explains the importance of temperament, the ability to compartmentalize, and thinking about action steps. As the episode draws to a close, Christopher shares some of his thoughts on the workplace today and some of the changes in the COVID environment. He elaborates on topics like privacy and communication. He highlights how technology has allowed us to function as well as it has in the past few months.</p>
<p class="p1">Links:</p>
<p class="p3"><a href='https://hackervalley.studio/'>Learn more about Hacker Valley Studio</a></p>
<p class="p3"><a href='https://www.patreon.com/hackervalleystudio'>Support Hacker Valley Studio on Patreon</a></p>
<p class="p3"><a href='https://twitter.com/TheHackerValley'>Follow Hacker Valley Studio on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ronaldeddings'>Follow Ronald Eddings on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/chriscochrcyber'>Follow Chris Cochran on Twitter</a></p>
<p class="p3"><a href='https://twitter.com/ChristopherBudd?ref_src=twsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor'>Follow Christopher Budd on Twitter</a></p>
<p class="p3"><a href='https://www.linkedin.com/in/christopherbudd'>Learn more about Christopher Budd</a></p>
<p class="p3"><a href='https://christopherbudd.com/'>Check out christopherbudd.com</a></p>
<p class="p1">You can reach out to Christopher Budd at unimaginativelychristopher@christopherbudd.com</p>
<p class="p3"><a href='https://www.microsoft.com/en-us/msrc'>Learn more about the MSRC</a></p>
<p class="p1">Christopher Budd is published in <a href='https://www.amazon.com/Great-Thinkers-Z-Julian-Baggini/dp/0826467423'><em>Great Thinkers A-Z</em></a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/d4kuzx/Hacker_Valley_Studio_Christopher_Budd_Mix.mp3" length="30748928" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Security and Privacy Expert and author, Christopher Budd, is welcomed to the Hacker Valley Studio podcast! You will hear some great communication tips and how to handle people who fear worst case scenarios during a crisis. He explains how to showcase your authority and credibility during a tough situation. He talks about traits that make someone great at handling these situations, the importance of temperament, and improvisation.
In this episode, Christopher Budd shares his journey to becoming an expert in crisis communication. He spent ten years with the Microsoft Security Response Center. He has worked with other security and technology companies as a consultant and full-time employee. He says, “...and if I can sum up what it is I do best, I always say, I take awful news and make it just bad.” Christopher gives some examples of his communication approach. 1) He says he is upfront about news being bad news. He recommends getting credibility by leading with the truth. 2) He then explains reasons why it is a bad situation. 3) Finally, he explains reasons why the situation could be better than you think it might be.
He explains that you are not only dealing with the situation itself but also peoples’ fears and projections of the situation. Christopher talks about different personality types and how they handle crisis management. He explains the importance of temperament, the ability to compartmentalize, and thinking about action steps. As the episode draws to a close, Christopher shares some of his thoughts on the workplace today and some of the changes in the COVID environment. He elaborates on topics like privacy and communication. He highlights how technology has allowed us to function as well as it has in the past few months.
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Follow Chris Cochran on Twitter
Follow Christopher Budd on Twitter
Learn more about Christopher Budd
Check out christopherbudd.com
You can reach out to Christopher Budd at unimaginativelychristopher@christopherbudd.com
Learn more about the MSRC
Christopher Budd is published in Great Thinkers A-Z]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1921</itunes:duration>
                <itunes:episode>81</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 80 - Leveraging MITRE ATT&amp;CK with Chris Kennedy</title>
        <itunes:title>Episode 80 - Leveraging MITRE ATT&amp;CK with Chris Kennedy</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-80-leveraging-mitre-attck-with-chris-kennedy/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-80-leveraging-mitre-attck-with-chris-kennedy/#comments</comments>        <pubDate>Sun, 09 Aug 2020 07:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d0bbbd07-ed4c-3819-b5b3-4fda1603f06a</guid>
                                    <description><![CDATA[<p class="p1">In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris speak with 25-year cybersecurity veteran Chris Kennedy.  Chris is the Chief Information Security Officer and the VP of Customer Success for AttackIQ, and he and the hosts discuss various topics related to cybersecurity and Chris’s background, with special focus on the MITRE ATT&CK framework</p>
<p class="p1">The beginning of the episode centers on Chris Kennedy himself, as he provides background information on both himself and his company.  Chris’s career took many turns preparing him for his current role, with a few especially remarkable highlights: he was one of the first cybersecurity officers in the Marine Corps, worked for the world’s largest hedge fund, and was basically one of the first CISO's in tech.  As an executive, he saw how much he depended on the ecosystem of security tech, and he also saw how unreliable this technology was.  This realization paved the way for his move to AttackIQ.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Learn more about <a href='https://attackiq.com/2019/01/24/christopher-kennedy-joins-attackiq-as-ciso-vp-customer-success/'>Chris Kennedy</a> and contact him at <a href='mailto:chris.kennedy@attackiq.com'>chris.kennedy@attackiq.com</a>.</p>
<p class="p1">Learn more about <a href='https://attackiq.com/'>AttackIQ</a>.</p>
<p class="p1">Learn more about AttackIQ’s <a href='https://academy.attackiq.com/'>Academy</a>.</p>
<p class="p1">Learn more about <a href='https://attack.mitre.org/'>MITRE ATT&CK</a>.</p>
<p class="p1">Learn more about MITRE ENGENUITY’s <a href='https://mitre-engenuity.org/center-for-threat-informed-defense/'>Center for Threat-Informed Defense</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p class="p1">In this episode of the <em>Hacker Valley Studio</em> podcast, hosts Ron and Chris speak with 25-year cybersecurity veteran Chris Kennedy.  Chris is the Chief Information Security Officer and the VP of Customer Success for AttackIQ, and he and the hosts discuss various topics related to cybersecurity and Chris’s background, with special focus on the MITRE ATT&CK framework</p>
<p class="p1">The beginning of the episode centers on Chris Kennedy himself, as he provides background information on both himself and his company.  Chris’s career took many turns preparing him for his current role, with a few especially remarkable highlights: he was one of the first cybersecurity officers in the Marine Corps, worked for the world’s largest hedge fund, and was basically one of the first CISO's in tech.  As an executive, he saw how much he depended on the ecosystem of security tech, and he also saw how unreliable this technology was.  This realization paved the way for his move to AttackIQ.</p>
<p class="p2"> </p>
<p class="p1">Links:</p>
<p class="p3">Learn more about <a href='https://attackiq.com/2019/01/24/christopher-kennedy-joins-attackiq-as-ciso-vp-customer-success/'>Chris Kennedy</a> and contact him at <a href='mailto:chris.kennedy@attackiq.com'>chris.kennedy@attackiq.com</a>.</p>
<p class="p1">Learn more about <a href='https://attackiq.com/'>AttackIQ</a>.</p>
<p class="p1">Learn more about AttackIQ’s <a href='https://academy.attackiq.com/'>Academy</a>.</p>
<p class="p1">Learn more about <a href='https://attack.mitre.org/'>MITRE ATT&CK</a>.</p>
<p class="p1">Learn more about MITRE ENGENUITY’s <a href='https://mitre-engenuity.org/center-for-threat-informed-defense/'>Center for Threat-Informed Defense</a>.</p>
<p class="p3">Learn more about <a href='https://hackervalley.studio/'>Hacker Valley Studio</a>.</p>
<p class="p1">Support Hacker Valley Studio on <a href='https://www.patreon.com/hackervalleystudio'>Patreon</a>.</p>
<p class="p1">Follow Hacker Valley Studio on <a href='https://twitter.com/TheHackerValley'>Twitter</a>.</p>
<p class="p1">Follow hosts <a href='https://twitter.com/ronaldeddings'>Ron Eddings</a> and <a href='https://twitter.com/chriscochrcyber'>Chris Cochran</a> on Twitter.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bhwiw5/Episode_80_Chris_Kennedy8q0t6.mp3" length="34916772" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris speak with 25-year cybersecurity veteran Chris Kennedy.  Chris is the Chief Information Security Officer and the VP of Customer Success for AttackIQ, and he and the hosts discuss various topics related to cybersecurity and Chris’s background, with special focus on the MITRE ATT&CK framework
The beginning of the episode centers on Chris Kennedy himself, as he provides background information on both himself and his company.  Chris’s career took many turns preparing him for his current role, with a few especially remarkable highlights: he was one of the first cybersecurity officers in the Marine Corps, worked for the world’s largest hedge fund, and was basically one of the first CISO's in tech.  As an executive, he saw how much he depended on the ecosystem of security tech, and he also saw how unreliable this technology was.  This realization paved the way for his move to AttackIQ.
 
Links:
Learn more about Chris Kennedy and contact him at chris.kennedy@attackiq.com.
Learn more about AttackIQ.
Learn more about AttackIQ’s Academy.
Learn more about MITRE ATT&CK.
Learn more about MITRE ENGENUITY’s Center for Threat-Informed Defense.
Learn more about Hacker Valley Studio.
Support Hacker Valley Studio on Patreon.
Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2178</itunes:duration>
                <itunes:episode>80</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 79 - Finding our Genius with Laura Garnett</title>
        <itunes:title>Episode 79 - Finding our Genius with Laura Garnett</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-79-finding-our-genius-with-laura-garnett/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-79-finding-our-genius-with-laura-garnett/#comments</comments>        <pubDate>Mon, 03 Aug 2020 08:43:36 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2f57aacd-144e-3ca3-8585-161e09fe8e77</guid>
                                    <description><![CDATA[<p>In this very special episode, we brought back fan favorite Laura Garnett a world-renowned performance strategist, to examine us to see what makes us special. We finds our purpose, our power, and our core emotional conflict in less than an hour! You really see a master at work in this one.</p>
<p> </p>
<p>Laura's Website: <a href='https://www.lauragarnett.com/'>https://www.lauragarnett.com/</a></p>
<p>Laura's LinkedIn: <a href='https://www.linkedin.com/in/lauragarnett/'>https://www.linkedin.com/in/lauragarnett/</a></p>
<p>Laura's Twitter: <a href='https://twitter.com/garnettl'>https://twitter.com/garnettl</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this very special episode, we brought back fan favorite Laura Garnett a world-renowned performance strategist, to examine us to see what makes us special. We finds our purpose, our power, and our core emotional conflict in less than an hour! You really see a master at work in this one.</p>
<p> </p>
<p>Laura's Website: <a href='https://www.lauragarnett.com/'>https://www.lauragarnett.com/</a></p>
<p>Laura's LinkedIn: <a href='https://www.linkedin.com/in/lauragarnett/'>https://www.linkedin.com/in/lauragarnett/</a></p>
<p>Laura's Twitter: <a href='https://twitter.com/garnettl'>https://twitter.com/garnettl</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rderi4/finding_our_genius_wlaura6809m.mp3" length="57042695" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this very special episode, we brought back fan favorite Laura Garnett a world-renowned performance strategist, to examine us to see what makes us special. We finds our purpose, our power, and our core emotional conflict in less than an hour! You really see a master at work in this one.
 
Laura's Website: https://www.lauragarnett.com/
Laura's LinkedIn: https://www.linkedin.com/in/lauragarnett/
Laura's Twitter: https://twitter.com/garnettl]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3561</itunes:duration>
                <itunes:episode>79</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 78 - Explaining Humans with Dr. Camilla Pang</title>
        <itunes:title>Episode 78 - Explaining Humans with Dr. Camilla Pang</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-78-explaining-humans-with-dr-camilla-pang/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-78-explaining-humans-with-dr-camilla-pang/#comments</comments>        <pubDate>Mon, 27 Jul 2020 17:17:10 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ccbfd101-a72c-3580-8f28-708e7a3e24fc</guid>
                                    <description><![CDATA[<p>In this episode, we have the brilliant Dr. Camilla Pang author of the incredible book, "Explaining Humans." We dive into her life, neurodiversity, and her awesome book.</p>
<p> </p>
<p>Dr. Pang's Instagram: <a href='https://www.instagram.com/millie_moonface/'>https://www.instagram.com/millie_moonface/</a></p>
<p>Dr. Pang's Twitter: <a href='https://twitter.com/millzymai'>https://twitter.com/millzymai</a></p>
<p>Dr. Pang's Book: <a href='https://www.amazon.com/dp/0241409608/ref=cm_sw_r_tw_dp_x_ug1hFbATW52TV'>https://www.amazon.com/dp/0241409608/ref=cm_sw_r_tw_dp_x_ug1hFbATW52TV</a></p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we have the brilliant Dr. Camilla Pang author of the incredible book, "Explaining Humans." We dive into her life, neurodiversity, and her awesome book.</p>
<p> </p>
<p>Dr. Pang's Instagram: <a href='https://www.instagram.com/millie_moonface/'>https://www.instagram.com/millie_moonface/</a></p>
<p>Dr. Pang's Twitter: <a href='https://twitter.com/millzymai'>https://twitter.com/millzymai</a></p>
<p>Dr. Pang's Book: <a href='https://www.amazon.com/dp/0241409608/ref=cm_sw_r_tw_dp_x_ug1hFbATW52TV'>https://www.amazon.com/dp/0241409608/ref=cm_sw_r_tw_dp_x_ug1hFbATW52TV</a></p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hyj7sz/episode_79_camilla_pangb4pyi.mp3" length="18764321" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we have the brilliant Dr. Camilla Pang author of the incredible book, "Explaining Humans." We dive into her life, neurodiversity, and her awesome book.
 
Dr. Pang's Instagram: https://www.instagram.com/millie_moonface/
Dr. Pang's Twitter: https://twitter.com/millzymai
Dr. Pang's Book: https://www.amazon.com/dp/0241409608/ref=cm_sw_r_tw_dp_x_ug1hFbATW52TV
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1168</itunes:duration>
                <itunes:episode>78</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 77 - Meeting Life with Grace with Charles Nwatu</title>
        <itunes:title>Episode 77 - Meeting Life with Grace with Charles Nwatu</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-77-meeting-life-with-grace-with-charles-nwatu/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-77-meeting-life-with-grace-with-charles-nwatu/#comments</comments>        <pubDate>Sun, 19 Jul 2020 11:22:33 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/46089b41-0242-5815-bc99-d444d9428cf2</guid>
                                    <description><![CDATA[<p>In this episode, we bring back fan favorite Charles Nwatu! His first episode was met with some much praise and we think you will love this one too. We discuss meeting people with grace even if they aren't so kind to us, being black men in tech and in society, and dive into some personal stories as well.</p>
<p> </p>
<p>Charles's Twitter: <a href='https://twitter.com/charles_nwatu'>https://twitter.com/charles_nwatu</a></p>
<p>Charles's LinkedIn: <a href='https://www.linkedin.com/in/cnwatu/'>https://www.linkedin.com/in/cnwatu/</a></p>
<p>This episodes sponsor: <a href='https://canary.tools/'>https://canary.tools/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we bring back fan favorite Charles Nwatu! His first episode was met with some much praise and we think you will love this one too. We discuss meeting people with grace even if they aren't so kind to us, being black men in tech and in society, and dive into some personal stories as well.</p>
<p> </p>
<p>Charles's Twitter: <a href='https://twitter.com/charles_nwatu'>https://twitter.com/charles_nwatu</a></p>
<p>Charles's LinkedIn: <a href='https://www.linkedin.com/in/cnwatu/'>https://www.linkedin.com/in/cnwatu/</a></p>
<p>This episodes sponsor: <a href='https://canary.tools/'>https://canary.tools/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/03leia/Episode_77_Charles_avw8d.mp3" length="29687685" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we bring back fan favorite Charles Nwatu! His first episode was met with some much praise and we think you will love this one too. We discuss meeting people with grace even if they aren't so kind to us, being black men in tech and in society, and dive into some personal stories as well.
 
Charles's Twitter: https://twitter.com/charles_nwatu
Charles's LinkedIn: https://www.linkedin.com/in/cnwatu/
This episodes sponsor: https://canary.tools/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1851</itunes:duration>
                <itunes:episode>77</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 76 - A Security Leadership Master Class with Gary Hayslip</title>
        <itunes:title>Episode 76 - A Security Leadership Master Class with Gary Hayslip</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-76-a-security-leadership-master-class-with-gary-hayslip/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-76-a-security-leadership-master-class-with-gary-hayslip/#comments</comments>        <pubDate>Mon, 13 Jul 2020 08:08:36 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/59b320b4-18d8-5b04-9a4a-2fbacce61494</guid>
                                    <description><![CDATA[<p>In this episode, we have the powerful Gary Hayslip in the studio to give us a master class on cybersecurity leadership. We talk about his leadership journey, the relationship between the CISO and the rest of the business, and disconnecting with LEGOs.</p>
<p> </p>
<p>Gary's LinkedIn: <a href='https://www.linkedin.com/in/ghayslip/'>https://www.linkedin.com/in/ghayslip/</a></p>
<p>CISO Desk Reference Guide: <a href='https://cisodrg.com/'>https://cisodrg.com/</a></p>
<p>Sponsor for this episode: <a href='https://canary.tools/'>https://canary.tools/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we have the powerful Gary Hayslip in the studio to give us a master class on cybersecurity leadership. We talk about his leadership journey, the relationship between the CISO and the rest of the business, and disconnecting with LEGOs.</p>
<p> </p>
<p>Gary's LinkedIn: <a href='https://www.linkedin.com/in/ghayslip/'>https://www.linkedin.com/in/ghayslip/</a></p>
<p>CISO Desk Reference Guide: <a href='https://cisodrg.com/'>https://cisodrg.com/</a></p>
<p>Sponsor for this episode: <a href='https://canary.tools/'>https://canary.tools/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/zpa29a/Episode_76_Gary_Hayslip_bjznq.mp3" length="40319730" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we have the powerful Gary Hayslip in the studio to give us a master class on cybersecurity leadership. We talk about his leadership journey, the relationship between the CISO and the rest of the business, and disconnecting with LEGOs.
 
Gary's LinkedIn: https://www.linkedin.com/in/ghayslip/
CISO Desk Reference Guide: https://cisodrg.com/
Sponsor for this episode: https://canary.tools/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2515</itunes:duration>
                <itunes:episode>76</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 75 - Losing Graciously with Graham Cluley</title>
        <itunes:title>Episode 75 - Losing Graciously with Graham Cluley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-75-losing-graciously-with-graham-cluley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-75-losing-graciously-with-graham-cluley/#comments</comments>        <pubDate>Sun, 05 Jul 2020 10:38:01 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/0712f1b1-d116-511d-806a-b0f293f627f5</guid>
                                    <description><![CDATA[<p>In this episode, we have fan favorite Graham Cluley back on the mic! We comfort each other after our recent loss at the 2020 Blogger Awards, we talk about the crazy world of content creation, and Graham gives away his podcasting secret sauce.</p>
<p>Graham's LinkedIn: <a href='https://www.linkedin.com/in/grahamcluley/'>https://www.linkedin.com/in/grahamcluley/</a></p>
<p>Twitter:<a href='https://twitter.com/gcluley'>https://twitter.com/gcluley</a></p>
<p>Website: <a href='https://www.grahamcluley.com/'>https://www.grahamcluley.com/</a></p>
<p>Graham's Podcast: <a href='https://www.smashingsecurity.com/'>https://www.smashingsecurity.com/</a></p>
<p>This episode's sponsor: <a href='https://canary.tools/'>https://canary.tools/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we have fan favorite Graham Cluley back on the mic! We comfort each other after our recent loss at the 2020 Blogger Awards, we talk about the crazy world of content creation, and Graham gives away his podcasting secret sauce.</p>
<p>Graham's LinkedIn: <a href='https://www.linkedin.com/in/grahamcluley/'>https://www.linkedin.com/in/grahamcluley/</a></p>
<p>Twitter:<a href='https://twitter.com/gcluley'>https://twitter.com/gcluley</a></p>
<p>Website: <a href='https://www.grahamcluley.com/'>https://www.grahamcluley.com/</a></p>
<p>Graham's Podcast: <a href='https://www.smashingsecurity.com/'>https://www.smashingsecurity.com/</a></p>
<p>This episode's sponsor: <a href='https://canary.tools/'>https://canary.tools/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/1djpei/Episode_75_Graham_Cluely_77pvb.mp3" length="31329428" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we have fan favorite Graham Cluley back on the mic! We comfort each other after our recent loss at the 2020 Blogger Awards, we talk about the crazy world of content creation, and Graham gives away his podcasting secret sauce.
Graham's LinkedIn: https://www.linkedin.com/in/grahamcluley/
Twitter:https://twitter.com/gcluley
Website: https://www.grahamcluley.com/
Graham's Podcast: https://www.smashingsecurity.com/
This episode's sponsor: https://canary.tools/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1953</itunes:duration>
                <itunes:episode>75</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 74 - Origins of Deception Technology with Haroon Meer</title>
        <itunes:title>Episode 74 - Origins of Deception Technology with Haroon Meer</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-74-origins-of-deception-technology-with-haroon-meer/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-74-origins-of-deception-technology-with-haroon-meer/#comments</comments>        <pubDate>Sun, 28 Jun 2020 11:09:29 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8fc66c02-c5a7-5148-b185-7d34885d25ff</guid>
                                    <description><![CDATA[<p>In this feature episode, we chat with the founder of Thinkst, Haroon Meer. We Talk about the origins of deception technology and how his technology is changing the way companies around the world are doing detection.</p>
<p>Thinkst Canary Website: <a href='https://canary.tools/'>https://canary.tools/</a></p>
<p>Thinkst Canary Love: <a href='https://canary.tools/love'>https://canary.tools/love</a></p>
<p>Thinkst: Twitter: <a href='https://twitter.com/ThinkstCanary'>https://twitter.com/ThinkstCanary</a></p>
<p>Haroon's Twitter: <a href='https://twitter.com/haroonmeer'>https://twitter.com/haroonmeer</a></p>
<p>Sponsored by Thinkst</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this feature episode, we chat with the founder of Thinkst, Haroon Meer. We Talk about the origins of deception technology and how his technology is changing the way companies around the world are doing detection.</p>
<p>Thinkst Canary Website: <a href='https://canary.tools/'>https://canary.tools/</a></p>
<p>Thinkst Canary Love: <a href='https://canary.tools/love'>https://canary.tools/love</a></p>
<p>Thinkst: Twitter: <a href='https://twitter.com/ThinkstCanary'>https://twitter.com/ThinkstCanary</a></p>
<p>Haroon's Twitter: <a href='https://twitter.com/haroonmeer'>https://twitter.com/haroonmeer</a></p>
<p>Sponsored by Thinkst</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/23am9e/Episode_74_Haroon_Meer_bhvmo.mp3" length="30455894" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this feature episode, we chat with the founder of Thinkst, Haroon Meer. We Talk about the origins of deception technology and how his technology is changing the way companies around the world are doing detection.
Thinkst Canary Website: https://canary.tools/
Thinkst Canary Love: https://canary.tools/love
Thinkst: Twitter: https://twitter.com/ThinkstCanary
Haroon's Twitter: https://twitter.com/haroonmeer
Sponsored by Thinkst]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1899</itunes:duration>
                <itunes:episode>74</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 73 - Creating Community with Shannon Morse</title>
        <itunes:title>Episode 73 - Creating Community with Shannon Morse</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-73-creating-community-with-shannon-morse/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-73-creating-community-with-shannon-morse/#comments</comments>        <pubDate>Sat, 20 Jun 2020 16:10:53 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/edecde65-0f1c-519a-b83f-b0a9c2a56f39</guid>
                                    <description><![CDATA[<p>In this episode, we have one of the originators of technical content creation, the amazing Shannon Morse. We talk a bit about her background, the communities she has been building for over a decade, and having a Code of Conduct for conferences.</p>
<p>Shannon's Twitter: <a href='https://twitter.com/Snubs'>https://twitter.com/Snubs</a></p>
<p>Shannon's Youtube: <a href='https://www.youtube.com/shannonmorse'>https://www.youtube.com/shannonmorse</a></p>
<p>Hak5:<a href='https://www.youtube.com/hak5'>https://www.youtube.com/hak5</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we have one of the originators of technical content creation, the amazing Shannon Morse. We talk a bit about her background, the communities she has been building for over a decade, and having a Code of Conduct for conferences.</p>
<p>Shannon's Twitter: <a href='https://twitter.com/Snubs'>https://twitter.com/Snubs</a></p>
<p>Shannon's Youtube: <a href='https://www.youtube.com/shannonmorse'>https://www.youtube.com/shannonmorse</a></p>
<p>Hak5:<a href='https://www.youtube.com/hak5'>https://www.youtube.com/hak5</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/q33fws/Episode_73_Shannon_Morse_9n2nn.mp3" length="31579786" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we have one of the originators of technical content creation, the amazing Shannon Morse. We talk a bit about her background, the communities she has been building for over a decade, and having a Code of Conduct for conferences.
Shannon's Twitter: https://twitter.com/Snubs
Shannon's Youtube: https://www.youtube.com/shannonmorse
Hak5:https://www.youtube.com/hak5]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1969</itunes:duration>
                <itunes:episode>73</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 72 - Security in Color with Dominique West</title>
        <itunes:title>Episode 72 - Security in Color with Dominique West</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-72-security-in-color-with-dominique-west/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-72-security-in-color-with-dominique-west/#comments</comments>        <pubDate>Sun, 14 Jun 2020 15:22:22 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9b30cb93-609f-57a4-9338-6ab88e946d2c</guid>
                                    <description><![CDATA[<p>In this episode we have the outstanding Dominique West. She is a podcaster (The Security in Color podcast), community builder, and cybersecurity powerhouse. We discuss her podcast, the ATL chapter of Women’s Society of Cyberjutsu (WSC), and her great advice on dealing with imposter syndrome.</p>
<p> </p>
<p>Dominique's LinkedIn: <a href='https://www.linkedin.com/in/dominiquewest/'>https://www.linkedin.com/in/dominiquewest/</a></p>
<p>Dominique's Website and Podcast: <a href='https://www.securityincolor.com/'>https://www.securityincolor.com/</a></p>
<p>Dominique's Twitter and other social media: @domyboo</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we have the outstanding Dominique West. She is a podcaster (The Security in Color podcast), community builder, and cybersecurity powerhouse. We discuss her podcast, the ATL chapter of Women’s Society of Cyberjutsu (WSC), and her great advice on dealing with imposter syndrome.</p>
<p> </p>
<p>Dominique's LinkedIn: <a href='https://www.linkedin.com/in/dominiquewest/'>https://www.linkedin.com/in/dominiquewest/</a></p>
<p>Dominique's Website and Podcast: <a href='https://www.securityincolor.com/'>https://www.securityincolor.com/</a></p>
<p>Dominique's Twitter and other social media: @domyboo</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/idqqkk/Episode_72_Dominique_West_aj5mi.mp3" length="31359104" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we have the outstanding Dominique West. She is a podcaster (The Security in Color podcast), community builder, and cybersecurity powerhouse. We discuss her podcast, the ATL chapter of Women’s Society of Cyberjutsu (WSC), and her great advice on dealing with imposter syndrome.
 
Dominique's LinkedIn: https://www.linkedin.com/in/dominiquewest/
Dominique's Website and Podcast: https://www.securityincolor.com/
Dominique's Twitter and other social media: @domyboo]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1955</itunes:duration>
                <itunes:episode>72</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 71 - Leading from the Front with Wilson Bautista Jr.</title>
        <itunes:title>Episode 71 - Leading from the Front with Wilson Bautista Jr.</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-71-leading-from-the-front-with-wilson-bautista-jr/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-71-leading-from-the-front-with-wilson-bautista-jr/#comments</comments>        <pubDate>Mon, 08 Jun 2020 11:11:43 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9335dfb5-c0ad-5e1d-bc83-abe4d3f946fd</guid>
                                    <description><![CDATA[<p>In this episode we have the outstanding author, podcaster, Marine, and professional pianist Wilson Bautista Jr. We discuss his latest book "Finding your Career in Cybersecurity" and his extraordinary path through life and leadership.</p>
<p>Wilson's LinkedIn: <a href='https://www.linkedin.com/in/bautistawilson/'>https://www.linkedin.com/in/bautistawilson</a></p>
<p>Wilson's Podcast:<a href='https://www.devseclead.com/'>https://www.devseclead.com/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we have the outstanding author, podcaster, Marine, and professional pianist Wilson Bautista Jr. We discuss his latest book "Finding your Career in Cybersecurity" and his extraordinary path through life and leadership.</p>
<p>Wilson's LinkedIn: <a href='https://www.linkedin.com/in/bautistawilson/'>https://www.linkedin.com/in/bautistawilson</a></p>
<p>Wilson's Podcast:<a href='https://www.devseclead.com/'>https://www.devseclead.com/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rcsr08/Episode_71_Wilson_Bautista_a0jzz.mp3" length="39826121" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we have the outstanding author, podcaster, Marine, and professional pianist Wilson Bautista Jr. We discuss his latest book "Finding your Career in Cybersecurity" and his extraordinary path through life and leadership.
Wilson's LinkedIn: https://www.linkedin.com/in/bautistawilson
Wilson's Podcast:https://www.devseclead.com/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2485</itunes:duration>
                <itunes:episode>71</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 70 - Finding the Genius Within with Laura Garnett</title>
        <itunes:title>Episode 70 - Finding the Genius Within with Laura Garnett</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-70-finding-the-genius-within-with-laura-garnett/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-70-finding-the-genius-within-with-laura-garnett/#comments</comments>        <pubDate>Sun, 31 May 2020 14:30:05 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/5c0ce5a5-a645-5881-a1ae-eedf89841b1d</guid>
                                    <description><![CDATA[<p>In this episode we have the powerful Laura Garnett. She is a performance strategist and the author of the best-selling book "The Genius Habit." She has built her career on finding the genius in others and has an insightful take on passion versus purpose.</p>
<p> </p>
<p>Laura's Website: <a href='http://www.lauragarnett.com/'>http://www.lauragarnett.com/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we have the powerful Laura Garnett. She is a performance strategist and the author of the best-selling book "The Genius Habit." She has built her career on finding the genius in others and has an insightful take on passion versus purpose.</p>
<p> </p>
<p>Laura's Website: <a href='http://www.lauragarnett.com/'>http://www.lauragarnett.com/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/33mlo0/Episode_70_Laura_Garnett_6tvw6.mp3" length="28120338" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we have the powerful Laura Garnett. She is a performance strategist and the author of the best-selling book "The Genius Habit." She has built her career on finding the genius in others and has an insightful take on passion versus purpose.
 
Laura's Website: http://www.lauragarnett.com/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1753</itunes:duration>
                <itunes:episode>70</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 69 - Paving a Path with Georgia Weidman</title>
        <itunes:title>Episode 69 - Paving a Path with Georgia Weidman</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-69-paving-a-path-with-georgia-weidman/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-69-paving-a-path-with-georgia-weidman/#comments</comments>        <pubDate>Thu, 28 May 2020 00:00:31 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b0835e45-4ba9-5e78-82c1-db4254f4d426</guid>
                                    <description><![CDATA[<p>In this episode, we have the powerful Georgia Weidman. She is a serial entrepreneur, penetration tester, security researcher, speaker, and author with an incredible backstory.</p>
<p> </p>
<p>Georgia's LinkedIn: <a href='https://www.linkedin.com/in/georgiaweidman/'>https://www.linkedin.com/in/georgiaweidman/</a></p>
<p>Georgia's Youtube: <a href='https://www.youtube.com/channel/UCNKUSu4TPk979JzMeKDXiwQ/featured'>https://www.youtube.com/channel/UCNKUSu4TPk979JzMeKDXiwQ/featured</a></p>
<p>Georgia's Company Website: <a href='https://www.shevirah.com/'>https://www.shevirah.com/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we have the powerful Georgia Weidman. She is a serial entrepreneur, penetration tester, security researcher, speaker, and author with an incredible backstory.</p>
<p> </p>
<p>Georgia's LinkedIn: <a href='https://www.linkedin.com/in/georgiaweidman/'>https://www.linkedin.com/in/georgiaweidman/</a></p>
<p>Georgia's Youtube: <a href='https://www.youtube.com/channel/UCNKUSu4TPk979JzMeKDXiwQ/featured'>https://www.youtube.com/channel/UCNKUSu4TPk979JzMeKDXiwQ/featured</a></p>
<p>Georgia's Company Website: <a href='https://www.shevirah.com/'>https://www.shevirah.com/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/b70qxq/Episode_69_Georgia_Weidman_8wlgm.mp3" length="28949151" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we have the powerful Georgia Weidman. She is a serial entrepreneur, penetration tester, security researcher, speaker, and author with an incredible backstory.
 
Georgia's LinkedIn: https://www.linkedin.com/in/georgiaweidman/
Georgia's Youtube: https://www.youtube.com/channel/UCNKUSu4TPk979JzMeKDXiwQ/featured
Georgia's Company Website: https://www.shevirah.com/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1805</itunes:duration>
                <itunes:episode>69</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 68 - Behavioral Economics and Cybersecurity with Kelly Shortridge</title>
        <itunes:title>Episode 68 - Behavioral Economics and Cybersecurity with Kelly Shortridge</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-68-behavioral-economics-and-cybersecurity-with-kelly-shortridge/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-68-behavioral-economics-and-cybersecurity-with-kelly-shortridge/#comments</comments>        <pubDate>Tue, 26 May 2020 11:17:22 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7011a561-7d6a-53e8-b0a4-357e5e4fc839</guid>
                                    <description><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, we have the brilliant Kelly Shortridge sharing her thoughts on behavioral economics and cybersecurity. She also has a lesson or two for vendors in the cybersecurity space.</p>
<p>Kelly's Websites: <a href='https://kellyshortridge.com/'>https://kellyshortridge.com/</a> and <a href='https://swagitda.com/'>https://swagitda.com/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode of the Hacker Valley Studio podcast, we have the brilliant Kelly Shortridge sharing her thoughts on behavioral economics and cybersecurity. She also has a lesson or two for vendors in the cybersecurity space.</p>
<p>Kelly's Websites: <a href='https://kellyshortridge.com/'>https://kellyshortridge.com/</a> and <a href='https://swagitda.com/'>https://swagitda.com/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/t51rid/Episode_68_Kelly_Shortridge_94xwg.mp3" length="74681147" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode of the Hacker Valley Studio podcast, we have the brilliant Kelly Shortridge sharing her thoughts on behavioral economics and cybersecurity. She also has a lesson or two for vendors in the cybersecurity space.
Kelly's Websites: https://kellyshortridge.com/ and https://swagitda.com/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2318</itunes:duration>
                <itunes:episode>68</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 67 - Doubling Down on Humans with Caroline Wong</title>
        <itunes:title>Episode 67 - Doubling Down on Humans with Caroline Wong</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-67-doubling-down-on-humans-with-caroline-wong/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-67-doubling-down-on-humans-with-caroline-wong/#comments</comments>        <pubDate>Tue, 19 May 2020 14:36:37 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/bcd89087-88f0-5f7e-bdbb-2fcf4403fd27</guid>
                                    <description><![CDATA[<p>In this episode we have author, speaker, podcaster, and expert Caroline Wong in the studio. We get to learn more about her and her fascination with people.</p>
<p> </p>
<p>Caroline's LinkedIn: <a href='https://www.linkedin.com/in/carolinewmwong/'>https://www.linkedin.com/in/carolinewmwong/</a></p>
<p>Caroline's Twitter: <a href='https://twitter.com/CarolineWMWong'>https://twitter.com/CarolineWMWong</a></p>
<p>Caroline's Podcast: <a href='https://twitter.com/humansofinfosec'>https://twitter.com/humansofinfosec</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we have author, speaker, podcaster, and expert Caroline Wong in the studio. We get to learn more about her and her fascination with people.</p>
<p> </p>
<p>Caroline's LinkedIn: <a href='https://www.linkedin.com/in/carolinewmwong/'>https://www.linkedin.com/in/carolinewmwong/</a></p>
<p>Caroline's Twitter: <a href='https://twitter.com/CarolineWMWong'>https://twitter.com/CarolineWMWong</a></p>
<p>Caroline's Podcast: <a href='https://twitter.com/humansofinfosec'>https://twitter.com/humansofinfosec</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/194wft/Episode67CarolineWong878nz.mp3" length="64040510" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we have author, speaker, podcaster, and expert Caroline Wong in the studio. We get to learn more about her and her fascination with people.
 
Caroline's LinkedIn: https://www.linkedin.com/in/carolinewmwong/
Caroline's Twitter: https://twitter.com/CarolineWMWong
Caroline's Podcast: https://twitter.com/humansofinfosec]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1959</itunes:duration>
                <itunes:episode>67</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 66 - Serial Advocacy with Chloé Messdaghi</title>
        <itunes:title>Episode 66 - Serial Advocacy with Chloé Messdaghi</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-66-serial-advocacy-with-chloe-messdaghi/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-66-serial-advocacy-with-chloe-messdaghi/#comments</comments>        <pubDate>Sun, 17 May 2020 16:17:55 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9cfbc045-87be-544c-8d4b-1c7f929bc9ae</guid>
                                    <description><![CDATA[<p>In this episode we have the powerful serial advocate, Chloé Messdaghi. We discuss hackers rights, women in security, several of her other passions.</p>
<p>Chloé's Twitter: <a href='https://twitter.com/ChloeMessdaghi'>https://twitter.com/ChloeMessdaghi</a></p>
<p>Chloé's LinkedIn: <a href='https://www.linkedin.com/in/messdaghi/'>https://www.linkedin.com/in/messdaghi/</a></p>
<p>The Hacker's Rights Petition: <a href='https://www.change.org/p/organizations-support-ethical-hackers'>https://www.change.org/p/organizations-support-ethical-hackers</a></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we have the powerful serial advocate, Chloé Messdaghi. We discuss hackers rights, women in security, several of her other passions.</p>
<p>Chloé's Twitter: <a href='https://twitter.com/ChloeMessdaghi'>https://twitter.com/ChloeMessdaghi</a></p>
<p>Chloé's LinkedIn: <a href='https://www.linkedin.com/in/messdaghi/'>https://www.linkedin.com/in/messdaghi/</a></p>
<p>The Hacker's Rights Petition: <a href='https://www.change.org/p/organizations-support-ethical-hackers'>https://www.change.org/p/organizations-support-ethical-hackers</a></p>
<p> </p>
<p> </p>
<p> </p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4huj6c/Episode66ChloeMessdaghi81sz0.mp3" length="70235015" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we have the powerful serial advocate, Chloé Messdaghi. We discuss hackers rights, women in security, several of her other passions.
Chloé's Twitter: https://twitter.com/ChloeMessdaghi
Chloé's LinkedIn: https://www.linkedin.com/in/messdaghi/
The Hacker's Rights Petition: https://www.change.org/p/organizations-support-ethical-hackers
 
 
 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2157</itunes:duration>
                <itunes:episode>66</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 65 - Chatting with John Kindervag the Godfather of Zero Trust</title>
        <itunes:title>Episode 65 - Chatting with John Kindervag the Godfather of Zero Trust</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-65-chatting-with-john-kindervag-the-godfather-of-zero-trust/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-65-chatting-with-john-kindervag-the-godfather-of-zero-trust/#comments</comments>        <pubDate>Wed, 13 May 2020 19:40:05 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/7d3fc59c-8326-5786-9a12-9fa4f16201a1</guid>
                                    <description><![CDATA[<p>John Kindervag is a household name in cybersecurity and he is the creator of the Zero Trust networking model. John is a brilliant thought-leader and we think you will agree with us after this episode.</p>
<p> </p>
<p>John's LinkedIn: <a href='https://www.linkedin.com/in/john-kindervag-40572b1/'>https://www.linkedin.com/in/john-kindervag-40572b1/</a></p>
<p>John's Twitter: <a href='https://twitter.com/Kindervag'>https://twitter.com/Kindervag</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>John Kindervag is a household name in cybersecurity and he is the creator of the Zero Trust networking model. John is a brilliant thought-leader and we think you will agree with us after this episode.</p>
<p> </p>
<p>John's LinkedIn: <a href='https://www.linkedin.com/in/john-kindervag-40572b1/'>https://www.linkedin.com/in/john-kindervag-40572b1/</a></p>
<p>John's Twitter: <a href='https://twitter.com/Kindervag'>https://twitter.com/Kindervag</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/51na9t/Episode65JohnKindervagba2v8.mp3" length="48558896" type="audio/mpeg"/>
        <itunes:summary><![CDATA[John Kindervag is a household name in cybersecurity and he is the creator of the Zero Trust networking model. John is a brilliant thought-leader and we think you will agree with us after this episode.
 
John's LinkedIn: https://www.linkedin.com/in/john-kindervag-40572b1/
John's Twitter: https://twitter.com/Kindervag]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1499</itunes:duration>
                <itunes:episode>65</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 64 - Becoming a Networking Machine with Jordan Harbinger</title>
        <itunes:title>Episode 64 - Becoming a Networking Machine with Jordan Harbinger</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-64-becoming-a-networking-machine-with-jordan-harbinger/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-64-becoming-a-networking-machine-with-jordan-harbinger/#comments</comments>        <pubDate>Sun, 10 May 2020 11:48:30 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/b3e273f9-17c5-5a70-a76a-b878b0333a9b</guid>
                                    <description><![CDATA[<p>We are extremely excited to bring you the master of networking himself, Jordan Harbinger. Jordan Harbinger is the mastermind behind the Jordan Harbinger Show that brings in over 6 million downloads per month! In this episode we discuss networking, learning tough subjects, the art of conversation and more.</p>
<p> </p>
<p>Jordan's Website: <a href='https://www.jordanharbinger.com/'>https://www.jordanharbinger.com/</a></p>
<p>His 6 Minute Networking Course: <a href='https://www.jordanharbinger.com/courses/'>https://www.jordanharbinger.com/courses/</a></p>
<p>His Twitter: @JordanHarbinger</p>
<p>His LinkedIn: <a href='https://www.linkedin.com/in/jordanharbinger/'>https://www.linkedin.com/in/jordanharbinger/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We are extremely excited to bring you the master of networking himself, Jordan Harbinger. Jordan Harbinger is the mastermind behind the Jordan Harbinger Show that brings in over 6 million downloads per month! In this episode we discuss networking, learning tough subjects, the art of conversation and more.</p>
<p> </p>
<p>Jordan's Website: <a href='https://www.jordanharbinger.com/'>https://www.jordanharbinger.com/</a></p>
<p>His 6 Minute Networking Course: <a href='https://www.jordanharbinger.com/courses/'>https://www.jordanharbinger.com/courses/</a></p>
<p>His Twitter: @JordanHarbinger</p>
<p>His LinkedIn: <a href='https://www.linkedin.com/in/jordanharbinger/'>https://www.linkedin.com/in/jordanharbinger/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9ntbwi/Episode64JordanHarbinger6i41j.mp3" length="65946804" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We are extremely excited to bring you the master of networking himself, Jordan Harbinger. Jordan Harbinger is the mastermind behind the Jordan Harbinger Show that brings in over 6 million downloads per month! In this episode we discuss networking, learning tough subjects, the art of conversation and more.
 
Jordan's Website: https://www.jordanharbinger.com/
His 6 Minute Networking Course: https://www.jordanharbinger.com/courses/
His Twitter: @JordanHarbinger
His LinkedIn: https://www.linkedin.com/in/jordanharbinger/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2013</itunes:duration>
                <itunes:episode>64</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 63 - Head in the Clouds with Francesco Cipollone</title>
        <itunes:title>Episode 63 - Head in the Clouds with Francesco Cipollone</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-63-head-in-the-clouds-with-francesco-cipollone/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-63-head-in-the-clouds-with-francesco-cipollone/#comments</comments>        <pubDate>Wed, 06 May 2020 08:17:37 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/198c2986-d3bf-5a9c-bf72-8a65b469e892</guid>
                                    <description><![CDATA[<p>In this episode we have the exciting Francesco Cipollone. We talk about his long history with cloud technologies and how he is sharing his knowledge with the community.</p>
<p> </p>
<p>Frank's LinkedIn: <a href='https://www.linkedin.com/in/fracipo/'>https://www.linkedin.com/in/fracipo/</a></p>
<p>Frank's Twitter: @FrankSEC42</p>
<p>Frank's Website: <a href='https://www.nsc42.co.uk/'>https://www.nsc42.co.uk/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we have the exciting Francesco Cipollone. We talk about his long history with cloud technologies and how he is sharing his knowledge with the community.</p>
<p> </p>
<p>Frank's LinkedIn: <a href='https://www.linkedin.com/in/fracipo/'>https://www.linkedin.com/in/fracipo/</a></p>
<p>Frank's Twitter: @FrankSEC42</p>
<p>Frank's Website: <a href='https://www.nsc42.co.uk/'>https://www.nsc42.co.uk/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/k7hgz6/Episode_63_Francesco_Cippollone.mp3" length="69431526" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we have the exciting Francesco Cipollone. We talk about his long history with cloud technologies and how he is sharing his knowledge with the community.
 
Frank's LinkedIn: https://www.linkedin.com/in/fracipo/
Frank's Twitter: @FrankSEC42
Frank's Website: https://www.nsc42.co.uk/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2137</itunes:duration>
                <itunes:episode>63</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 62 - Broadcasting Your Best with Dave Bittner</title>
        <itunes:title>Episode 62 - Broadcasting Your Best with Dave Bittner</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-62-broadcasting-your-best-with-dave-bittner/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-62-broadcasting-your-best-with-dave-bittner/#comments</comments>        <pubDate>Sun, 03 May 2020 10:33:24 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/758c7f46-4b68-5a7a-8c07-fa2cd8ce2ed0</guid>
                                    <description><![CDATA[<p>We are incredibly excited to host a titan of cybersecurity broadcasting, the one and only, Dave Bittner. He is the host of several podcasts including the popular Cyberwire podcast. We dive into Dave's story and his advice for those thinking about creating a podcast.</p>
<p> </p>
<p>Dave's Twitter: @bittner</p>
<p>The Cyberwire: <a href='https://thecyberwire.com/'>https://thecyberwire.com/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We are incredibly excited to host a titan of cybersecurity broadcasting, the one and only, Dave Bittner. He is the host of several podcasts including the popular Cyberwire podcast. We dive into Dave's story and his advice for those thinking about creating a podcast.</p>
<p> </p>
<p>Dave's Twitter: @bittner</p>
<p>The Cyberwire: <a href='https://thecyberwire.com/'>https://thecyberwire.com/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/b3wte7/Episode_62_Dave_Bittner.mp3" length="59948403" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We are incredibly excited to host a titan of cybersecurity broadcasting, the one and only, Dave Bittner. He is the host of several podcasts including the popular Cyberwire podcast. We dive into Dave's story and his advice for those thinking about creating a podcast.
 
Dave's Twitter: @bittner
The Cyberwire: https://thecyberwire.com/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1836</itunes:duration>
                <itunes:episode>62</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 61 - Conferences and Careers Post-COVID with Kathleen Smith</title>
        <itunes:title>Episode 61 - Conferences and Careers Post-COVID with Kathleen Smith</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-61-conferences-and-careers-post-covid-with-kathleen-smith/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-61-conferences-and-careers-post-covid-with-kathleen-smith/#comments</comments>        <pubDate>Wed, 29 Apr 2020 14:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/50d3cc5d-f7fc-591a-a0e9-b5f70f920cae</guid>
                                    <description><![CDATA[<p>In this episode Kathleen Smith provides her thoughts for conference hosts and job seekers in today's climate. </p>
<p> </p>
<p>Kathleen's Twitter: @YesItsKathleen</p>
<p>Kathleen's LinkedIn: <a href='https://www.linkedin.com/in/kathleenesmith/'>https://www.linkedin.com/in/kathleenesmith/</a></p>
<p>Her Job Boards:ClearedJobs.Net & CyberSecJobs.Com</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode Kathleen Smith provides her thoughts for conference hosts and job seekers in today's climate. </p>
<p> </p>
<p>Kathleen's Twitter: @YesItsKathleen</p>
<p>Kathleen's LinkedIn: <a href='https://www.linkedin.com/in/kathleenesmith/'>https://www.linkedin.com/in/kathleenesmith/</a></p>
<p>Her Job Boards:ClearedJobs.Net & CyberSecJobs.Com</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/udvutv/Episode_61_Kathleen_Smith.mp3" length="71353291" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode Kathleen Smith provides her thoughts for conference hosts and job seekers in today's climate. 
 
Kathleen's Twitter: @YesItsKathleen
Kathleen's LinkedIn: https://www.linkedin.com/in/kathleenesmith/
Her Job Boards:ClearedJobs.Net & CyberSecJobs.Com]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2213</itunes:duration>
                <itunes:episode>61</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 60 - Clearing the Fog of Cyber War with Dr. Chase Cunningham</title>
        <itunes:title>Episode 60 - Clearing the Fog of Cyber War with Dr. Chase Cunningham</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-60-clearing-the-fog-of-cyber-war-with-dr-chase-cunningham/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-60-clearing-the-fog-of-cyber-war-with-dr-chase-cunningham/#comments</comments>        <pubDate>Mon, 27 Apr 2020 07:01:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e7dbaab1-e667-54bf-a912-b7ca8229922e</guid>
                                    <description><![CDATA[<p>Dr. Chase Cunningham is the author of "Cyber Warfare – Truth, Tactics, and Strategies" and an expert in Zero Trust security. We talk about his book, all of the work and research that went into the book, and his personal story with the Zero Trust model.</p>
<p> </p>
<p>Dr. Cunningham's Twitter: @CynjaChaseC</p>
<p>Dr. Cunningham's LinkedIn: <a href='https://www.linkedin.com/in/dr-chase-cunningham-54b26243/'>https://www.linkedin.com/in/dr-chase-cunningham-54b26243/</a></p>
<p><a href='https://www.packtpub.com/security/cyber-warfare-truth-tactics-and-strategies'>Dr. Cunningham's Book: https://www.packtpub.com/security/cyber-warfare-truth-tactics-and-strategies</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Dr. Chase Cunningham is the author of "Cyber Warfare – Truth, Tactics, and Strategies" and an expert in Zero Trust security. We talk about his book, all of the work and research that went into the book, and his personal story with the Zero Trust model.</p>
<p> </p>
<p>Dr. Cunningham's Twitter: @CynjaChaseC</p>
<p>Dr. Cunningham's LinkedIn: <a href='https://www.linkedin.com/in/dr-chase-cunningham-54b26243/'>https://www.linkedin.com/in/dr-chase-cunningham-54b26243/</a></p>
<p><a href='https://www.packtpub.com/security/cyber-warfare-truth-tactics-and-strategies'>Dr. Cunningham's Book: https://www.packtpub.com/security/cyber-warfare-truth-tactics-and-strategies</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/abzhnm/Episode_60_Dr_Chase_Cunningham.mp3" length="35666852" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Dr. Chase Cunningham is the author of "Cyber Warfare – Truth, Tactics, and Strategies" and an expert in Zero Trust security. We talk about his book, all of the work and research that went into the book, and his personal story with the Zero Trust model.
 
Dr. Cunningham's Twitter: @CynjaChaseC
Dr. Cunningham's LinkedIn: https://www.linkedin.com/in/dr-chase-cunningham-54b26243/
Dr. Cunningham's Book: https://www.packtpub.com/security/cyber-warfare-truth-tactics-and-strategies
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1102</itunes:duration>
                <itunes:episode>60</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 59 - Dawn of the Intelligence Executive with Mike Anderson</title>
        <itunes:title>Episode 59 - Dawn of the Intelligence Executive with Mike Anderson</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-59-dawn-of-the-intelligence-executive-with-mike-anderson/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-59-dawn-of-the-intelligence-executive-with-mike-anderson/#comments</comments>        <pubDate>Wed, 22 Apr 2020 07:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/9040d703-5300-5825-9f05-1e1fe9d10c97</guid>
                                    <description><![CDATA[<p>In this episode, we have the awesome Mike Anderson in the studio. He is the VP of Partnerships at Intel 471. We talk about threat intelligence and the future of intelligence leadership in the commercial sector.</p>
<p> </p>
<p>Mike's LinkedIn: <a href='https://www.linkedin.com/in/michaelanderson2009/'>https://www.linkedin.com/in/michaelanderson2009/</a></p>
<p>The Intel 471 Website: <a href='https://intel471.com/'>https://intel471.com/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, we have the awesome Mike Anderson in the studio. He is the VP of Partnerships at Intel 471. We talk about threat intelligence and the future of intelligence leadership in the commercial sector.</p>
<p> </p>
<p>Mike's LinkedIn: <a href='https://www.linkedin.com/in/michaelanderson2009/'>https://www.linkedin.com/in/michaelanderson2009/</a></p>
<p>The Intel 471 Website: <a href='https://intel471.com/'>https://intel471.com/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/vxhk2x/Episode_59_Mike_Anderson.mp3" length="36767581" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, we have the awesome Mike Anderson in the studio. He is the VP of Partnerships at Intel 471. We talk about threat intelligence and the future of intelligence leadership in the commercial sector.
 
Mike's LinkedIn: https://www.linkedin.com/in/michaelanderson2009/
The Intel 471 Website: https://intel471.com/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1137</itunes:duration>
                <itunes:episode>59</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 58 - Having Too Much Fun with Graham Cluley</title>
        <itunes:title>Episode 58 - Having Too Much Fun with Graham Cluley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-58-having-too-much-fun-with-graham-cluley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-58-having-too-much-fun-with-graham-cluley/#comments</comments>        <pubDate>Mon, 20 Apr 2020 02:50:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d74c319c-1c9a-5375-9a1c-bf6813698366</guid>
                                    <description><![CDATA[<p>This was an unbelievably fun podcast to record. If you are a fan of Graham Cluley, you will absolutely love this chat. We talk about his origin story, what it is like having an award-winning podcast, and a very cool story about chess. Enjoy!</p>
<p> </p>
<p>Graham's LinkedIn: <a href='https://www.linkedin.com/in/grahamcluley/'>https://www.linkedin.com/in/grahamcluley/</a></p>
<p>Twitter:@gcluley</p>
<p>Website: <a href='https://www.grahamcluley.com/'>https://www.grahamcluley.com/</a></p>
<p>Graham's Podcast: <a href='https://www.smashingsecurity.com/'>https://www.smashingsecurity.com/</a></p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>This was an unbelievably fun podcast to record. If you are a fan of Graham Cluley, you will absolutely love this chat. We talk about his origin story, what it is like having an award-winning podcast, and a very cool story about chess. Enjoy!</p>
<p> </p>
<p>Graham's LinkedIn: <a href='https://www.linkedin.com/in/grahamcluley/'>https://www.linkedin.com/in/grahamcluley/</a></p>
<p>Twitter:@gcluley</p>
<p>Website: <a href='https://www.grahamcluley.com/'>https://www.grahamcluley.com/</a></p>
<p>Graham's Podcast: <a href='https://www.smashingsecurity.com/'>https://www.smashingsecurity.com/</a></p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/xtyzrr/Episode_58_Graham_Cluley.mp3" length="69058204" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This was an unbelievably fun podcast to record. If you are a fan of Graham Cluley, you will absolutely love this chat. We talk about his origin story, what it is like having an award-winning podcast, and a very cool story about chess. Enjoy!
 
Graham's LinkedIn: https://www.linkedin.com/in/grahamcluley/
Twitter:@gcluley
Website: https://www.grahamcluley.com/
Graham's Podcast: https://www.smashingsecurity.com/
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2122</itunes:duration>
                <itunes:episode>58</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 57 - Underrepresented III</title>
        <itunes:title>Episode 57 - Underrepresented III</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-57-underrepresented-iii/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-57-underrepresented-iii/#comments</comments>        <pubDate>Sat, 18 Apr 2020 16:03:45 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/da5f20de-b2da-5c75-9c77-8c57f57b7c8d</guid>
                                    <description><![CDATA[<p>We are back with another episode of Underrepresented! This is our co-produced series with Marco and Sean from ITSP Magazine.</p>
<p>Our guests for this episode:</p>
<p>Ashley Tolbert, representing Women in Security and Privacy (WISP)
Kim Crawley, representing the neuro-diverse workforce</p>
<p>In this episode we cover a few types of diversity and the importance of tribes.</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>We are back with another episode of Underrepresented! This is our co-produced series with Marco and Sean from ITSP Magazine.</p>
<p>Our guests for this episode:</p>
<p>Ashley Tolbert, representing Women in Security and Privacy (WISP)<br>
Kim Crawley, representing the neuro-diverse workforce</p>
<p>In this episode we cover a few types of diversity and the importance of tribes.</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3pbd6r/Underrepresented_III_.mp3" length="93172897" type="audio/mpeg"/>
        <itunes:summary><![CDATA[We are back with another episode of Underrepresented! This is our co-produced series with Marco and Sean from ITSP Magazine.
Our guests for this episode:
Ashley Tolbert, representing Women in Security and Privacy (WISP)Kim Crawley, representing the neuro-diverse workforce
In this episode we cover a few types of diversity and the importance of tribes.
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2885</itunes:duration>
                <itunes:episode>57</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 56 - Digging into Deepfakes with Alyssa Miller</title>
        <itunes:title>Episode 56 - Digging into Deepfakes with Alyssa Miller</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-56-digging-into-deepfakes-with-alyssa-miller/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-56-digging-into-deepfakes-with-alyssa-miller/#comments</comments>        <pubDate>Wed, 15 Apr 2020 07:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/d7bc08c0-af9c-5951-a3a9-b3bc16c65504</guid>
                                    <description><![CDATA[<p>In this conversation, we sit down with security veteran Alyssa Miller to talk about her recent deepfake research. We also discuss stoking the fire of curiosity to keep things fresh in cybersecurity.</p>
<p>Alyssa's Twitter: @AlyssaM_InfoSec</p>
<p>Alyssa's LinkedIn: <a href='https://www.linkedin.com/in/alyssam-infosec/'>https://www.linkedin.com/in/alyssam-infosec/</a></p>
<p>Alyssa's Website: <a href='https://alyssasec.com/'>https://alyssasec.com/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this conversation, we sit down with security veteran Alyssa Miller to talk about her recent deepfake research. We also discuss stoking the fire of curiosity to keep things fresh in cybersecurity.</p>
<p>Alyssa's Twitter: @AlyssaM_InfoSec</p>
<p>Alyssa's LinkedIn: <a href='https://www.linkedin.com/in/alyssam-infosec/'>https://www.linkedin.com/in/alyssam-infosec/</a></p>
<p>Alyssa's Website: <a href='https://alyssasec.com/'>https://alyssasec.com/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/7venig/Episode_56_Alyssa_Miller.mp3" length="58648434" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this conversation, we sit down with security veteran Alyssa Miller to talk about her recent deepfake research. We also discuss stoking the fire of curiosity to keep things fresh in cybersecurity.
Alyssa's Twitter: @AlyssaM_InfoSec
Alyssa's LinkedIn: https://www.linkedin.com/in/alyssam-infosec/
Alyssa's Website: https://alyssasec.com/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1797</itunes:duration>
                <itunes:episode>56</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 55 - A Tech Origin Story with Sam Crowther</title>
        <itunes:title>Episode 55 - A Tech Origin Story with Sam Crowther</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-55-a-tech-origin-story-with-sam-crowther/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-55-a-tech-origin-story-with-sam-crowther/#comments</comments>        <pubDate>Mon, 13 Apr 2020 07:02:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8b3b5df1-9849-5d75-b1f8-b9b3837fea28</guid>
                                    <description><![CDATA[<p>If you love interesting origin stories, look no further than this episode with Sam Crowther. He is the founder and CEO of Kasada. We discuss his origin and the beginnings of his company.</p>
<p> </p>
<p>Sam's Twitter: @InfoSecSam</p>
<p>Sam's LinkedIn: <a href='https://www.linkedin.com/in/samjcrowther'>linkedin.com/in/samjcrowther</a></p>
<p>Kasada's Website: <a href='https://www.kasada.io/'>https://www.kasada.io/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>If you love interesting origin stories, look no further than this episode with Sam Crowther. He is the founder and CEO of Kasada. We discuss his origin and the beginnings of his company.</p>
<p> </p>
<p>Sam's Twitter: @InfoSecSam</p>
<p>Sam's LinkedIn: <a href='https://www.linkedin.com/in/samjcrowther'>linkedin.com/in/samjcrowther</a></p>
<p>Kasada's Website: <a href='https://www.kasada.io/'>https://www.kasada.io/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qqv9hf/Episode_55_Sam_Crowther.mp3" length="25962175" type="audio/mpeg"/>
        <itunes:summary><![CDATA[If you love interesting origin stories, look no further than this episode with Sam Crowther. He is the founder and CEO of Kasada. We discuss his origin and the beginnings of his company.
 
Sam's Twitter: @InfoSecSam
Sam's LinkedIn: linkedin.com/in/samjcrowther
Kasada's Website: https://www.kasada.io/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>801</itunes:duration>
                <itunes:episode>55</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 54 - Hiring Leaders and Finding Talent with Alex Maestretti</title>
        <itunes:title>Episode 54 - Hiring Leaders and Finding Talent with Alex Maestretti</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/hiring-leaders-and-finding-talent-with-alex-maestretti/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/hiring-leaders-and-finding-talent-with-alex-maestretti/#comments</comments>        <pubDate>Thu, 09 Apr 2020 08:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/88b220d4-949a-5e8e-94be-93a1a72596ad</guid>
                                    <description><![CDATA[<p>In this episode we sit down to chat with Alex Maestretti, CISO of Remitly. In this conversation, we explore finding talent and the unique challenge of hiring managers. Chris also shares his unique relationship to Alex.</p>
<p>Alex's LinkedIn: <a href='https://www.linkedin.com/in/maestretti'>linkedin.com/in/maestretti</a></p>
<p>Alex's Twitter Handle: @maestretti</p>
<p>Remitly's Website: <a href='https://www.remitly.com/us/en'>https://www.remitly.com/us/en</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode we sit down to chat with Alex Maestretti, CISO of Remitly. In this conversation, we explore finding talent and the unique challenge of hiring managers. Chris also shares his unique relationship to Alex.</p>
<p>Alex's LinkedIn: <a href='https://www.linkedin.com/in/maestretti'>linkedin.com/in/maestretti</a></p>
<p>Alex's Twitter Handle: @maestretti</p>
<p>Remitly's Website: <a href='https://www.remitly.com/us/en'>https://www.remitly.com/us/en</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/i2f44r/Episode_54_Alex_Maestretti.mp3" length="31290802" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode we sit down to chat with Alex Maestretti, CISO of Remitly. In this conversation, we explore finding talent and the unique challenge of hiring managers. Chris also shares his unique relationship to Alex.
Alex's LinkedIn: linkedin.com/in/maestretti
Alex's Twitter Handle: @maestretti
Remitly's Website: https://www.remitly.com/us/en]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>966</itunes:duration>
                <itunes:episode>54</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 53 - In the Depths of Deception with Jenny Radcliffe</title>
        <itunes:title>Episode 53 - In the Depths of Deception with Jenny Radcliffe</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-53-in-the-depths-of-deception-with-jenny-radcliffe/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-53-in-the-depths-of-deception-with-jenny-radcliffe/#comments</comments>        <pubDate>Mon, 06 Apr 2020 16:39:42 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/37560e5a-2c96-5514-ba70-e9661f23c5b9</guid>
                                    <description><![CDATA[<p>Psychology is a major pillar of Social Engineering 🧠. In this episode, we brought in a true expert, Jenny Radcliffe - A burgular for hire, a professional con-artist, and an expert in Non-verbal communications. This episode had Chris and Ron on the edge of their seats. To learn more about Jenny Radcliffe:</p>
<p>@Jenny_Radcliffe</p>
<p><a href='https://humanfactorsecurity.co.uk/'>https://humanfactorsecurity.co.uk/</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Psychology is a major pillar of Social Engineering 🧠. In this episode, we brought in a true expert, Jenny Radcliffe - A burgular for hire, a professional con-artist, and an expert in Non-verbal communications. This episode had Chris and Ron on the edge of their seats. To learn more about Jenny Radcliffe:</p>
<p>@Jenny_Radcliffe</p>
<p><a href='https://humanfactorsecurity.co.uk/'>https://humanfactorsecurity.co.uk/</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5ntzwt/Episode_53_Jenny_Radcliffe_Audio_1_.mp3" length="77609968" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Psychology is a major pillar of Social Engineering 🧠. In this episode, we brought in a true expert, Jenny Radcliffe - A burgular for hire, a professional con-artist, and an expert in Non-verbal communications. This episode had Chris and Ron on the edge of their seats. To learn more about Jenny Radcliffe:
@Jenny_Radcliffe
https://humanfactorsecurity.co.uk/]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2381</itunes:duration>
                <itunes:episode>53</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 52 - From Librarian to OSINT with Tracy Maleeff</title>
        <itunes:title>Episode 52 - From Librarian to OSINT with Tracy Maleeff</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-52-from-librarian-to-osint-with-tracy-maleeff/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-52-from-librarian-to-osint-with-tracy-maleeff/#comments</comments>        <pubDate>Wed, 01 Apr 2020 10:40:55 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2c4c1b5f-fd06-5ca1-83e1-0e5f0bd02bb0</guid>
                                    <description><![CDATA[<p>Open Source Intelligence (OSINT) is "data collected from publicly available sources to be used in an intelligence context". Performing OSINT is a critical aspect in triaging cybersecurity related events. In this exciting episode, Ron and Chris bring in an OSINT expert with the ultimate background for finding open source data. Tracy Maleeff aka InfoSecSherpa, is a seasoned expert in library science and security analysis. Be sure to listen in on this episode and gain insight for how library science applies to all aspects of life.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Open Source Intelligence (OSINT) is "data collected from publicly available sources to be used in an intelligence context". Performing OSINT is a critical aspect in triaging cybersecurity related events. In this exciting episode, Ron and Chris bring in an OSINT expert with the ultimate background for finding open source data. Tracy Maleeff aka InfoSecSherpa, is a seasoned expert in library science and security analysis. Be sure to listen in on this episode and gain insight for how library science applies to all aspects of life.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/amsruk/Episode_52_Tracy_Maleeff.mp3" length="78177837" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Open Source Intelligence (OSINT) is "data collected from publicly available sources to be used in an intelligence context". Performing OSINT is a critical aspect in triaging cybersecurity related events. In this exciting episode, Ron and Chris bring in an OSINT expert with the ultimate background for finding open source data. Tracy Maleeff aka InfoSecSherpa, is a seasoned expert in library science and security analysis. Be sure to listen in on this episode and gain insight for how library science applies to all aspects of life.]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2414</itunes:duration>
                <itunes:episode>52</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 51 - A Threat Intelligence Journey with Doug Helton</title>
        <itunes:title>Episode 51 - A Threat Intelligence Journey with Doug Helton</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-51-a-threat-intelligence-journey-with-doug-helton/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-51-a-threat-intelligence-journey-with-doug-helton/#comments</comments>        <pubDate>Mon, 30 Mar 2020 14:26:44 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ab3fcc70-db93-50de-a8db-c4a7ebfc41cc</guid>
                                    <description><![CDATA[<p>Can Threat Intelligence Analysts do the same in the professional space as the Threat Intel Analysts depicted in movies? Yes, as long as you have the same level of skills and tools as the characters in the movie. Doug Helton joins this episode to share his experience in Cyber Threat Intelligence and acquiring skills required to be highly effective.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Can Threat Intelligence Analysts do the same in the professional space as the Threat Intel Analysts depicted in movies? Yes, as long as you have the same level of skills and tools as the characters in the movie. Doug Helton joins this episode to share his experience in Cyber Threat Intelligence and acquiring skills required to be highly effective.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/28hgpj/Episode_51_Doug_Helton.mp3" length="46574775" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Can Threat Intelligence Analysts do the same in the professional space as the Threat Intel Analysts depicted in movies? Yes, as long as you have the same level of skills and tools as the characters in the movie. Doug Helton joins this episode to share his experience in Cyber Threat Intelligence and acquiring skills required to be highly effective.]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1435</itunes:duration>
                <itunes:episode>51</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 50 - 50th Episode and Beyond with Ron and Chris</title>
        <itunes:title>Episode 50 - 50th Episode and Beyond with Ron and Chris</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-50-50th-episode-and-beyond-with-ron-and-chris/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-50-50th-episode-and-beyond-with-ron-and-chris/#comments</comments>        <pubDate>Wed, 25 Mar 2020 02:01:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/19268fd3-0c35-5160-a2d1-dfe12ec2950b</guid>
                                    <description><![CDATA[<p>🎊Happy 50th Episode! This episode couldn't have been possible without our amazing guests and listeners! Looking into the future, we are excited to share new content and resources that we've been working on.</p>
<p><a href='https://hackervalley.studio'>HackerValley.Studio Website</a></p>
<p><a href='https://www.patreon.com/hackervalleystudio'>Hacker Valley Studio Patreon</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>🎊Happy 50th Episode! This episode couldn't have been possible without our amazing guests and listeners! Looking into the future, we are excited to share new content and resources that we've been working on.</p>
<p><a href='https://hackervalley.studio'>HackerValley.Studio Website</a></p>
<p><a href='https://www.patreon.com/hackervalleystudio'>Hacker Valley Studio Patreon</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wtyznh/50th_Episode_with_Ron_and_Chris.mp3" length="55225173" type="audio/mpeg"/>
        <itunes:summary><![CDATA[🎊Happy 50th Episode! This episode couldn't have been possible without our amazing guests and listeners! Looking into the future, we are excited to share new content and resources that we've been working on.
HackerValley.Studio Website
Hacker Valley Studio Patreon]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1695</itunes:duration>
                <itunes:episode>50</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 49 - What is Your Superpower with Yael Nagler</title>
        <itunes:title>Episode 49 - What is Your Superpower with Yael Nagler</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/what-is-your-superpower-with-yael-nagler/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/what-is-your-superpower-with-yael-nagler/#comments</comments>        <pubDate>Mon, 23 Mar 2020 08:00:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/414fb070-15e8-5c53-9b22-c18401fa0e48</guid>
                                    <description><![CDATA[<p>Everyone has a superpower and it's not uncommon to have more than one. In this episode, Chris and Ron discover and share what their super powers are with Yael Nagler. Yael is a security tinkerer and has an amazing ability of bringing together people in technology.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Everyone has a superpower and it's not uncommon to have more than one. In this episode, Chris and Ron discover and share what their super powers are with Yael Nagler. Yael is a security tinkerer and has an amazing ability of bringing together people in technology.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/w5ekji/Episode_49_Yael_Nagler_Audio.mp3" length="54746977" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Everyone has a superpower and it's not uncommon to have more than one. In this episode, Chris and Ron discover and share what their super powers are with Yael Nagler. Yael is a security tinkerer and has an amazing ability of bringing together people in technology.]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1689</itunes:duration>
                <itunes:episode>49</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Underrepresented Episode 2</title>
        <itunes:title>Underrepresented Episode 2</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/underrepresented-episode-2/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/underrepresented-episode-2/#comments</comments>        <pubDate>Thu, 19 Mar 2020 18:54:21 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/14296c30-470e-5a31-a62f-a2fc57b41506</guid>
                                    <description><![CDATA[<p>This is the second episode of the Hacker Valley Studio and ITSP Magazine co-production focused on underrepresented populations in technology.In this episode we highlight Nelson Abbott from NPower and Charles Nwatu from /Dev/Color.So many powerful statements in this one about organizations fighting for representation and awesome thoughts on being a role model</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>This is the second episode of the Hacker Valley Studio and ITSP Magazine co-production focused on underrepresented populations in technology.In this episode we highlight Nelson Abbott from NPower and Charles Nwatu from /Dev/Color.So many powerful statements in this one about organizations fighting for representation and awesome thoughts on being a role model</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/i28i8t/UnderRepresented-Episode2-HVS-Podcast.mp3" length="64004320" type="audio/mpeg"/>
        <itunes:summary><![CDATA[This is the second episode of the Hacker Valley Studio and ITSP Magazine co-production focused on underrepresented populations in technology.In this episode we highlight Nelson Abbott from NPower and Charles Nwatu from /Dev/Color.So many powerful statements in this one about organizations fighting for representation and awesome thoughts on being a role model]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2719</itunes:duration>
                <itunes:episode>48</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 47 - The Role of a CISO with Lenny Zeltser</title>
        <itunes:title>Episode 47 - The Role of a CISO with Lenny Zeltser</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-47-the-role-of-a-ciso-with-lenny-zeltser/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-47-the-role-of-a-ciso-with-lenny-zeltser/#comments</comments>        <pubDate>Wed, 18 Mar 2020 02:01:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/e1c3ccd3-7e45-5f88-ae90-ac0064c55735</guid>
                                    <description><![CDATA[<p>In this exciting episode, Lenny Zeltser - CISO @ Axonius joins the podcast. Lenny is someone we really enjoy speaking to and is an all around expert in malware, technical writing, and managing teams to success.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this exciting episode, Lenny Zeltser - CISO @ Axonius joins the podcast. Lenny is someone we really enjoy speaking to and is an all around expert in malware, technical writing, and managing teams to success.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/r4w7wk/Episode_47_Lenny_Zeltser_Audio.mp3" length="41392337" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this exciting episode, Lenny Zeltser - CISO @ Axonius joins the podcast. Lenny is someone we really enjoy speaking to and is an all around expert in malware, technical writing, and managing teams to success.]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1273</itunes:duration>
                <itunes:episode>47</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 46 - Emotional Intelligence in Tech with Deidre Diamond</title>
        <itunes:title>Episode 46 - Emotional Intelligence in Tech with Deidre Diamond</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-46-emotional-intelligence-in-tech-with-deidre-diamond/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-46-emotional-intelligence-in-tech-with-deidre-diamond/#comments</comments>        <pubDate>Mon, 16 Mar 2020 05:15:00 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/70ecc757-af2d-5e92-97e8-00f0b6646129</guid>
                                    <description><![CDATA[<p>In many workplaces contributors, leaders, and founders can improve their emotional intelligence. Deidre Diamond, Founder and CEO @ CyberSN shares her experience cultivating a diverse team of recruiters and changing the future of how employers and candidates can both win when interviewing and hiring. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In many workplaces contributors, leaders, and founders can improve their emotional intelligence. Deidre Diamond, Founder and CEO @ CyberSN shares her experience cultivating a diverse team of recruiters and changing the future of how employers and candidates can both win when interviewing and hiring. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/te4kyx/Episode_46_Deidre_Diamond_Audio.mp3" length="65893035" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In many workplaces contributors, leaders, and founders can improve their emotional intelligence. Deidre Diamond, Founder and CEO @ CyberSN shares her experience cultivating a diverse team of recruiters and changing the future of how employers and candidates can both win when interviewing and hiring. ]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2037</itunes:duration>
                <itunes:episode>46</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 45 - The More Things Change with Katie Nickels</title>
        <itunes:title>Episode 45 - The More Things Change with Katie Nickels</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-45-the-more-things-change-with-katie-nickels/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-45-the-more-things-change-with-katie-nickels/#comments</comments>        <pubDate>Wed, 11 Mar 2020 10:56:34 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f4b817c8-597f-5e89-babd-d6410b7bc41c</guid>
                                    <description><![CDATA[<p>It's most exciting to shake things up and get experience from multiple perspectives. In this episode, we're joined by an individual that is constantly striving to make an impact in Cyber Threat Intelligence - Katie Nickels, Principal Intelligence Analyst @ Red Canary. Katie has made incredible contributions to MITRE ATTACK framework and also SANS contributor </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>It's most exciting to shake things up and get experience from multiple perspectives. In this episode, we're joined by an individual that is constantly striving to make an impact in Cyber Threat Intelligence - Katie Nickels, Principal Intelligence Analyst @ Red Canary. Katie has made incredible contributions to MITRE ATTACK framework and also SANS contributor </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/b2ith9/Episode_45_Katie_Nickles.mp3" length="29265783" type="audio/mpeg"/>
        <itunes:summary><![CDATA[It's most exciting to shake things up and get experience from multiple perspectives. In this episode, we're joined by an individual that is constantly striving to make an impact in Cyber Threat Intelligence - Katie Nickels, Principal Intelligence Analyst @ Red Canary. Katie has made incredible contributions to MITRE ATTACK framework and also SANS contributor ]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>896</itunes:duration>
                <itunes:episode>45</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 44 - Breaching and Teaching with Deviant Ollam</title>
        <itunes:title>Episode 44 - Breaching and Teaching with Deviant Ollam</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-44-breaching-and-teaching-with-deviant-ollam/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-44-breaching-and-teaching-with-deviant-ollam/#comments</comments>        <pubDate>Mon, 02 Mar 2020 07:02:26 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/8a50c3d6-7723-5da6-aade-7469782c1514</guid>
                                    <description><![CDATA[<p>New episode alert 🚨! In this episode, Ron and Chris are joined by Deviant Ollam - Author of Practical Lock Picking and Director of Education @ CORE Group. There's not many security controls that can keep Deviant and his team out during a security audit except for a gasoline moat. Tune in to hear the full story</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>New episode alert 🚨! In this episode, Ron and Chris are joined by Deviant Ollam - Author of Practical Lock Picking and Director of Education @ CORE Group. There's not many security controls that can keep Deviant and his team out during a security audit except for a gasoline moat. Tune in to hear the full story</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qbnhau/Episode_44_Deviant_Ollam.mp3" length="76099432" type="audio/mpeg"/>
        <itunes:summary><![CDATA[New episode alert 🚨! In this episode, Ron and Chris are joined by Deviant Ollam - Author of Practical Lock Picking and Director of Education @ CORE Group. There's not many security controls that can keep Deviant and his team out during a security audit except for a gasoline moat. Tune in to hear the full story]]></itunes:summary>
        <itunes:author>Hacker Valley Studio</itunes:author>
        <itunes:explicit>true</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2334</itunes:duration>
                <itunes:episode>44</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
            </item>
    <item>
        <title>Episode 43 - A Dark Episode with Jack Rhysider</title>
        <itunes:title>Episode 43 - A Dark Episode with Jack Rhysider</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-43-a-dark-episode-with-jack-rhysider/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-43-a-dark-episode-with-jack-rhysider/#comments</comments>        <pubDate>Mon, 24 Feb 2020 02:01:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/73c25389-64dc-56ff-9e58-9b4085b2ac76</guid>
                                    <description><![CDATA[<p>Storytelling is essential for conveying any message. In this episode, we're joined by Jack Rhysider, Host of Darknet Diaries podcast and lifelong learner. Jack shares how he learned to deliver compelling stories about the dark side of the Internet.</p>
<p> </p>
<p>Also, be sure to check our Jack's blog - TunnelsUp.com</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Storytelling is essential for conveying any message. In this episode, we're joined by Jack Rhysider, Host of Darknet Diaries podcast and lifelong learner. Jack shares how he learned to deliver compelling stories about the dark side of the Internet.</p>
<p> </p>
<p>Also, be sure to check our Jack's blog - TunnelsUp.com</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qeac2v/Episode_43_Jack_Rhysider.mp3" length="60804529" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Storytelling is essential for conveying any message. In this episode, we're joined by Jack Rhysider, Host of Darknet Diaries podcast and lifelong learner. Jack shares how he learned to deliver compelling stories about the dark side of the Internet.
 
Also, be sure to check our Jack's blog - TunnelsUp.com]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1872</itunes:duration>
                <itunes:episode>43</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 43 - A Dark Episode with Jack Rhysider</media:title></media:content>    </item>
    <item>
        <title>Episode 42 - ICS Threat Intelligence with Rob M. Lee</title>
        <itunes:title>Episode 42 - ICS Threat Intelligence with Rob M. Lee</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-42-ics-threat-intelligence-with-rob-m-lee/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-42-ics-threat-intelligence-with-rob-m-lee/#comments</comments>        <pubDate>Thu, 20 Feb 2020 11:25:01 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/bdea0ffd-db3b-52d8-ab81-37a2e2d8531c</guid>
                                    <description><![CDATA[<p>industrial control system (ICS) is facing difficult cyber security challenges. For that reason, we brought in an expert to speak on the topic Robert M. Lee 🚨. Robert M. Lee is the founder and CEO at Dragos Inc. where he and his team develop solutions to tackle this challenge. Rob is also a distinguished leader in cybersecurity and SANS teacher.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>industrial control system (ICS) is facing difficult cyber security challenges. For that reason, we brought in an expert to speak on the topic Robert M. Lee 🚨. Robert M. Lee is the founder and CEO at Dragos Inc. where he and his team develop solutions to tackle this challenge. Rob is also a distinguished leader in cybersecurity and SANS teacher.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/whub2j/Episode_42_Rob_Lee.mp3" length="37534606" type="audio/mpeg"/>
        <itunes:summary><![CDATA[industrial control system (ICS) is facing difficult cyber security challenges. For that reason, we brought in an expert to speak on the topic Robert M. Lee 🚨. Robert M. Lee is the founder and CEO at Dragos Inc. where he and his team develop solutions to tackle this challenge. Rob is also a distinguished leader in cybersecurity and SANS teacher.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1154</itunes:duration>
                <itunes:episode>42</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 42 - ICS Threat Intelligence with Rob M. Lee</media:title></media:content>    </item>
    <item>
        <title>Episode 41 - Leading Marines, Agents, And InfoSec with M.K. Palmore</title>
        <itunes:title>Episode 41 - Leading Marines, Agents, And InfoSec with M.K. Palmore</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-41-leading-marines-agents-and-infosec-with-mk-palmore/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-41-leading-marines-agents-and-infosec-with-mk-palmore/#comments</comments>        <pubDate>Thu, 13 Feb 2020 10:32:01 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/dd4408e9-023b-5c75-af34-dfbd6b3ef036</guid>
                                    <description><![CDATA[<p>In this special episode - M.K. Palmore, Field CSO @ Palo Alto Networks joins Chris and Ron to discuss Leadership. M.K. has spent his career leading US Marines, FBI Agents, and Information Security teams</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this special episode - M.K. Palmore, Field CSO @ Palo Alto Networks joins Chris and Ron to discuss Leadership. M.K. has spent his career leading US Marines, FBI Agents, and Information Security teams</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ur7mte/Episode_41_MK.mp3" length="64770108" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this special episode - M.K. Palmore, Field CSO @ Palo Alto Networks joins Chris and Ron to discuss Leadership. M.K. has spent his career leading US Marines, FBI Agents, and Information Security teams]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1981</itunes:duration>
                <itunes:episode>41</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 41 - Leading Marines, Agents, And InfoSec with M.K. Palmore</media:title></media:content>    </item>
    <item>
        <title>Episode 40 - Lessons in Humility with Daniel Meade</title>
        <itunes:title>Episode 40 - Lessons in Humility with Daniel Meade</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-40-lessons-in-humility-with-daniel-meade/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-40-lessons-in-humility-with-daniel-meade/#comments</comments>        <pubDate>Mon, 10 Feb 2020 18:56:47 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/25eabbd7-27ab-5777-9591-1b7cbe5da573</guid>
                                    <description><![CDATA[<p>As we progress through life, lessons are always in front of us. In this episode, Ron and Chris are joined by Daniel Meade - A Security Sales Leader and an individual who has learned easy and hard lessons along the way. Be sure to check out this episode and hear Daniel's fascinating story!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>As we progress through life, lessons are always in front of us. In this episode, Ron and Chris are joined by Daniel Meade - A Security Sales Leader and an individual who has learned easy and hard lessons along the way. Be sure to check out this episode and hear Daniel's fascinating story!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5gdubj/Episode_40_Daniel_Meade_Audio.mp3" length="78108021" type="audio/mpeg"/>
        <itunes:summary><![CDATA[As we progress through life, lessons are always in front of us. In this episode, Ron and Chris are joined by Daniel Meade - A Security Sales Leader and an individual who has learned easy and hard lessons along the way. Be sure to check out this episode and hear Daniel's fascinating story!]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2403</itunes:duration>
                <itunes:episode>40</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/IMG_20200126_205923_834.jpg" medium="image">
                            <media:title type="html">Episode 40 - Lessons in Humility with Daniel Meade</media:title></media:content>    </item>
    <item>
        <title>Episode 39 - Live Episode Superbowl Edition with Ron and Chris</title>
        <itunes:title>Episode 39 - Live Episode Superbowl Edition with Ron and Chris</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-39-live-episode-superbowl-edition-with-ron-and-chris/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-39-live-episode-superbowl-edition-with-ron-and-chris/#comments</comments>        <pubDate>Wed, 05 Feb 2020 07:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/02d2d7bf-6fc1-50cb-a9d6-858eaf06e269</guid>
                                    <description><![CDATA[<p>On Superbowl Sunday Hacker Valley Studio had a live episode - a perfect time to share techniques for optimizing personal and professional performance.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>On Superbowl Sunday Hacker Valley Studio had a live episode - a perfect time to share techniques for optimizing personal and professional performance.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/m3gwd3/Live_Episode_Superbowl_Edition_Audio.mp3" length="44539864" type="audio/mpeg"/>
        <itunes:summary><![CDATA[On Superbowl Sunday Hacker Valley Studio had a live episode - a perfect time to share techniques for optimizing personal and professional performance.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1113</itunes:duration>
                <itunes:episode>39</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/IMG_20200126_205923_834.jpg" medium="image">
                            <media:title type="html">Episode 39 - Live Episode Superbowl Edition with Ron and Chris</media:title></media:content>    </item>
    <item>
        <title>Episode 38 - Social Engineering: The Human Hacker with Chris Hadnagy</title>
        <itunes:title>Episode 38 - Social Engineering: The Human Hacker with Chris Hadnagy</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-38-social-engineering-the-human-hacker-with-chris-hadnagy/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-38-social-engineering-the-human-hacker-with-chris-hadnagy/#comments</comments>        <pubDate>Mon, 03 Feb 2020 06:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/3796fd12-3069-5a58-97c3-d4b504d957de</guid>
                                    <description><![CDATA[<p>Human error is the biggest cybersecurity threat. Social engineering and psychological attacks are often the most successful for attackers, penetration testers, and red teams. In this episode, Ron and Chris are joined by Chris Hadnagy an expert and leader in Social Engineering. Chris shares practical advice and wisdom how psychology plays part in social engineering and how to get started. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Human error is the biggest cybersecurity threat. Social engineering and psychological attacks are often the most successful for attackers, penetration testers, and red teams. In this episode, Ron and Chris are joined by Chris Hadnagy an expert and leader in Social Engineering. Chris shares practical advice and wisdom how psychology plays part in social engineering and how to get started. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/hugwp4/Episode_38_Chris_Hadnagy.mp3" length="67450944" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Human error is the biggest cybersecurity threat. Social engineering and psychological attacks are often the most successful for attackers, penetration testers, and red teams. In this episode, Ron and Chris are joined by Chris Hadnagy an expert and leader in Social Engineering. Chris shares practical advice and wisdom how psychology plays part in social engineering and how to get started. ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2074</itunes:duration>
                <itunes:episode>38</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/IMG_20200126_205923_834.jpg" medium="image">
                            <media:title type="html">Episode 38 - Social Engineering: The Human Hacker with Chris Hadnagy</media:title></media:content>    </item>
    <item>
        <title>Episode 37 - Lifestyle Design: Priming for Success with Charlotte Smith</title>
        <itunes:title>Episode 37 - Lifestyle Design: Priming for Success with Charlotte Smith</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-37-lifestyle-design-priming-for-success-with-charlotte-smith/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-37-lifestyle-design-priming-for-success-with-charlotte-smith/#comments</comments>        <pubDate>Fri, 31 Jan 2020 08:41:57 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/f1215a19-892a-5dd8-949a-6dc0367a7c3e</guid>
                                    <description><![CDATA[<p>What is one thing you can do tomorrow to get on the right path and increase the quality of your work and life? Ask yourself ! In this episode, Chris and Ron are joined by Charlotte Smith - Lifestyle Design and Executive Coach. Charlotte shares insights and strategies on listening to yourself and assessing what works with YOU.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What is one thing you can do tomorrow to get on the right path and increase the quality of your work and life? Ask yourself ! In this episode, Chris and Ron are joined by Charlotte Smith - Lifestyle Design and Executive Coach. Charlotte shares insights and strategies on listening to yourself and assessing what works with YOU.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/72fuhz/Episode_37_Charlotte_Smith_Audio.mp3" length="51793528" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What is one thing you can do tomorrow to get on the right path and increase the quality of your work and life? Ask yourself ! In this episode, Chris and Ron are joined by Charlotte Smith - Lifestyle Design and Executive Coach. Charlotte shares insights and strategies on listening to yourself and assessing what works with YOU.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1593</itunes:duration>
                <itunes:episode>37</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/IMG_20200126_205923_834.jpg" medium="image">
                            <media:title type="html">Episode 37 - Lifestyle Design: Priming for Success with Charlotte Smith</media:title></media:content>    </item>
    <item>
        <title>Episode 36 - Life and Purpose Mapping Hacks with Craig Filek</title>
        <itunes:title>Episode 36 - Life and Purpose Mapping Hacks with Craig Filek</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-36-life-and-purpose-mapping-hacks-with-craig-filek/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-36-life-and-purpose-mapping-hacks-with-craig-filek/#comments</comments>        <pubDate>Thu, 30 Jan 2020 07:56:42 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c838842a-7ee6-58e5-b4a6-5b575c8b10cd</guid>
                                    <description><![CDATA[<p>Life and purpose hacks with Craig Filek - One of our favorite episodes to record with a friend of the podcast. Craig Filek gives outstanding perspective on mapping purpose with your life.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Life and purpose hacks with Craig Filek - One of our favorite episodes to record with a friend of the podcast. Craig Filek gives outstanding perspective on mapping purpose with your life.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/3iag5u/Episode_36_Craig_Filek_Audio.mp3" length="77321647" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Life and purpose hacks with Craig Filek - One of our favorite episodes to record with a friend of the podcast. Craig Filek gives outstanding perspective on mapping purpose with your life.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2373</itunes:duration>
                <itunes:episode>36</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/IMG_20200126_205923_834.jpg" medium="image">
                            <media:title type="html">Episode 36 - Life and Purpose Mapping Hacks with Craig Filek</media:title></media:content>    </item>
    <item>
        <title>Episode 35 - Not a Moment, But a Movement with Makinde Adeagbo</title>
        <itunes:title>Episode 35 - Not a Moment, But a Movement with Makinde Adeagbo</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-35-not-a-moment-but-a-movement-with-makinde-adeagbo/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-35-not-a-moment-but-a-movement-with-makinde-adeagbo/#comments</comments>        <pubDate>Wed, 29 Jan 2020 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/be84a556-2e31-5387-830a-db5019e13aee</guid>
                                    <description><![CDATA[<p>Inclusion and diversity are areas that we can all make an impact in. Makinde Adeagbo Founder @ /dev/color shares insightful wisdom for making an impact and bringing diversity to Technology</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Inclusion and diversity are areas that we can all make an impact in. Makinde Adeagbo Founder @ /dev/color shares insightful wisdom for making an impact and bringing diversity to Technology</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ukatqq/Episode_35_Makinde_Audio.mp3" length="49305501" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Inclusion and diversity are areas that we can all make an impact in. Makinde Adeagbo Founder @ /dev/color shares insightful wisdom for making an impact and bringing diversity to Technology]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1514</itunes:duration>
                <itunes:episode>35</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/IMG_20200126_205923_834.jpg" medium="image">
                            <media:title type="html">Episode 35 - Not a Moment, But a Movement with Makinde Adeagbo</media:title></media:content>    </item>
    <item>
        <title>Episode 34 - Cybersecurity: New to Good to Great with Susan Peediyakkal</title>
        <itunes:title>Episode 34 - Cybersecurity: New to Good to Great with Susan Peediyakkal</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-34-cybersecurity-new-to-good-to-great-with-susan-peediyakkal/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-34-cybersecurity-new-to-good-to-great-with-susan-peediyakkal/#comments</comments>        <pubDate>Wed, 29 Jan 2020 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/c254c214-a7ec-5ddb-8436-cfb7e3d0d9d1</guid>
                                    <description><![CDATA[<p>How do you go from good to great? The question is even more tough when you have limited experience in your focus area. In this episode, Susan Peediyakkal joins the podcast to share her background in Threat Intelligence and successful career pivots while strengthening her craft</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How do you go from good to great? The question is even more tough when you have limited experience in your focus area. In this episode, Susan Peediyakkal joins the podcast to share her background in Threat Intelligence and successful career pivots while strengthening her craft</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ejbz6t/Episode_34_Susan_Audio_Full.mp3" length="64106618" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How do you go from good to great? The question is even more tough when you have limited experience in your focus area. In this episode, Susan Peediyakkal joins the podcast to share her background in Threat Intelligence and successful career pivots while strengthening her craft]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1963</itunes:duration>
                <itunes:episode>34</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/IMG_20200126_205923_834.jpg" medium="image">
                            <media:title type="html">Episode 34 - Cybersecurity: New to Good to Great with Susan Peediyakkal</media:title></media:content>    </item>
    <item>
        <title>Episode 33 - Demystifying the Zero Trust Model with Kathy Wang</title>
        <itunes:title>Episode 33 - Demystifying the Zero Trust Model with Kathy Wang</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-33-demystifying-the-zero-trust-model-with-kathy-wang/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-33-demystifying-the-zero-trust-model-with-kathy-wang/#comments</comments>        <pubDate>Tue, 28 Jan 2020 05:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/31bcf651-8412-501d-b4d5-3901f7f90656</guid>
                                    <description><![CDATA[<p>What type of data is your organization processing and storing? How sensitive is your organization's data? In this Episode, Kathy Wang CISO @ FullStory shines light on Zero Trust and building successful security teams.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>What type of data is your organization processing and storing? How sensitive is your organization's data? In this Episode, Kathy Wang CISO @ FullStory shines light on Zero Trust and building successful security teams.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/q5fpau/Episode_33_Kathy_Wany_Audio.mp3" length="34465299" type="audio/mpeg"/>
        <itunes:summary><![CDATA[What type of data is your organization processing and storing? How sensitive is your organization's data? In this Episode, Kathy Wang CISO @ FullStory shines light on Zero Trust and building successful security teams.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1059</itunes:duration>
                <itunes:episode>33</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 33 - Demystifying the Zero Trust Model with Kathy Wang</media:title></media:content>    </item>
    <item>
        <title>Episode 32 - Cyber Transformations and Migrations with Talha Tariq</title>
        <itunes:title>Episode 32 - Cyber Transformations and Migrations with Talha Tariq</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-32-cyber-transformations-and-migrations-with-talha-tariq/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-32-cyber-transformations-and-migrations-with-talha-tariq/#comments</comments>        <pubDate>Tue, 28 Jan 2020 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/83cf5c43-0302-59ae-84ac-d825e72d34fc</guid>
                                    <description><![CDATA[<p>Technology enables companies to constantly stay in touch and enable their customers. As opportunity grows, organizations evolve and focus on technology and data-driven results. Talha Tariq CSO of HashiCorp joins Chris and Ron to talk rapidly deploying and securing organizations while enabling employees.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Technology enables companies to constantly stay in touch and enable their customers. As opportunity grows, organizations evolve and focus on technology and data-driven results. Talha Tariq CSO of HashiCorp joins Chris and Ron to talk rapidly deploying and securing organizations while enabling employees.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ses345/Episode_32_Talha_Tariq_Audio.mp3" length="62614274" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Technology enables companies to constantly stay in touch and enable their customers. As opportunity grows, organizations evolve and focus on technology and data-driven results. Talha Tariq CSO of HashiCorp joins Chris and Ron to talk rapidly deploying and securing organizations while enabling employees.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1899</itunes:duration>
                <itunes:episode>32</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 32 - Cyber Transformations and Migrations with Talha Tariq</media:title></media:content>    </item>
    <item>
        <title>Epsode 31 - The Future of Work and Your Purpose with Tim Salau</title>
        <itunes:title>Epsode 31 - The Future of Work and Your Purpose with Tim Salau</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/epsode-31-the-future-of-work-and-your-purpose-with-tim-salau/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/epsode-31-the-future-of-work-and-your-purpose-with-tim-salau/#comments</comments>        <pubDate>Mon, 27 Jan 2020 04:00:00 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/ddceb30f-ea1b-5ad2-b425-510d9a83799e</guid>
                                    <description><![CDATA[<p>The year 2020 marked the beginning of a new decade. Each year we experience evolving roles and responsibilities in the workplace. In this episode, Tim Salau (Mr. Future of Work) joins Chris and Ron to discuss the future of work and applying purpose. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>The year 2020 marked the beginning of a new decade. Each year we experience evolving roles and responsibilities in the workplace. In this episode, Tim Salau (Mr. Future of Work) joins Chris and Ron to discuss the future of work and applying purpose. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bmwa6z/Epsode_31_Tim_Salau_Audio.mp3" length="78644380" type="audio/mpeg"/>
        <itunes:summary><![CDATA[The year 2020 marked the beginning of a new decade. Each year we experience evolving roles and responsibilities in the workplace. In this episode, Tim Salau (Mr. Future of Work) joins Chris and Ron to discuss the future of work and applying purpose. ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2396</itunes:duration>
                <itunes:episode>31</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Epsode 31 - The Future of Work and Your Purpose with Tim Salau</media:title></media:content>    </item>
    <item>
        <title>Episode 30 - Threat Hunting with Data Science - Roberto Rodriguez</title>
        <itunes:title>Episode 30 - Threat Hunting with Data Science - Roberto Rodriguez</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-30-threat-hunting-with-data-science-roberto-rodriguez/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-30-threat-hunting-with-data-science-roberto-rodriguez/#comments</comments>        <pubDate>Wed, 15 Jan 2020 08:31:36 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/2cdc2375-1015-51e5-90be-7f66c4f6c2ef</guid>
                                    <description><![CDATA[<p>Being an expert Threat Hunter is great, but how do you scale as fast as the adversary? Roberto Rodriguez (cyb3rward0g) joins the podcast and shares experience for breaking into cybersecurity and creating a community around scaling cybersecurity solutions. </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Being an expert Threat Hunter is great, but how do you scale as fast as the adversary? Roberto Rodriguez (cyb3rward0g) joins the podcast and shares experience for breaking into cybersecurity and creating a community around scaling cybersecurity solutions. </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4q6sbm/Episode_30_Roberto_Audio.mp3" length="68142831" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Being an expert Threat Hunter is great, but how do you scale as fast as the adversary? Roberto Rodriguez (cyb3rward0g) joins the podcast and shares experience for breaking into cybersecurity and creating a community around scaling cybersecurity solutions. ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2088</itunes:duration>
                <itunes:episode>30</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 30 - Threat Hunting with Data Science - Roberto Rodriguez</media:title></media:content>    </item>
    <item>
        <title>Episode 29 - Road to The SANS CTI Summit with Rick Holland</title>
        <itunes:title>Episode 29 - Road to The SANS CTI Summit with Rick Holland</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-29-road-to-the-sans-cti-summit-with-rick-holland/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-29-road-to-the-sans-cti-summit-with-rick-holland/#comments</comments>        <pubDate>Tue, 14 Jan 2020 17:06:09 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/251cd71c-dec9-53e7-a202-b1dfbb653d52</guid>
                                    <description><![CDATA[<p>Cyber Threat Intelligence is a topic that evolves as the adversary changes Tactics Techniques and Procedures. In this episode, Rick Holland join Chris and Ron to discuss his journey through CTI and the upcoming CTI Summit</p>
<p> </p>
<p>We'd love to meet everyone at the SANS CTI Summit in Washington DC on January 20</p>
<p>Link: <a href='http://www.sans.org/u/XJ4'>http://www.sans.org/u/XJ4</a></p>
<p>Discount Code: CTIPOD20</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Cyber Threat Intelligence is a topic that evolves as the adversary changes Tactics Techniques and Procedures. In this episode, Rick Holland join Chris and Ron to discuss his journey through CTI and the upcoming CTI Summit</p>
<p> </p>
<p>We'd love to meet everyone at the SANS CTI Summit in Washington DC on January 20</p>
<p>Link: <a href='http://www.sans.org/u/XJ4'>http://www.sans.org/u/XJ4</a></p>
<p>Discount Code: CTIPOD20</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/edcf5f/Episode_29_Rick_Holland_Audio.mp3" length="35343794" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Cyber Threat Intelligence is a topic that evolves as the adversary changes Tactics Techniques and Procedures. In this episode, Rick Holland join Chris and Ron to discuss his journey through CTI and the upcoming CTI Summit
 
We'd love to meet everyone at the SANS CTI Summit in Washington DC on January 20
Link: http://www.sans.org/u/XJ4
Discount Code: CTIPOD20]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1085</itunes:duration>
                <itunes:episode>29</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 29 - Road to The SANS CTI Summit with Rick Holland</media:title></media:content>    </item>
    <item>
        <title>Episode 28 - Talking Tech: Speaking For SANS with Jennifer Santiago </title>
        <itunes:title>Episode 28 - Talking Tech: Speaking For SANS with Jennifer Santiago </itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-28-talking-tech-speaking-for-sans-with-jennifer-santiago/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-28-talking-tech-speaking-for-sans-with-jennifer-santiago/#comments</comments>        <pubDate>Tue, 07 Jan 2020 12:14:41 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/63b79f8c-4d48-5558-92f2-7eb93c39b854</guid>
                                    <description><![CDATA[<p>While progressing through a career in Cybersecurity (Or Technology), there will be opportunities to present research at conferences and events. In this episode, Ron and Chris chat with Jennifer Santiago - Director of Content Development and Speaker Management at SANS Institute. Jennifer shares insight on selecting conference topics and how to make an impact while giving a presentation at SANS.</p>
<p> </p>
<p>SANS CTI Summit is right around the corner and would love to meet. Sign up with the following link:http://www.sans.org/u/XJ4</p>
<p>Use the code "CTIPOD20" to get 20% off.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>While progressing through a career in Cybersecurity (Or Technology), there will be opportunities to present research at conferences and events. In this episode, Ron and Chris chat with Jennifer Santiago - Director of Content Development and Speaker Management at SANS Institute. Jennifer shares insight on selecting conference topics and how to make an impact while giving a presentation at SANS.</p>
<p> </p>
<p>SANS CTI Summit is right around the corner and would love to meet. Sign up with the following link:http://www.sans.org/u/XJ4</p>
<p>Use the code "CTIPOD20" to get 20% off.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/9hjnr5/Jen_Santiago_Audio.mp3" length="47216404" type="audio/mpeg"/>
        <itunes:summary><![CDATA[While progressing through a career in Cybersecurity (Or Technology), there will be opportunities to present research at conferences and events. In this episode, Ron and Chris chat with Jennifer Santiago - Director of Content Development and Speaker Management at SANS Institute. Jennifer shares insight on selecting conference topics and how to make an impact while giving a presentation at SANS.
 
SANS CTI Summit is right around the corner and would love to meet. Sign up with the following link:http://www.sans.org/u/XJ4
Use the code "CTIPOD20" to get 20% off.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1446</itunes:duration>
                <itunes:episode>28</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 28 - Talking Tech: Speaking For SANS with Jennifer Santiago </media:title></media:content>    </item>
    <item>
        <title>Episode 27 - Mark Metry Podcasting with Purpose</title>
        <itunes:title>Episode 27 - Mark Metry Podcasting with Purpose</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-27-mark-metry-podcasting-with-purpose/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-27-mark-metry-podcasting-with-purpose/#comments</comments>        <pubDate>Fri, 13 Dec 2019 13:57:38 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/episode-27-mark-metry-podcasting-with-purpose-21b732bf1593ffcd86559883902326c1</guid>
                                    <description><![CDATA[<p>Upgrading the human is critical to cybersecurity and life. In this episode, host of Humans 2.0 - Mark Metry joins Ron and Chris to discuss the evolution of technology and purpose.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Upgrading the human is critical to cybersecurity and life. In this episode, host of Humans 2.0 - Mark Metry joins Ron and Chris to discuss the evolution of technology and purpose.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/fvfjfe/Mark_Metry_Project_Audio.mp3" length="69824998" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Upgrading the human is critical to cybersecurity and life. In this episode, host of Humans 2.0 - Mark Metry joins Ron and Chris to discuss the evolution of technology and purpose.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2150</itunes:duration>
                <itunes:episode>27</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 27 - Mark Metry Podcasting with Purpose</media:title></media:content>    </item>
    <item>
        <title>Episode 26 - Exploring the Financial Playbook with Kimberly Hodgdon</title>
        <itunes:title>Episode 26 - Exploring the Financial Playbook with Kimberly Hodgdon</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-26-exploring-the-financial-playbook-with-kimberly-hodgdon/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-26-exploring-the-financial-playbook-with-kimberly-hodgdon/#comments</comments>        <pubDate>Wed, 11 Dec 2019 18:05:52 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/episode-26-exploring-the-financial-playbook-with-kimberly-hodgdon-c4067e10ec2eb4f141c1527f229248cf</guid>
                                    <description><![CDATA[<p>Information Security / Cybersecurity can be an extremely lucrative path. In this episode, Chris and Ron explore the financial playbook with Kimberly Hodgdon - Stock Plan Manager @ Netflix</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Information Security / Cybersecurity can be an extremely lucrative path. In this episode, Chris and Ron explore the financial playbook with Kimberly Hodgdon - Stock Plan Manager @ Netflix</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ik67zc/episode26_kim.mp3" length="51150821" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Information Security / Cybersecurity can be an extremely lucrative path. In this episode, Chris and Ron explore the financial playbook with Kimberly Hodgdon - Stock Plan Manager @ Netflix]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1598</itunes:duration>
                <itunes:episode>26</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 26 - Exploring the Financial Playbook with Kimberly Hodgdon</media:title></media:content>    </item>
    <item>
        <title>Episode 25 - Underrepresented</title>
        <itunes:title>Episode 25 - Underrepresented</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-25-underrepresented/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-25-underrepresented/#comments</comments>        <pubDate>Mon, 09 Dec 2019 18:56:41 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/episode-25-underrepresented-46cf3e057d28e91180b892df26842bfe</guid>
                                    <description><![CDATA[<p>In this webcast/podcast series simply called "Underrepresented"—a series recorded and produced in conjunction with our good friends, Sean Martin and Marco Ciappelli —we want to merge conversations and actions.</p>
<p>In this first episode, we get to speak with someone well outside of the InfoSec industry, Chris’ dad, Doug Cochran. Doug is joined by someone that does amazing things for the greater community and helping those less fortunate to get a voice and to be heard - co-founder of the ICMCP, Larry Whiteside Jr.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this webcast/podcast series simply called "Underrepresented"—a series recorded and produced in conjunction with our good friends, Sean Martin and Marco Ciappelli —we want to merge conversations and actions.</p>
<p>In this first episode, we get to speak with someone well outside of the InfoSec industry, Chris’ dad, Doug Cochran. Doug is joined by someone that does amazing things for the greater community and helping those less fortunate to get a voice and to be heard - co-founder of the ICMCP, Larry Whiteside Jr.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/8dbqqf/Episode25_UnderRepresented.mp3" length="112627479" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this webcast/podcast series simply called "Underrepresented"—a series recorded and produced in conjunction with our good friends, Sean Martin and Marco Ciappelli —we want to merge conversations and actions.
In this first episode, we get to speak with someone well outside of the InfoSec industry, Chris’ dad, Doug Cochran. Doug is joined by someone that does amazing things for the greater community and helping those less fortunate to get a voice and to be heard - co-founder of the ICMCP, Larry Whiteside Jr.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3519</itunes:duration>
                <itunes:episode>25</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 25 - Underrepresented</media:title></media:content>    </item>
    <item>
        <title>Episode 24 - Decoding LinkedIn with Brynne Tillman</title>
        <itunes:title>Episode 24 - Decoding LinkedIn with Brynne Tillman</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-24-decoding-linkedin-with-brynne-tillman/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-24-decoding-linkedin-with-brynne-tillman/#comments</comments>        <pubDate>Tue, 03 Dec 2019 14:21:06 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/episode-24-decoding-linkedin-with-brynne-tillman-b225a4b102f4e9930ad089aed6e344b9</guid>
                                    <description><![CDATA[<p>Your most reputable source of marketing is YOU! With Today's tools like LinkedIn this becomes a realistic task and something that every professional should take advantage of. During this episode, Brynne Tillman gives invaluable insight for enhancing presence on LinkedIn.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Your most reputable source of marketing is YOU! With Today's tools like LinkedIn this becomes a realistic task and something that every professional should take advantage of. During this episode, Brynne Tillman gives invaluable insight for enhancing presence on LinkedIn.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/73wk9a/episode24_audio.mp3" length="75020470" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Your most reputable source of marketing is YOU! With Today's tools like LinkedIn this becomes a realistic task and something that every professional should take advantage of. During this episode, Brynne Tillman gives invaluable insight for enhancing presence on LinkedIn.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2338</itunes:duration>
                <itunes:episode>24</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs.png" medium="image">
                            <media:title type="html">Episode 24 - Decoding LinkedIn with Brynne Tillman</media:title></media:content>    </item>
    <item>
        <title>Episode 23 - Operating in High Performance Environments with Markus De Shon</title>
        <itunes:title>Episode 23 - Operating in High Performance Environments with Markus De Shon</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-23-operating-in-high-performance-environments-with-markus-de-shon/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-23-operating-in-high-performance-environments-with-markus-de-shon/#comments</comments>        <pubDate>Tue, 19 Nov 2019 15:09:18 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/episode-23-operating-in-high-performance-environments-with-markus-de-shon-eedb33d93331c3410f1106b741df6d00</guid>
                                    <description><![CDATA[<p>Ever met someone with a Nuclear Physics and Cybersecurity background? If not, meet Markus De Shon - Detection Engineering Lead @ Netflix. In this episode, Markus shares experience moving from one industry to another and operating in high performance environments</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Ever met someone with a Nuclear Physics and Cybersecurity background? If not, meet Markus De Shon - Detection Engineering Lead @ Netflix. In this episode, Markus shares experience moving from one industry to another and operating in high performance environments</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/ttxwee/episode23.mp3" length="171951892" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Ever met someone with a Nuclear Physics and Cybersecurity background? If not, meet Markus De Shon - Detection Engineering Lead @ Netflix. In this episode, Markus shares experience moving from one industry to another and operating in high performance environments]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>5373</itunes:duration>
                <itunes:episode>23</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/c1andc3_1_revised.jpg" medium="image">
                            <media:title type="html">Episode 23 - Operating in High Performance Environments with Markus De Shon</media:title></media:content>    </item>
    <item>
        <title>Episode 22 - Road To The DevGuild Conference with Ody Lupescu</title>
        <itunes:title>Episode 22 - Road To The DevGuild Conference with Ody Lupescu</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/road-to-the-devguild-conference-with-ody-lupescu/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/road-to-the-devguild-conference-with-ody-lupescu/#comments</comments>        <pubDate>Tue, 12 Nov 2019 16:25:31 -0600</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/road-to-the-devguild-conference-with-ody-lupescu-2a89dadd9ed1b140648eea9dffde8fa1</guid>
                                    <description><![CDATA[<p>In this episode, Ody Lupescu joins Chris and Ron to discus building Security Programs and Onboarding Third Party Vendors</p>
<p>Looking for more content and interaction from industry experts? Join Hacker Valley Studio at the DevGuild Conference Nov 14 with promo code hackervalley15</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ody Lupescu joins Chris and Ron to discus building Security Programs and Onboarding Third Party Vendors</p>
<p>Looking for more content and interaction from industry experts? Join Hacker Valley Studio at the DevGuild Conference Nov 14 with promo code hackervalley15</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/2fqgwq/episode22_complete.mp3" length="73920402" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ody Lupescu joins Chris and Ron to discus building Security Programs and Onboarding Third Party Vendors
Looking for more content and interaction from industry experts? Join Hacker Valley Studio at the DevGuild Conference Nov 14 with promo code hackervalley15]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2309</itunes:duration>
                <itunes:episode>22</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/Chris-Cochran2-1.png" medium="image">
                            <media:title type="html">Episode 22 - Road To The DevGuild Conference with Ody Lupescu</media:title></media:content>    </item>
    <item>
        <title>Episode 21 - Changing the AppSec Game with Tanya Janca</title>
        <itunes:title>Episode 21 - Changing the AppSec Game with Tanya Janca</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-21-changing-the-appsec-game-with-tanya-janca/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-21-changing-the-appsec-game-with-tanya-janca/#comments</comments>        <pubDate>Tue, 22 Oct 2019 10:19:24 -0500</pubDate>
        <guid isPermaLink="false">HackerValleyStudio.podbean.com/episode-21-changing-the-appsec-game-with-tanya-janca-634d67a63ef1a4505f0b89b73d41a8fc</guid>
                                    <description><![CDATA[<p>Notice something new? What better to way unveil the new podcast name Hacker Valley Studio with an amazing guest - Tanya Janca. Tanya has made a huge impact to Application Security and to many other infosec domains. I'd highly recommend staying in touch with Tanya and following her work.</p>
<p> </p>
<p style="font-weight:400;">Tanya Janca:</p>
<p style="font-weight:400;"><a href='https://twitter.com/shehackspurple'>https://twitter.com/shehackspurple</a></p>
<p style="font-weight:400;"><a href='https://dev.to/shehackspurple'>https://dev.to/shehackspurple</a></p>
<p style="font-weight:400;"><a href='https://medium.com/@shehackspurple'>https://medium.com/@shehackspurple</a>   </p>
<p style="font-weight:400;"><a href='https://www.youtube.com/shehackspurple'>https://www.youtube.com/shehackspurple</a>   </p>
<p style="font-weight:400;"><a href='https://www.twitch.tv/shehackspurple'>https://www.twitch.tv/shehackspurple</a></p>
<p style="font-weight:400;"><a href='https://www.linkedin.com/in/tanya-janca'>https://www.linkedin.com/in/tanya-janca</a></p>
<p style="font-weight:400;"> </p>
<p style="font-weight:400;">Security Sidekick:</p>
<p style="font-weight:400;"><a href='https://securitysidekick.dev/'>https://securitysidekick.dev</a></p>
<p style="font-weight:400;"><a href='https://twitter.com/SecSidekick'>https://twitter.com/SecSidekick</a></p>
<p style="font-weight:400;"><a href='https://www.youtube.com/channel/UC3KyuI83jt0l14q8xyffC2A'>https://www.youtube.com/channel/UC3KyuI83jt0l14q8xyffC2A</a></p>
<p style="font-weight:400;"> </p>
<p style="font-weight:400;">WoSEC (Women of Security)</p>
<p style="font-weight:400;"><a href='https://twitter.com/WoSECtweets'>https://twitter.com/WoSECtweets</a></p>
<p style="font-weight:400;"> #SecurityWin</p>
<p style="font-weight:400;"> <a href='https://twitter.com/shehackspurple/status/1183483366592503808'>https://twitter.com/shehackspurple/status/1183483366592503808</a></p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Notice something new? What better to way unveil the new podcast name Hacker Valley Studio with an amazing guest - Tanya Janca. Tanya has made a huge impact to Application Security and to many other infosec domains. I'd highly recommend staying in touch with Tanya and following her work.</p>
<p> </p>
<p style="font-weight:400;">Tanya Janca:</p>
<p style="font-weight:400;"><a href='https://twitter.com/shehackspurple'>https://twitter.com/shehackspurple</a></p>
<p style="font-weight:400;"><a href='https://dev.to/shehackspurple'>https://dev.to/shehackspurple</a></p>
<p style="font-weight:400;"><a href='https://medium.com/@shehackspurple'>https://medium.com/@shehackspurple</a>   </p>
<p style="font-weight:400;"><a href='https://www.youtube.com/shehackspurple'>https://www.youtube.com/shehackspurple</a>   </p>
<p style="font-weight:400;"><a href='https://www.twitch.tv/shehackspurple'>https://www.twitch.tv/shehackspurple</a></p>
<p style="font-weight:400;"><a href='https://www.linkedin.com/in/tanya-janca'>https://www.linkedin.com/in/tanya-janca</a></p>
<p style="font-weight:400;"> </p>
<p style="font-weight:400;">Security Sidekick:</p>
<p style="font-weight:400;"><a href='https://securitysidekick.dev/'>https://securitysidekick.dev</a></p>
<p style="font-weight:400;"><a href='https://twitter.com/SecSidekick'>https://twitter.com/SecSidekick</a></p>
<p style="font-weight:400;"><a href='https://www.youtube.com/channel/UC3KyuI83jt0l14q8xyffC2A'>https://www.youtube.com/channel/UC3KyuI83jt0l14q8xyffC2A</a></p>
<p style="font-weight:400;"> </p>
<p style="font-weight:400;">WoSEC (Women of Security)</p>
<p style="font-weight:400;"><a href='https://twitter.com/WoSECtweets'>https://twitter.com/WoSECtweets</a></p>
<p style="font-weight:400;"> #SecurityWin</p>
<p style="font-weight:400;"> <a href='https://twitter.com/shehackspurple/status/1183483366592503808'>https://twitter.com/shehackspurple/status/1183483366592503808</a></p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/me874y/tanya_episode.mp3" length="98936095" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Notice something new? What better to way unveil the new podcast name Hacker Valley Studio with an amazing guest - Tanya Janca. Tanya has made a huge impact to Application Security and to many other infosec domains. I'd highly recommend staying in touch with Tanya and following her work.
 
Tanya Janca:
https://twitter.com/shehackspurple
https://dev.to/shehackspurple
https://medium.com/@shehackspurple   
https://www.youtube.com/shehackspurple   
https://www.twitch.tv/shehackspurple
https://www.linkedin.com/in/tanya-janca
 
Security Sidekick:
https://securitysidekick.dev
https://twitter.com/SecSidekick
https://www.youtube.com/channel/UC3KyuI83jt0l14q8xyffC2A
 
WoSEC (Women of Security)
https://twitter.com/WoSECtweets
 #SecurityWin
 https://twitter.com/shehackspurple/status/1183483366592503808]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>3091</itunes:duration>
                <itunes:episode>21</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/c1.jpg" medium="image">
                            <media:title type="html">Episode 21 - Changing the AppSec Game with Tanya Janca</media:title></media:content>    </item>
    <item>
        <title>Episode 20 - Embracing the grind with Will Rankin</title>
        <itunes:title>Episode 20 - Embracing the grind with Will Rankin</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-20-embracing-the-grind-with-will-rankin/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-20-embracing-the-grind-with-will-rankin/#comments</comments>        <pubDate>Thu, 03 Oct 2019 14:11:41 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-20-embracing-the-grind-with-will-rankin-da277a672a16f67c7b6b377449f8d9e1</guid>
                                    <description><![CDATA[<p>Episode 20 Is Here 🚨In this special episode Chris and Ron are joined by Security Imagineer Will Rankin. The group discusses personal strategies for embracing the grind and move towards the next level. SecDevOps.AI Would like to give a special thanks to Will for his appearance on this episode and all of his support promoting the platform.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Episode 20 Is Here 🚨In this special episode Chris and Ron are joined by Security Imagineer Will Rankin. The group discusses personal strategies for embracing the grind and move towards the next level. SecDevOps.AI Would like to give a special thanks to Will for his appearance on this episode and all of his support promoting the platform.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/j6r3ch/episode20.mp3" length="55710756" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Episode 20 Is Here 🚨In this special episode Chris and Ron are joined by Security Imagineer Will Rankin. The group discusses personal strategies for embracing the grind and move towards the next level. SecDevOps.AI Would like to give a special thanks to Will for his appearance on this episode and all of his support promoting the platform.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1740</itunes:duration>
                <itunes:episode>20</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 20 - Embracing the grind with Will Rankin</media:title></media:content>    </item>
    <item>
        <title>Episode 19 - Dressed for Success in Cyber with Ashley Tolbert</title>
        <itunes:title>Episode 19 - Dressed for Success in Cyber with Ashley Tolbert</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-19-dressed-for-success-in-cyber-with-ashley-tolbert/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-19-dressed-for-success-in-cyber-with-ashley-tolbert/#comments</comments>        <pubDate>Tue, 24 Sep 2019 11:29:53 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-19-dressed-for-success-in-cyber-with-ashley-tolbert-2a2115642590bc445a672d5eea4e6879</guid>
                                    <description><![CDATA[<p>In this episode Ashley Tolbert joins Chris and Ron to discuss fashion in Cybersecurity. Fashion tribes, Attire, and Style Preferences are all points to consider when making an impression.</p>
<p> </p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode Ashley Tolbert joins Chris and Ron to discuss fashion in Cybersecurity. Fashion tribes, Attire, and Style Preferences are all points to consider when making an impression.</p>
<p> </p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/bxb5c5/episode19.mp3" length="47507889" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode Ashley Tolbert joins Chris and Ron to discuss fashion in Cybersecurity. Fashion tribes, Attire, and Style Preferences are all points to consider when making an impression.
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1484</itunes:duration>
                <itunes:episode>19</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 19 - Dressed for Success in Cyber with Ashley Tolbert</media:title></media:content>    </item>
    <item>
        <title>Episode18 - Math for Security and Red Teaming with KMAP</title>
        <itunes:title>Episode18 - Math for Security and Red Teaming with KMAP</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode18-math-for-security-and-red-teaming-with-kmap/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode18-math-for-security-and-red-teaming-with-kmap/#comments</comments>        <pubDate>Thu, 05 Sep 2019 06:00:00 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode18-math-for-security-and-red-teaming-with-kmap-b072562deb88485677e1357bbdc71322</guid>
                                    <description><![CDATA[<p>From Security Architect to Principal Red Team Engineer, KMAP joins Chris and Ron to discuss his diverse background and how he plans to use Discrete Math and BloodHound to advanced the capabilities of red teams.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>From Security Architect to Principal Red Team Engineer, KMAP joins Chris and Ron to discuss his diverse background and how he plans to use Discrete Math and BloodHound to advanced the capabilities of red teams.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/udhxw3/episode18.mp3" length="49295083" type="audio/mpeg"/>
        <itunes:summary><![CDATA[From Security Architect to Principal Red Team Engineer, KMAP joins Chris and Ron to discuss his diverse background and how he plans to use Discrete Math and BloodHound to advanced the capabilities of red teams.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1540</itunes:duration>
                <itunes:episode>18</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode18 - Math for Security and Red Teaming with KMAP</media:title></media:content>    </item>
    <item>
        <title>Episode 17 - Undercover in the Criminal Underground with Charity Wright</title>
        <itunes:title>Episode 17 - Undercover in the Criminal Underground with Charity Wright</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-17-undercover-in-the-criminal-underground-with-charity-wright/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-17-undercover-in-the-criminal-underground-with-charity-wright/#comments</comments>        <pubDate>Wed, 28 Aug 2019 16:26:55 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-17-undercover-in-the-criminal-underground-with-charity-wright-6ae8aaf54b996b83c60cf434a53b71f8</guid>
                                    <description><![CDATA[<p>New Episode Alert 🚨In this episode, Chris and Ron are joined by Charity Wright - An exceptional Threat Intelligence Analyst focusing on criminal activity on the deep and dark web. Charity also shares insight on how she began her career in intelligence and infosec.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>New Episode Alert 🚨In this episode, Chris and Ron are joined by Charity Wright - An exceptional Threat Intelligence Analyst focusing on criminal activity on the deep and dark web. Charity also shares insight on how she began her career in intelligence and infosec.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/idbh3c/episode17.mp3" length="36630084" type="audio/mpeg"/>
        <itunes:summary><![CDATA[New Episode Alert 🚨In this episode, Chris and Ron are joined by Charity Wright - An exceptional Threat Intelligence Analyst focusing on criminal activity on the deep and dark web. Charity also shares insight on how she began her career in intelligence and infosec.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1144</itunes:duration>
                <itunes:episode>17</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 17 - Undercover in the Criminal Underground with Charity Wright</media:title></media:content>    </item>
    <item>
        <title>Episode16 - Reading, Seeding, and Leading with Jonathan Wood</title>
        <itunes:title>Episode16 - Reading, Seeding, and Leading with Jonathan Wood</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode16-reading-seeding-and-leading-with-jonathan-wood/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode16-reading-seeding-and-leading-with-jonathan-wood/#comments</comments>        <pubDate>Fri, 23 Aug 2019 19:29:38 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode16-reading-seeding-and-leading-with-jonathan-wood-5d83bea1dda42e95aeb3c4bbe46c2d1d</guid>
                                    <description><![CDATA[<p>In this powerful episode, Jonathan Wood joins Chris and Ron and shares insight on growth - personal, professional, and sales. Jonathan has a diverse background in cybersecurity startups and is currently leading his 4th startup, TruStar Technologies, to success.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this powerful episode, Jonathan Wood joins Chris and Ron and shares insight on growth - personal, professional, and sales. Jonathan has a diverse background in cybersecurity startups and is currently leading his 4th startup, TruStar Technologies, to success.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/iz73aw/episode16.mp3" length="94390371" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this powerful episode, Jonathan Wood joins Chris and Ron and shares insight on growth - personal, professional, and sales. Jonathan has a diverse background in cybersecurity startups and is currently leading his 4th startup, TruStar Technologies, to success.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2949</itunes:duration>
                <itunes:episode>16</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode16 - Reading, Seeding, and Leading with Jonathan Wood</media:title></media:content>    </item>
    <item>
        <title>Episode 15 - Thrill of the Hunt: Finding your Path</title>
        <itunes:title>Episode 15 - Thrill of the Hunt: Finding your Path</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-15-thrill-of-the-hunt-finding-your-path/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-15-thrill-of-the-hunt-finding-your-path/#comments</comments>        <pubDate>Wed, 21 Aug 2019 16:33:33 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-15-thrill-of-the-hunt-finding-your-path-69cd4d354b3319f7789a97392a2b8f21</guid>
                                    <description><![CDATA[<p>In this episode, Chris and Ron learn about the impressive background of Kris Harms. Kris has a decorated career and extensive experience in Intrusion Detection, Incident Response, and Threat Hunting. He's been an early member at both Mandiant and Cylance which resulted in successful acquisitions.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Chris and Ron learn about the impressive background of Kris Harms. Kris has a decorated career and extensive experience in Intrusion Detection, Incident Response, and Threat Hunting. He's been an early member at both Mandiant and Cylance which resulted in successful acquisitions.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/f28pst/episode15.mp3" length="58686626" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Chris and Ron learn about the impressive background of Kris Harms. Kris has a decorated career and extensive experience in Intrusion Detection, Incident Response, and Threat Hunting. He's been an early member at both Mandiant and Cylance which resulted in successful acquisitions.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1833</itunes:duration>
                <itunes:episode>15</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 15 - Thrill of the Hunt: Finding your Path</media:title></media:content>    </item>
    <item>
        <title>Episode 14 - Quality Time with ITSP: A Podcaster's Podcast</title>
        <itunes:title>Episode 14 - Quality Time with ITSP: A Podcaster's Podcast</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-14-quality-time-with-itsp-a-podcasters-podcast/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-14-quality-time-with-itsp-a-podcasters-podcast/#comments</comments>        <pubDate>Tue, 20 Aug 2019 02:37:14 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-14-quality-time-with-itsp-a-podcasters-podcast-293e458d75656190aaa2a8844b496472</guid>
                                    <description><![CDATA[<p>In this episode, Ron and Chris are joined by Sean Martin and Marco Ciappelli from ITSPMagazine.com. Both set of podcasters have ambitious goals to start unique conversations and bring more diversity to Cybersecurity. Tune in and hear about the vision of both SecDevOps.AI and ITSP Magazine.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Ron and Chris are joined by Sean Martin and Marco Ciappelli from ITSPMagazine.com. Both set of podcasters have ambitious goals to start unique conversations and bring more diversity to Cybersecurity. Tune in and hear about the vision of both SecDevOps.AI and ITSP Magazine.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/rj743h/episode14.mp3" length="56993891" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Ron and Chris are joined by Sean Martin and Marco Ciappelli from ITSPMagazine.com. Both set of podcasters have ambitious goals to start unique conversations and bring more diversity to Cybersecurity. Tune in and hear about the vision of both SecDevOps.AI and ITSP Magazine.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1781</itunes:duration>
                <itunes:episode>14</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 14 - Quality Time with ITSP: A Podcaster&#039;s Podcast</media:title></media:content>    </item>
    <item>
        <title>Episode 13 - A Journey Through Venture Capitalism: Mentoring and Leading in Silicon Valley</title>
        <itunes:title>Episode 13 - A Journey Through Venture Capitalism: Mentoring and Leading in Silicon Valley</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-13-a-journey-through-venture-capitalism-mentoring-and-leading-in-silicon-valley/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-13-a-journey-through-venture-capitalism-mentoring-and-leading-in-silicon-valley/#comments</comments>        <pubDate>Tue, 13 Aug 2019 22:03:00 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-13-a-journey-through-venture-capitalism-mentoring-and-leading-in-silicon-valley-da97dfce65e3c4ff04a61f9f6c97cbf2</guid>
                                    <description><![CDATA[<p>Mentors and Leaders help shape our profession and our future. In this episode, Didi Dayton from Wing Venture Capital joins the podcast to discuss the importance of mentoring and leadership. Didi has scaled and shaped successful channel programs - She's now shaping and scaling to a greater magnitude in her new role as Partner at Wing VC.</p>
<p>Didi Dayton
https://www.linkedin.com/in/didi-dayton-8204501/</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Mentors and Leaders help shape our profession and our future. In this episode, Didi Dayton from Wing Venture Capital joins the podcast to discuss the importance of mentoring and leadership. Didi has scaled and shaped successful channel programs - She's now shaping and scaling to a greater magnitude in her new role as Partner at Wing VC.</p>
<p>Didi Dayton<br>
https://www.linkedin.com/in/didi-dayton-8204501/</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/m246py/episode13.mp3" length="53041669" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Mentors and Leaders help shape our profession and our future. In this episode, Didi Dayton from Wing Venture Capital joins the podcast to discuss the importance of mentoring and leadership. Didi has scaled and shaped successful channel programs - She's now shaping and scaling to a greater magnitude in her new role as Partner at Wing VC.
Didi Daytonhttps://www.linkedin.com/in/didi-dayton-8204501/]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1657</itunes:duration>
                <itunes:episode>13</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 13 - A Journey Through Venture Capitalism: Mentoring and Leading in Silicon Valley</media:title></media:content>    </item>
    <item>
        <title>Episode 12 - Physical Red Teaming: No Lock Left Secured</title>
        <itunes:title>Episode 12 - Physical Red Teaming: No Lock Left Secured</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-12-physical-red-teaming-no-lock-left-secured/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-12-physical-red-teaming-no-lock-left-secured/#comments</comments>        <pubDate>Tue, 13 Aug 2019 03:28:36 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-12-physical-red-teaming-no-lock-left-secured-2193fdb5fc586f080ca2c7faae1b11ef</guid>
                                    <description><![CDATA[<p>Robert Pingor is the equalizer to Physical and Network Red Teaming. Chris has had the opportunity to moonlight his career with Robert and witness him obtain mastery at his craft. During this interview, Chris, Ron, and Robert share red team stories and resources for Red Team Alliance.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Robert Pingor is the equalizer to Physical and Network Red Teaming. Chris has had the opportunity to moonlight his career with Robert and witness him obtain mastery at his craft. During this interview, Chris, Ron, and Robert share red team stories and resources for Red Team Alliance.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/sr8icu/episode12.mp3" length="29905956" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Robert Pingor is the equalizer to Physical and Network Red Teaming. Chris has had the opportunity to moonlight his career with Robert and witness him obtain mastery at his craft. During this interview, Chris, Ron, and Robert share red team stories and resources for Red Team Alliance.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>934</itunes:duration>
                <itunes:episode>12</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 12 - Physical Red Teaming: No Lock Left Secured</media:title></media:content>    </item>
    <item>
        <title>Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World</title>
        <itunes:title>Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-11-selling-cybersecurity-doing-business-in-an-increasingly-connected-world/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-11-selling-cybersecurity-doing-business-in-an-increasingly-connected-world/#comments</comments>        <pubDate>Tue, 23 Jul 2019 17:41:04 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-11-selling-cybersecurity-doing-business-in-an-increasingly-connected-world-26547eebe0f25c64d8fd81aecd144cb8</guid>
                                    <description><![CDATA[<p>Information Security vendors offer a wide variety of products and services that can enable success for organizations. Derek Eid joins us this episode to share wisdom in selling products and services. Derek is an expert communicator and leverages technical and non-technical conversations to capture necessities for existing and potential customers. Derek's most effective tool in his repertoire is his ability to listen. Tune in and learn how he uses this powerful tool to help enable his success.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Information Security vendors offer a wide variety of products and services that can enable success for organizations. Derek Eid joins us this episode to share wisdom in selling products and services. Derek is an expert communicator and leverages technical and non-technical conversations to capture necessities for existing and potential customers. Derek's most effective tool in his repertoire is his ability to listen. Tune in and learn how he uses this powerful tool to help enable his success.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/r2pfa3/episode11.mp3" length="72612190" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Information Security vendors offer a wide variety of products and services that can enable success for organizations. Derek Eid joins us this episode to share wisdom in selling products and services. Derek is an expert communicator and leverages technical and non-technical conversations to capture necessities for existing and potential customers. Derek's most effective tool in his repertoire is his ability to listen. Tune in and learn how he uses this powerful tool to help enable his success.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2269</itunes:duration>
                <itunes:episode>11</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World</media:title></media:content>    </item>
    <item>
        <title>Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings</title>
        <itunes:title>Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-10-breaking-barriers-gatekeepers-and-glass-ceilings/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-10-breaking-barriers-gatekeepers-and-glass-ceilings/#comments</comments>        <pubDate>Tue, 16 Jul 2019 12:03:42 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-10-breaking-barriers-gatekeepers-and-glass-ceilings-1c595b3defb4ce2f9b172c041299637b</guid>
                                    <description><![CDATA[<p>Neelima Rustagi joins Chris and Ron in this episode to share her experiences creating valuable work to dissolve barriers, gatekeepers, and glass ceilings. While transitioning from Software Engineer to Cybersecurity Product Manager, Neelima provided value to her stakeholders, mentors and advocates to position herself as a key resource in the industry. Neelima celebrates a decorated background in startups and Fortune cybersecurity companies.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Neelima Rustagi joins Chris and Ron in this episode to share her experiences creating valuable work to dissolve barriers, gatekeepers, and glass ceilings. While transitioning from Software Engineer to Cybersecurity Product Manager, Neelima provided value to her stakeholders, mentors and advocates to position herself as a key resource in the industry. Neelima celebrates a decorated background in startups and Fortune cybersecurity companies.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mumrhw/episode10.mp3" length="76067040" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Neelima Rustagi joins Chris and Ron in this episode to share her experiences creating valuable work to dissolve barriers, gatekeepers, and glass ceilings. While transitioning from Software Engineer to Cybersecurity Product Manager, Neelima provided value to her stakeholders, mentors and advocates to position herself as a key resource in the industry. Neelima celebrates a decorated background in startups and Fortune cybersecurity companies.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2377</itunes:duration>
                <itunes:episode>10</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings</media:title></media:content>    </item>
    <item>
        <title>Episode 9 - The Intelligence Easy Button</title>
        <itunes:title>Episode 9 - The Intelligence Easy Button</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-9-the-intelligence-easy-button/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-9-the-intelligence-easy-button/#comments</comments>        <pubDate>Sun, 07 Jul 2019 13:41:29 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-9-the-intelligence-easy-button-25f58936a26e5e98d4d4c4822942dc4c</guid>
                                    <description><![CDATA[
In this Episode, Ron and Napoleon put Chris in the hot seat and reviewed his EASY framework for making an impact in threat intelligence.
 
- Elicit Requirements
- Assess Collection
- Plan Strive for Impact
- Yield to Feedback
 
All four pillars are vital for ensuring success during each phase of providing threat intelligence as a service

 
 ]]></description>
                                                            <content:encoded><![CDATA[
In this Episode, Ron and Napoleon put Chris in the hot seat and reviewed his EASY framework for making an impact in threat intelligence.
 
- Elicit Requirements
- Assess Collection
- Plan Strive for Impact
- Yield to Feedback
 
All four pillars are vital for ensuring success during each phase of providing threat intelligence as a service

 
 ]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/6bgcry/Episode9.mp3" length="19186977" type="audio/mpeg"/>
        <itunes:summary><![CDATA[
In this Episode, Ron and Napoleon put Chris in the hot seat and reviewed his EASY framework for making an impact in threat intelligence.
 
- Elicit Requirements
- Assess Collection
- Plan Strive for Impact
- Yield to Feedback
 
All four pillars are vital for ensuring success during each phase of providing threat intelligence as a service

 
 ]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1199</itunes:duration>
                <itunes:episode>9</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 9 - The Intelligence Easy Button</media:title></media:content>    </item>
    <item>
        <title>Episode 8 - Serverless Threat Intel Bot</title>
        <itunes:title>Episode 8 - Serverless Threat Intel Bot</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-8-serverless-threat-intel-bot/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-8-serverless-threat-intel-bot/#comments</comments>        <pubDate>Sun, 07 Jul 2019 13:39:44 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-8-serverless-threat-intel-bot-40d0f31e1376bc5a96b96f77798257a0</guid>
                                    <description><![CDATA[<p>New Member Alert 🚨! Napoleon Bing joins forces with Chris and Ron and present a Serverless Threat Intel Bot. As organizations mature and scale their security infrastructure, it's vital that analysts, engineers, and other team members are able to query and enrich data on demand. Additionally, application features are being introduced at an increasing rate, creating the need for software defined infrastructure. In this project, we'll be exploring scaling automation efforts - with a focus on Threat Intelligence. This project can serve as a guide for when to leverage an interactive bot, creating API endpoints, serverless architecture, and applying actionable threat intelligence.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>New Member Alert 🚨! Napoleon Bing joins forces with Chris and Ron and present a Serverless Threat Intel Bot. As organizations mature and scale their security infrastructure, it's vital that analysts, engineers, and other team members are able to query and enrich data on demand. Additionally, application features are being introduced at an increasing rate, creating the need for software defined infrastructure. In this project, we'll be exploring scaling automation efforts - with a focus on Threat Intelligence. This project can serve as a guide for when to leverage an interactive bot, creating API endpoints, serverless architecture, and applying actionable threat intelligence.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/qea75z/Episode8.mp3" length="12833997" type="audio/mpeg"/>
        <itunes:summary><![CDATA[New Member Alert 🚨! Napoleon Bing joins forces with Chris and Ron and present a Serverless Threat Intel Bot. As organizations mature and scale their security infrastructure, it's vital that analysts, engineers, and other team members are able to query and enrich data on demand. Additionally, application features are being introduced at an increasing rate, creating the need for software defined infrastructure. In this project, we'll be exploring scaling automation efforts - with a focus on Threat Intelligence. This project can serve as a guide for when to leverage an interactive bot, creating API endpoints, serverless architecture, and applying actionable threat intelligence.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>802</itunes:duration>
                <itunes:episode>8</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 8 - Serverless Threat Intel Bot</media:title></media:content>    </item>
    <item>
        <title>Episode 7 - Layer 8 - Vulnerability And Diversity</title>
        <itunes:title>Episode 7 - Layer 8 - Vulnerability And Diversity</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-7-layer-8-vulnerability-and-diversity/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-7-layer-8-vulnerability-and-diversity/#comments</comments>        <pubDate>Sun, 07 Jul 2019 13:38:45 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-7-layer-8-vulnerability-and-diversity-0d0c218f12c04348e9e84c61c1a26c11</guid>
                                    <description><![CDATA[<p>How important is being vulnerable in life and in your career? In Episode 7, our guest of honor - Charles Nwatu (<a href='https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fcnwatu%2F&redir_token=bHiFNVzuz2BjcAYVMsN4qFWY45x8MTU2MjU5OTU2N0AxNTYyNTEzMTY3&event=video_description&v=5Cskf19EbGE'>https://www.linkedin.com/in/cnwatu/</a>) joins Ron and Chris in starting the conversation about vulnerability and diversity. Charles Nwatu celebrates a decorated infosec career - and has built security teams at companies such as Twilio, Stitch Fix, and Netflix.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>How important is being vulnerable in life and in your career? In Episode 7, our guest of honor - Charles Nwatu (<a href='https://www.youtube.com/redirect?q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fcnwatu%2F&redir_token=bHiFNVzuz2BjcAYVMsN4qFWY45x8MTU2MjU5OTU2N0AxNTYyNTEzMTY3&event=video_description&v=5Cskf19EbGE'>https://www.linkedin.com/in/cnwatu/</a>) joins Ron and Chris in starting the conversation about vulnerability and diversity. Charles Nwatu celebrates a decorated infosec career - and has built security teams at companies such as Twilio, Stitch Fix, and Netflix.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/mx5rhw/Episode7.mp3" length="42248711" type="audio/mpeg"/>
        <itunes:summary><![CDATA[How important is being vulnerable in life and in your career? In Episode 7, our guest of honor - Charles Nwatu (https://www.linkedin.com/in/cnwatu/) joins Ron and Chris in starting the conversation about vulnerability and diversity. Charles Nwatu celebrates a decorated infosec career - and has built security teams at companies such as Twilio, Stitch Fix, and Netflix.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2640</itunes:duration>
                <itunes:episode>7</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 7 - Layer 8 - Vulnerability And Diversity</media:title></media:content>    </item>
    <item>
        <title>Episode 6 - MITRE ATT&amp;CK™ Matrix Overview</title>
        <itunes:title>Episode 6 - MITRE ATT&amp;CK™ Matrix Overview</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-6-mitre-attck%e2%84%a2-matrix-overview/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-6-mitre-attck%e2%84%a2-matrix-overview/#comments</comments>        <pubDate>Sun, 07 Jul 2019 13:37:23 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-6-mitre-attck%e2%84%a2-matrix-overview-4d3a1704a35d8950bd7ed439c219510f</guid>
                                    <description><![CDATA[<p>In this episode, Chris Cochran and Ronald Eddings review the MITRE ATTACK Matrix and discuss related threat actors, TTPs, Threat Intelligence, and vendor evaluations.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Chris Cochran and Ronald Eddings review the MITRE ATTACK Matrix and discuss related threat actors, TTPs, Threat Intelligence, and vendor evaluations.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/gwh348/Episode6.mp3" length="21074481" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Chris Cochran and Ronald Eddings review the MITRE ATTACK Matrix and discuss related threat actors, TTPs, Threat Intelligence, and vendor evaluations.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1317</itunes:duration>
                <itunes:episode>6</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 6 - MITRE ATT&amp;CK™ Matrix Overview</media:title></media:content>    </item>
    <item>
        <title>Episode 5 - What legacy do you want to leave</title>
        <itunes:title>Episode 5 - What legacy do you want to leave</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-5-what-legacy-do-you-want-to-leave/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-5-what-legacy-do-you-want-to-leave/#comments</comments>        <pubDate>Sun, 07 Jul 2019 13:35:07 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-5-what-legacy-do-you-want-to-leave-9980cd622201c199bf0760a70477dd70</guid>
                                    <description><![CDATA[<p>In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/wag2xj/Episode5.mp3" length="17146918" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1071</itunes:duration>
                <itunes:episode>5</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 5 - What legacy do you want to leave</media:title></media:content>    </item>
    <item>
        <title>Episode 4 - Layer 8 Fitness, Diet, Focus</title>
        <itunes:title>Episode 4 - Layer 8 Fitness, Diet, Focus</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-4-layer-8-fitness-diet-focus/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-4-layer-8-fitness-diet-focus/#comments</comments>        <pubDate>Sat, 22 Jun 2019 14:46:16 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-4-layer-8-fitness-diet-focus-76e7361361e9e78710c5f359ea5c1b1e</guid>
                                    <description><![CDATA[<p>In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off the court of cybersecurity.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off the court of cybersecurity.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/37edfz/Episode4.mp3" length="41207992" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off the court of cybersecurity.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>2575</itunes:duration>
                <itunes:episode>4</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 4 - Layer 8 Fitness, Diet, Focus</media:title></media:content>    </item>
    <item>
        <title>Episode 3 - All Things Threat Intelligence</title>
        <itunes:title>Episode 3 - All Things Threat Intelligence</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-3-all-things-threat-intelligence/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-3-all-things-threat-intelligence/#comments</comments>        <pubDate>Sat, 22 Jun 2019 14:35:32 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-3-all-things-threat-intelligence-cc93d2ee557473f39762a52057076ca3</guid>
                                    <description><![CDATA[<p>In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you want us to tackle next!</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you want us to tackle next!</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/exzbzc/Episode3.mp3" length="26053210" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you want us to tackle next!]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1628</itunes:duration>
                <itunes:episode>3</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 3 - All Things Threat Intelligence</media:title></media:content>    </item>
    <item>
        <title>Episode 2 - Layer 8 Level Up Career, Life, and Self</title>
        <itunes:title>Episode 2 - Layer 8 Level Up Career, Life, and Self</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-2-layer-8-level-up-career-life-and-self/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-2-layer-8-level-up-career-life-and-self/#comments</comments>        <pubDate>Sat, 22 Jun 2019 13:59:05 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-2-layer-8-level-up-career-life-and-self-30076059c81a0855c37a0a42f378dee7</guid>
                                    <description><![CDATA[<p>In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris share tips on patching and updating Layer 8 for continued success.</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris share tips on patching and updating Layer 8 for continued success.</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/4rney8/Episode2.mp3" length="16321031" type="audio/mpeg"/>
        <itunes:summary><![CDATA[In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris share tips on patching and updating Layer 8 for continued success.]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>1019</itunes:duration>
                <itunes:episode>2</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 2 - Layer 8 Level Up Career, Life, and Self</media:title></media:content>    </item>
    <item>
        <title>Episode 1 - Cybersecurity Alchemy</title>
        <itunes:title>Episode 1 - Cybersecurity Alchemy</itunes:title>
        <link>https://HackerValleyStudio.podbean.com/e/episode-1-cybersecurity-alchemy/</link>
                    <comments>https://HackerValleyStudio.podbean.com/e/episode-1-cybersecurity-alchemy/#comments</comments>        <pubDate>Wed, 19 Jun 2019 09:51:23 -0500</pubDate>
        <guid isPermaLink="false">secdevopsai.podbean.com/episode-1-cybersecurity-alchemy-565cffb3e729024c6b3fd6d352c82704</guid>
                                    <description><![CDATA[<p>Alchemy - "A seemingly magical process of transformation, creation, or combination"</p>
<p>In this video, Chris Cochran and Ronald Eddings discuss how alchemy can be applied to Cybersecurity data to create, transform, and combine security incident data to actionable events. As security practitioners, we aim to purify, mature, and nearly perfect security workflows.</p>
<p>Link to blog: https://secdevops.ai

</p>
]]></description>
                                                            <content:encoded><![CDATA[<p>Alchemy - "A seemingly magical process of transformation, creation, or combination"</p>
<p>In this video, Chris Cochran and Ronald Eddings discuss how alchemy can be applied to Cybersecurity data to create, transform, and combine security incident data to actionable events. As security practitioners, we aim to purify, mature, and nearly perfect security workflows.</p>
<p>Link to blog: https://secdevops.ai<br>
<br>
</p>
]]></content:encoded>
                                    
        <enclosure url="https://mcdn.podbean.com/mf/web/5qdy3b/Episode1.mp3" length="15176241" type="audio/mpeg"/>
        <itunes:summary><![CDATA[Alchemy - "A seemingly magical process of transformation, creation, or combination"
In this video, Chris Cochran and Ronald Eddings discuss how alchemy can be applied to Cybersecurity data to create, transform, and combine security incident data to actionable events. As security practitioners, we aim to purify, mature, and nearly perfect security workflows.
Link to blog: https://secdevops.ai]]></itunes:summary>
        <itunes:author>Hacker Valley Media</itunes:author>
        <itunes:explicit>false</itunes:explicit>
        <itunes:block>No</itunes:block>
        <itunes:duration>948</itunes:duration>
                <itunes:episode>1</itunes:episode>
        <itunes:episodeType>full</itunes:episodeType>
        <media:content url="https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog5354112/hvs_logo.jpg" medium="image">
                            <media:title type="html">Episode 1 - Cybersecurity Alchemy</media:title></media:content>    </item>
</channel>
</rss>
