Tag Archives: Security Research

PODCAST: Physical Pen-testing with Jek Hyde

Jek-Hyde-baby-bump-pic-bathroom-1Guest Jek Hyde of Sincerely Security with prosthetic “baby bump.”

My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!

Tagged , , , , , , , , , , , , , , , , , , ,

RSA Security Thunderdome Debate

As the glory of 2016 rolls to an end, I plan to empty my archive of some unreleased recordings which never made it on to any podcasts over the past year.

rsa-2016

I’m starting with this recording from the RSA Conference earlier this year in San Francisco, CA. It features Jen Ellis of Rapid7 moderating a “Security Thunderdome” debate between Rob Graham (Errata Security) and Josh Corman (Atlantic Council). It’s basically a debate about debating. A very spirited breakdown of the anatomy of a debate with a focus on cyber security.

The audio quality isn’t the best, but good enough to follow along. If you listen closely you’ll hear me ask a question from the audience toward the end. Big thanks to RSA, Jen, Rob, and Josh for allowing me to record the session. I hope this “Thunderdome Debate” format will return next year to RSA and possibly expand to at least another hour. Enjoy!

DIRECT DOWNLOAD OF MP3

 

 

 

Tagged , , , , , , , , ,