November 11, 2020

Episode 104 - Analyzing the Enemy with Robin Black

by Hacker Valley Studio

November 11, 2020

Episode 104 - Analyzing the Enemy with Robin Black

by Hacker Valley Studio

Show Notes

In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris provide a very special episode as they interview Robin Black.  Robin is a martial arts practitioner and commentator, and he is arguably the best martial arts analyst in the world.  He believes secrets to the universe lie in the sacred moments of combat - and that couldn’t be any more true in cyber security.  So what does cyber security have to do with martial arts and analysis?  Ron and Chris invite listeners into the conversation to find out!

As the conversation begins, Robin shares about his background, emphasizing the fact that he has the privilege of doing what he loves.  Robin’s work involves taking events and crafting a story in real time; the task is in many ways similar to that of cyber security, but as a general rule,  it requires more speed.  And so, Ron and Chris wonder, what is Robin’s mindset as an analyst?  Robin explains how he developed his interest and skill as an analyst, slowly building skill, sharpening his ability with language, and consciously deciding to go back to the roots of martial arts in his analysis rather than approaching the work as a television announcer typically would.  He is an art curator of violence, so to speak, and is committed to “nutrient rich” commentary. 

Moving forward in the conversation, Ron and Chris wonder about what advice Robin would offer to the “little guy.”  Using the example of Brazilian Jiu Jitsu, Robin explains the value of knowing more, having more knowledge, being able to change, and being confident.  Such strengths help the apparent underdog in both fighting and cyber security.  Much like they considered unhackability with previous guests, Ron and Chris also raise the notion of an unbeatable fighter, and Robin details the reasons why such a fighter is a myth.  Listeners will learn about such things as the cracks and flaws in fighting (which are located in the root of fighting - within belief systems), the workings and danger of muscle memory, how Robin dissects fighters, and how Robin thinks about cyber security!

 

1:45 - This special episode features Robin Black!

3:19 - The conversation first turns to Robin’s background and what he’s doing today.

5:31 - What is Robin’s mindset as an analyst?

11:21 - Ron and Chris wonder what advice Robin would give to the “little guy.”

14:02 - Is there such a thing as an unbeatable fighter?

17:17 - The episode turns to the flaws and cracks within fighting.

20:54 - What is the component of muscle memory, and what role does it play?

24:31 - Ron and Chris want to know how Robin dissects fighters.

33:24 - Does Robin have any questions about cyber security?

 

Links:

Follow Robin on Twitter, Instagram.

Follow Bellator MMA on Youtube.

Learn more about Hacker Valley Studio.

Support Hacker Valley Studio on Patreon.

Follow Hacker Valley Studio on Twitter.

Follow hosts Ron Eddings and Chris Cochran on Twitter.

Learn more about ByteChek, and mention Hacker Valley Studio to receive a limited time offer!

Read more

Listen Now

Episode 104 - Analyzing the Enemy with Robin Black

November 11, 2020 Hacker Valley Studio

00:00:00

Recent Episodes

September 19, 2023
by Hacker Valley Studio

It’s a classic technologist conundrum: Should I build or buy the solution I need to solve a problem? The “Build vs. Buy” conundrum is faced by technology teams worldwide. To help approach this riddle, Chris Cochran speaks to two industry veterans, Sl...

September 12, 2023
by Hacker Valley Studio

Embrace the AI Revolution in Cybersecurity! Ron Eddings explores the dynamic world of AI, from cybersecurity automation to anomaly detection. Learn how AI is being used by practitioners and creators to stay one step ahead of the adversary and the com...

September 5, 2023
by Hacker Valley Studio

For this week's episode, we brought back a fan favorite Security Teams Can't Do It All. This episode features guest Rob Wood, CISO at CMS, who discusses the challenges of data silos in the workplace and the importance of supportive leadership.   Link...

August 29, 2023
by Hacker Valley Studio

In this episode, host Ron is joined by the CISO at Corvus Insurance, Jason Rebholz, to talk about the life of being a cybersecurity content creator. From his drive to create cyber content for technical and non-technical audiences to the sometimes har...

August 22, 2023
by Hacker Valley Studio

In this episode, hosts Ron and Chris are joined by special guest Eric Avigdor, VP of Product Management at Votiro. With humility as the focal point, Eric details his journey as a Product Manager — sharing his unique approach to leadership and custome...

August 15, 2023
by Hacker Valley Studio

Host Chris Cochran is joined by Marty Overman, Senior VP at Imperva, to discuss the importance of self-awareness and transparency in cybersecurity leadership. The two emphasize the need for leaders to recognize their strengths and weaknesses and unde...

August 1, 2023
by Hacker Valley Studio

In this episode, host Ron is joined by Jamie Blasco, co-founder and CTO at Nudge Security, to discuss the opportunities of SaaS as well as the security implications of AI. Jamie also considers the importance of striking a balance between productivity...

July 25, 2023
by Hacker Valley Studio

How do you effectively persuade team members and stakeholders to take action, convey the importance of new projects, or request additional resources? Communicating technical security information often leads to disconnection or worse, falls on deaf ea...

July 18, 2023
by Hacker Valley Studio

In this episode, Chris and Ron Eddings are joined by Jeff Man, a legend in cybersecurity. The conversation begins with Jeff sharing his experiences as a member of the first NSA red team and his involvement in groundbreaking projects. He discusses his...

July 11, 2023
by Hacker Valley Studio

In this episode, Chris and Ron interview Derek Wood from Duality Technologies, a leading privacy technology company to discuss the concept of homomorphic encryption and its significance in data security, privacy, and governance. Homomorphic encryptio...