Watch Now

Show Notes

This episode of the Hacker Valley Studio podcast features Jon DiMaggio, a Senior Threat Intelligence Analyst at Symantec.  Jon is a researcher and longtime bad guy chaser, and Ron and Chris fill this installment of Hacker Valley Blue with Jon’s thoughts on ransomware, threat research, attribution, and more!

Jon introduces himself to listeners who may not yet know much about him, explaining that he started his career as an engineer and that his work for the government in the early 2000s forced him to focus a lot on defending against nation-state attacks.  He developed into an expert in the field, and transitioned about 13-14 years ago into his current line of work.  He now teaches alongside his work as an analyst, and he moved from a government position to Symantec in 2014.  Jon’s specialty is still nation-state, but he has also ventured into enterprise ransomware.  He shares about these areas of specialization with Ron and Chris, detailing what a nation-state is and how to combat it within the context of threat intelligence, and addressing the economics of ransomware.

As the conversation continues, Ron and Chris raise a variety of other topics for Jon to address.  Jon considers the threat of a future major worm attack, and provides listeners with insight on how to become established in his line of work.  There are a lot of available resources that people can use to develop their own skills and increase their visibility.  However, becoming a government hacker, and so having an offensive rather than a defensive role, is much more challenging.  Moving toward the conclusion of the conversation, Jon offers tips on navigating attribution and bias (such as being sure to have evidence before making public claims!), explains how he mentally organizes and recalls information, and speaks to the nature of strong communication.

 

1:41 - Listeners are introduced to Jon DiMaggio and the episode before Jon explains his background..

5:04 - The first major topic Jon shares about is that of nation-states, specifically speaking to the work of  combating nation-state attackers.

12:57 - The conversation turns to the economics of ransomware.

18:39 - What are Jon’s thoughts on the possibility of another major worm attack?

20:26 - Jon is asked about how people can enter his field or that of hacking.

24:54 - How should listeners approach attribution and bias, and how has Jon navigated bias in his own life?

31:31 - The group considers Jon’s mental organization, his recall of information, and the topic of communication.

 

Links:

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ronald Eddings on Twitter

Follow Chris Cochran on Twitter

Access the recent work and research on Symantec’s threat intelligence feed

Learn more about the episode sponsor, RiskIQ

Recent Episodes

Jan 28, 2025

Rise of the Machines: Why Your Attack Surface Has More Holes Than ...

Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product ...

Jan 22, 2025

How a Game Turned a Watchmaker into a Cybersecurity Pro with ...

What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and ...

Jan 14, 2025

Managing and Mitigating Cyber Risks For Your Assets with Jerich ...

What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management ...

Jan 10, 2025

The Year of the Agent: AI, Bug Bounties, and Cybersecurity ...

How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI ...

Jan 7, 2025

Understanding the Psychology of Cyber Risk with David Shipley

Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and ...

Dec 24, 2024

From Landscaping to Cyber Leadership with Cole Lisko

How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from ...

Dec 17, 2024

Think Like a Hacker, Solve Like a Leader featuring Ted Harrington

What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, ...

Dec 12, 2024

Hacking Trust with AI and Deepfakes featuring Iain Jackson

What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic ...

Dec 3, 2024

Championing the Human in Cybersecurity with Julie Haney

What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater ...

Nov 26, 2024

Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid ...

Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.