Watch Now

Show Notes

In this episode, we brought back our good friend Lenny Zeltser.  Lenny is Chief Information Security Officer at Axonius.  He's developed a mindset of looking at security components as building blocks to create a holistic security environment. To this day, even while operating as an executive, he has wisdom that anyone can learn from.

Quite often, the less sexy aspects of information security are ignored, when in reality, you need to understand what resources you're supposed to protect, which assets are compromised, and the infrastructure for your organization.  People jump right into fighting the big fires, and as you know, there is a reason why there are so many day-to-day urgent activities. 

To start moving in a positive direction, Lenny shares this advice, “Understand what the major data sources you can tap into rather than thinking ‘let me create this one new way of serving everything I have are.’”  The information is there. Think about three sources of information that might get you the biggest bang for the buck!

 

Key Takeaways:

 

0:00 Previously on the show

1:40 Lenny introduction

2:05 Episode begins

3:10 What Lenny is doing today

5:35 The evolution of Lenny’s career

8:30 Parallels between beginning and now

10:38 Journey and growth of REMnux

13:00 Challenges Lenny has faced

15:21 Collaboration surprises

17:18 Horror stories

20:18 Enforcing policies

23:34 Asset management

26:08 New tech and trends

28:45 Biggest discovery about self

32:38 Advice for others

34:24 Keeping up with Lenny

 

 

Links:

 

What Lenny Does

 

Lenny on the Web

 

Follow Lenny on Twitter

 

Lenny on LinkedIn

 

Learn more about Hacker Valley Studio

 

Support Hacker Valley Studio on Patreon

 

Follow Hacker Valley Studio on Twitter

 

Follow Ron Eddings on Twitter

 

Follow Chris Cochran on Twitter

 

Sponsored by Axonius

Recent Episodes

Feb 13, 2025

Cybersecurity Meets AI: The Good, The Bad & The Janky

There’s no doubt that AI is changing the game in cybersecurity, but not always in the ways we expect. In this episode, Ron Eddings shares his firsthand experience with AI-powered tools that make ...

Feb 4, 2025

A Human-Centric Approach to Cybersecurity with Edna Conway

What if cybersecurity was more than just tech—what if it was about the people it serves? In this episode, Edna Conway, Founder and CEO of EMC Advisors, shares her incredible journey from law to ...

Jan 28, 2025

Rise of the Machines: Why Your Attack Surface Has More Holes Than ...

Did you know nearly half of your enterprise devices are agentless—leaving your attack surface wide open? In this episode, Ron is joined by Pandian Gnanaprakasam, Co-Founder and Chief Product ...

Jan 22, 2025

How a Game Turned a Watchmaker into a Cybersecurity Pro with ...

What if cybersecurity training could be as engaging as your favorite game? In this episode, Simeon Kakpovi, founder of the KC7 Foundation, shares how his gamified approach is changing lives and ...

Jan 14, 2025

Managing and Mitigating Cyber Risks For Your Assets with Jerich ...

What’s the key to mitigating unseen cyber risks? In this episode, Wes Wright, Chief Healthcare Officer at Ordr and Jerich Beason, CISO at WM uncover the complexities of attack surface management ...

Jan 10, 2025

The Year of the Agent: AI, Bug Bounties, and Cybersecurity ...

How will AI redefine cybersecurity in 2025? According to Marco Figueroa, Program Manager for Gen AI at the ODIN Bug Bounty Program, this year is set to be the "Year of the Agent," where AI ...

Jan 7, 2025

Understanding the Psychology of Cyber Risk with David Shipley

Most people think cybersecurity training is about knowledge, but what if motivation is the real key to success? David Shipley, CEO and Field CISO at Beauceron Security, shares how psychology and ...

Dec 24, 2024

From Landscaping to Cyber Leadership with Cole Lisko

How does a scorching July day in a van with no air conditioning lead to a career at one of the world’s top cybersecurity companies? In this episode, Cole Lisko shares his journey from ...

Dec 17, 2024

Think Like a Hacker, Solve Like a Leader featuring Ted Harrington

What if the key to innovation is breaking the rules? Ted Harrington, Executive Partner at Independent Security Evaluators and a pioneering ethical hacker, explores the power of commitment, ...

Dec 12, 2024

Hacking Trust with AI and Deepfakes featuring Iain Jackson

What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.