Hacker Valley Blue S2 Episode 4 - Lenny Zeltser

May 18, 2021 Hacker Valley Studio

00:00:00

Show Notes

In this episode, we brought back our good friend Lenny Zeltser.  Lenny is Chief Information Security Officer at Axonius.  He's developed a mindset of looking at security components as building blocks to create a holistic security environment. To this day, even while operating as an executive, he has wisdom that anyone can learn from.

Quite often, the less sexy aspects of information security are ignored, when in reality, you need to understand what resources you're supposed to protect, which assets are compromised, and the infrastructure for your organization.  People jump right into fighting the big fires, and as you know, there is a reason why there are so many day-to-day urgent activities. 

To start moving in a positive direction, Lenny shares this advice, “Understand what the major data sources you can tap into rather than thinking ‘let me create this one new way of serving everything I have are.’”  The information is there. Think about three sources of information that might get you the biggest bang for the buck!

 

Key Takeaways:

 

0:00 Previously on the show

1:40 Lenny introduction

2:05 Episode begins

3:10 What Lenny is doing today

5:35 The evolution of Lenny’s career

8:30 Parallels between beginning and now

10:38 Journey and growth of REMnux

13:00 Challenges Lenny has faced

15:21 Collaboration surprises

17:18 Horror stories

20:18 Enforcing policies

23:34 Asset management

26:08 New tech and trends

28:45 Biggest discovery about self

32:38 Advice for others

34:24 Keeping up with Lenny

 

 

Links:

 

What Lenny Does

 

Lenny on the Web

 

Follow Lenny on Twitter

 

Lenny on LinkedIn

 

Learn more about Hacker Valley Studio

 

Support Hacker Valley Studio on Patreon

 

Follow Hacker Valley Studio on Twitter

 

Follow Ron Eddings on Twitter

 

Follow Chris Cochran on Twitter

 

Sponsored by Axonius

Recent Episodes

December 5, 2023

Ransomware: How to Use AI to Create

a Readiness Kit with Scott Suthe...

The adversary is using Artificial Intelligence. Why aren’t you? In this episode, Host Chris Cochran talks with Scott Sutherland, VP of Research at NetSPI, about everyone’s favorite hot topics; ransomware and AI...

November 28, 2023

Cover Your SaaS: Navigating OAuth

and SaaS Security Challenges

SaaS misconfigurations may be responsible for up to 63% of security incidents. Do your SaaS applications have risky OAuth grants and misconfigurations? Let’s not find out. We will unravel the complexities of OA...

November 21, 2023

Standing Out On LinkedIn as a

Cybersecurity Professional with ...

In this episode, host Ron Eddings speaks with Chris Hughes, President at Aquia, Cyber Innovation Fellow at CISA, and cybersecurity legend. Special guest, Chris Hughes, was initially inspired to build a personal...

November 7, 2023

Adversarial AI: Navigating the

Cybersecurity Landscape

In this episode, host Ron Eddings is joined by Sr. Director of Red Team Operations at Coalfire, Pete Deros, to discuss the hottest topic around; adversarial AI. Ron and Pete discuss how AI is used and how the a...

October 31, 2023

Protecting What You Can’t See with

HD Moore

In this episode, host Ron Eddings is joined by Metasploit creator, co-founder and CEO of runZero, HD Moore. HD changed the world with Metasploit and he’s doing it again with runZero. Attack Surface Management c...

October 24, 2023

Penetration Testing, Public

Speaking, and Content Creation w...

In this episode, Ron Eddings is joined by Penetration Tester, Instructor, International Speaker, Best Selling Author, and Podcast Host, Phillip Wylie. Phillip shares how pen testing and the need to educate peop...

October 17, 2023

Ruse and Deception: From Hollywood

to Corporate Espionage with Robe...

In this episode, Host Ron Eddings interviews Robert Kerbeck, author of Ruse: Lying the American Dream from Hollywood to Wall Street. Robert shares how his professional acting skills helped his career in corpora...

October 10, 2023

Hacker Culture and ADHD with Kim

Crawley

In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum...

October 3, 2023

Starting at the Endpoint with Danny

Jenkins

In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero’s Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to ...

September 26, 2023

Having Resilience In Your Cyber

Career with Erika Eakins

In this episode, host Chris is joined by Erika Eakins — a cybersecurity sales ninja, podcaster, and co-founder at Teach Kids Tech. Erika opens up about her challenges entering tech and cybersecurity as a woman ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.