Watch Now

Show Notes

This is the finale of Know Thyself. What an incredible journey, we feel like this entire experience flew by so fast, we got to talk to so many incredible people about knowing yourself, knowing your team, knowing your tech stack, knowing your environment, and even knowing your story.

Make your organization better make your security posture better, strive for impact, what are the most high leverage things that you can do today to make everybody's lives easier, or more safe, and then yield the feedback, there might be some things that you might be missing, you might need to ask questions, ask for feedback, get some information from your stakeholders, what what are you thinking about that I might not be thinking about? asking these different things is how you know thyself. And this is how you get to know the people that are around you, your peers, your stakeholders, the more knowledge you have got started with that Sun Tzu quote, in the very beginning of the podcast, if you know yourself and you know your enemy, you need not fear the results of 100 battles. So if you really understand yourself, and you have good threat intelligence, understanding the externals, you have good vulnerability management that understands the externals and the internals, if you mash all that information together, I think you'll be able to do great things with your cybersecurity program.

 

Key Takeaways

0:02 Introduction to the show

0:49 Our Sponsor, Axonius 

2:09 Welcome back

2:31 Reflecting on Know Thyself

3:17 Recap This Seasons Guest

3:22 Marcus Carey

4:17 John Strand

5:05 Aaron Reinhart & Jamie Dixon

5:54 Chaos Engineering

7:12 Lenny Zeltser, asset inventory

7:54 Kevin Allison, Storytelling is a soft skill

10:19 John Strand

12:13 Can we do better?

13:54 What kind of leader are you?

14:26 Do you have unsupported devices?

17:34 Ask yourself these questions

13:33 Go back to the EASY Framework

21:50 Learning

23:29 Exploration

24:00 Immersion

27:28 Reach Hacker Valley

 

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ron Eddings on Twitter

Follow Chris Cochran on Twitter

Supported by Axonius

 

Recent Episodes

Jul 31, 2025

The Future of Cyber Talent Is African with Confidence Staveley

The world’s youngest continent is also its most untapped resource. Confidence Staveley, Founder of CyberSafe, makes a powerful case for why Africa’s youth are the answer to global cybersecurity ...

Jul 24, 2025

Compliance Isn’t the Enemy with Jeff Man

Is compliance just a checkbox, or the backbone of real security? Returning to the show with decades of hard-earned insight, Jeff Man makes the case that compliance, especially PCI-DSS, isn't ...

Jul 17, 2025

What Makes a Great CISO? A Playbook from Gary Hayslip

What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to ...

Jul 10, 2025

Confidence, Coaching, and the S-Word with Mel Reyes

Want to stand out as a leader? According to our guest Mel Reyes, you need to dress like you mean it and speak like you’ve got nothing to prove. In this episode, Mel shares how he built ...

Jun 26, 2025

Purple Teaming Is the New Job Security with Maril Vernon

Cybersecurity isn’t just red or blue anymore... it’s purple, white, and deeply human. Maril Vernon, award-winning ethical hacker and Senior Solutions Architect at NetSPI, returns to the Hacker ...

Jun 19, 2025

The AI Gold Rush in Cybersecurity with Chris Cochran

The new cybersecurity pioneers aren’t chasing alerts, they’re building with AI. But what happens when tools meant to assist begin making decisions for us? And what skills do we lose when ...

Jun 12, 2025

The AI That Tried to Escape with Ron Eddings

What happens when AI refuses to be replaced? This episode kicks off with a chilling real-world example of an AI threatening blackmail—and only gets more intense from there. Host Ron Eddings ...

Jun 5, 2025

Zero Trust Isn’t a Tool — It’s Everything with George Finney

What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products? In this episode, George Finney, CISO at the University of Texas System and ...

May 29, 2025

Your Two-Year Edge Starts Now with Marco Figueroa

You won’t be replaced by AI—you’ll be replaced by someone using it better. Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a ...

May 22, 2025

Badge Cloning, Alarm Triggers & Getting Hired to Hack with Greg ...

Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs. ...

WORK WITH US

PODCASTS + SPEAKING + EVENTS

Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.