Show Notes
In this episode of the Hacker Valley Studio podcast, hosts Ron and Chris introduce the podcast’s new series: Hacker Valley Red. After the previous season highlighted the defensive side of cyber security, this season will focus on the other side of the coin - the offensive side. Ron and Chris spend this initial episode talking about their experience with the offensive side of cyber security, what listeners can look forward to hearing in the episodes ahead, and what sorts of questions experts will field throughout the season.
As the conversation gets underway, Ron and Chris introduce the season, which will cover such topics as the background and personas of red teamers, information about red teaming technology, misconceptions from the blue side, and what red teaming really looks like. The hosts then share their own backgrounds in red teaming. While they both had some prior experience with red teaming, they learned a lot through hosting the episodes in the season. As they introduce the series ahead, Ron and Chris touch on the social side of red teaming, analogies by which red teaming can be explained, Ron’s exploitation video, the value and use of red teaming within organizations, the shared community of red and blue teaming, purple team engagement, the concept of unhackability, and more.
In the episodes ahead, Ron and Chris will ask guests what other aspects of life and technology help them with red teaming, and there are particular topics from the episodes that they are most excited to consider with listeners. These topics include the issue between blue and red teams, the concept of a hacker, the idea of unhackability, and different perspectives of paths into the field of red teaming and to mastery within it. Ron and Chris conclude their introductory conversation with two lessons they hope listeners will take from the season: the lesson that creation is a process and that the best red teamers learn to love the process, and the lesson that both red and blue team members are on the same team.
0:48 - The podcast is now moving to the other side of the coin: the offensive side of cyber security.
2:48 - Ron and Chris share their respective backgrounds in red teaming.
7:25 - What other aspects of life and technology help guests with red teaming?
10:50 - Chris asks about Ron’s exploitation video.
12:52 - The hosts address the iterative improvement of an organization’s security posture.
18:14 - Ron and Chris talk about purple team engagement.
21:12 - Is unhackability real or possible?
24:53 - Hacking can have to deal with a human, rather than a device or application.
26:34 - What key takeaways do the hosts want listeners to take from the season?
28:10 - What do Ron and Chris want listeners to learn?
Links:
Learn more about Hacker Valley Studio
Support Hacker Valley Studio on Patreon
Follow Hacker Valley Studio on Twitter
Follow Ronald Eddings on Twitter
Recent Episodes
Hacking Trust with AI and Deepfakes featuring Iain Jackson
What happens when cutting-edge AI meets the art of deception? In this episode, Iain Jackson, Academy Hive Leader at CovertSwarm, takes us through the uncanny potential and risks of synthetic ...
Championing the Human in Cybersecurity with Julie Haney
What happens when cybersecurity puts people first? Julie Haney, Human-Centered Cybersecurity Program Lead at NIST, shares how designing security with humans at the center leads to greater ...
Do You Deserve To Be Hacked? Featuring Ilan Fehler and Dahvid ...
Do you deserve to be hacked? With that bold tagline, CovertSwarm is pushing leaders to rethink how they test and defend their systems, and in this episode, they’re sharing firsthand how ...
Transforming SOC Operations with AI featuring Roy Halevi
Cybersecurity is evolving fast, and AI is at the center. Roy Halevi, Co-Founder and CTO of Intezer, explains how AI automates SOC operations, improving speed and accuracy while freeing up teams ...
From Shadow IT to Full Asset Visibility with Wes Wright
Can you truly protect what you can't see? Wes Wright, Chief Healthcare Officer at Ordr, joins Ron to share how organizations can shine a light on their network and asset blind spots and take ...
Building Opportunities for Women and Minorities in Cybersecurity ...
How do you create waves of change in an industry? Connie Matthews, Founder and CEO of ReynCon, speaks with Ron about the power of resilience, mentorship, and taking that first bold step in ...
Rethinking Cybersecurity Hiring with Naomi Buckwalter
Is cybersecurity gatekeeping holding back the industry? Naomi Buckwalter, Senior Director of Product Security at Contrast Security and Founder of the Cybersecurity Gatebreakers Foundation, ...
AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter
In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, ...
How to Become a True Security Leader with Nathan Case
How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact. In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey ...
AI and the Future of Cyber Defense with John Hubbard
How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum ...
WORK WITH US
PODCASTS + SPEAKING + EVENTS
Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.
Thank you!
We will be in touch soon.