35 episodes

Two bright minds forging two progressive paths in cybersecurity, with a singular commitment to getting cognitive diversity valued as a superpower. We’re Out-of-Band. Welcome

Out Of Band OutOfBand

    • Technology

Two bright minds forging two progressive paths in cybersecurity, with a singular commitment to getting cognitive diversity valued as a superpower. We’re Out-of-Band. Welcome

    Let’s talk about...Threat Informed Defense through Cyber Threat Intelligence

    Let’s talk about...Threat Informed Defense through Cyber Threat Intelligence

    For S03E06, Gert-Jan Bruggink takes us into the world of Threat-Informed Defence through #cyberthreatintelligence. While taking his first steps in the cybersecurity world as an engineer, and later on as a consultant, he got intrigued by the release of the first APT report, the rise of a (now not so small anymore) open-source information company, and the question “How does the decision-making process work in an organisation?”.

    Specialising further and further in the world of cyber threat intelligence AND storytelling, he now acts as a Cyber Threat Landscape Cartographer, encouraging every team he guides to think critically about what cyber threat intelligence actually means to them and their organisation, and how they want to position it in their team to act as a guidance for their decision-making process; With the end-goal to build more and more threat-informed defence organisations.

    • 51 min
    Let's talk about Crisis Management Preparation

    Let's talk about Crisis Management Preparation

    🟠 Stephen Delahunty and Sebastien Jardin discuss with us in S03E05 on how to prepare organisations for "what happens after the boom"; or in other words, how to deal with large cyber crises. Stephen and Sebastien talk us through what Cyber Crisis Management Preparation is, how they cannot fail when being invited train a C-Suite, and how experience in the military and the TV and film world help them with dealing with curveballs and egos. Tune in to learn more!

    Quote of the talk: “A crisis simulation is like haute couture: Everything is custom and tailored, unique for every client”

    Tune in to learn more!

    Guest Profiles:
    🗣️Stephen Delahunty: https://www.linkedin.com/in/stephen-delahunty-cyber-security-consultant/

    🗣️Sebastien Jardin: https://www.linkedin.com/in/sebastienjardin/

    ––––––––––––––––––––––––––––––

    Track: Drive — Markvard [Audio Library Release] Music provided by Audio Library Plus Watch: https://youtu.be/3dQDaKnyiX0 Free Download / Stream: https://alplus.io/drive

    ––––––––––––––––––––––––––––––

    • 1 hr 4 min
    Let's Talk About Identity & Access Management (IAM)

    Let's Talk About Identity & Access Management (IAM)

    🟠 Joe Zanini takes us in S03E04 into the complex world of Identity & Access Management (IAM). We talk about what IAM is and why it is so difficult to implement properly in an organisation. We shed some light on Joe's journey through the IAM space since 2008, and why it is important to know a little bit of every security domain if you want to work in IAM. Tune in to learn more!



    Guest Profile: Joe Zanini

    LinkedIn: https://www.linkedin.com/in/joezanini/


    ––––––––––––––––––––––––––––––
    Track: Drive — Markvard [Audio Library Release]
    Music provided by Audio Library Plus
    Watch: https://youtu.be/3dQDaKnyiX0
    Free Download / Stream: https://alplus.io/drive

    ––––––––––––––––––––––––––––––

    • 35 min
    Let's talk about Malware Analysis

    Let's talk about Malware Analysis

    🟠 Max Kersten, a self-taught Malware Analyst at Trellix’ Advanced Threat Research team joins us in S03E03 of Out of Band to discuss Malware Analysis. In addition to talking about his journey from writing code at 12 years old, being a Law School dropout and finally teaching himself how to perform Malware Analysis, we get to learn about the contributions he is making to the community, Reverse Engineering Malware and some of the high ways you and I can take into the field! Tune in to learn more. 



    Guest Profiles: 

    Max Kersten

    LinkedIn: https://www.linkedin.com/in/thisislibra/

    Twitter: @Libranalysis

    Website: https://maxkersten.nl/binary-analysis-course/



    Telegram groups:

    Malware Research: https://t.me/malwareresearch

    Incident Response: https://t.me/incidentresponse

    Reverse Engineering: https://t.me/reverseengineeringz

    Daily SOC activities: https://t.me/socdaily

    Threat Intelligence: https://t.me/ThreatIntelligenceSharing



    –––––––––––––––––––––––––––––– 

    Track: Drive — Markvard [Audio Library Release] 

    Music provided by Audio Library Plus

    Watch: https://youtu.be/3dQDaKnyiX0 

    Free Download / Stream: https://alplus.io/drive 

    ––––––––––––––––––––––––––––––

    • 1 hr 5 min
    Let's Talk about Social Engineering

    Let's Talk about Social Engineering

    🟠 In Season 3 Episode 02 of Out of Band we are joined by Stephanie Carruthers (Snow), Chief People Hacker for the X‑Force Red team at IBM to talk about Social Engineering. Stephanie’s background is rather unique having worked in Sales and Special Effects Makeup before pivoting into cyber. She shares her journey of becoming a Social Engineer, the challenges she faces in her role and much needed advice for those that would be interested in cybersecurity or social engineering! Tune in to learn more.

    Guest Profile:

    Stephanie Carruthers

    LinkedIn: https://www.linkedin.com/in/stephanie-carruthers/

    Twitter: @_sn0ww

    ––––––––––––––––––––––––––––––

    Track: Drive — Markvard [Audio Library Release]

    Music provided by Audio Library Plus

    Watch: https://youtu.be/3dQDaKnyiX0

    Free Download / Stream: https://alplus.io/drive

    ––––––––––––––––––––––––––––––

    • 36 min
    Let's talk about Critical Thinking in Cybersecurity

    Let's talk about Critical Thinking in Cybersecurity

    🟠 Season 3 Episode 01 of Out of Band delves into the topic of Critical Thinking in Cybersecurity. We are joined by Ramon Garo, Manager of CSIRT Incident Response Analysts at IBM, to share his unique perspective and share experience on this topic. Ramon has worked in a range of security roles prior to specialising in digital forensics and incident response (DFIR). We delve into its importance, subskills that enable one to be a critical thinker and some of the gotcha’s along the way! Tune in to learn more.

    Guest Profiles:

    Ramon Garo

    LinkedIn: https://www.linkedin.com/in/ramongaro

    ––––––––––––––––––––––––––––––

    Track: Drive — Markvard [Audio Library Release]

    Music provided by Audio Library Plus

    Watch: https://youtu.be/3dQDaKnyiX0

    Free Download / Stream: https://alplus.io/drive

    ––––––––––––––––––––––––––––––

    • 45 min

Top Podcasts In Technology

There Are No Girls on the Internet
iHeartPodcasts
Last Week in AI
Skynet Today
Hot Girls Code
Hot Girls Code
Darknet Diaries
Jack Rhysider
Lenny's Podcast: Product | Growth | Career
Lenny Rachitsky
Acquired
Ben Gilbert and David Rosenthal