38 episodes

Have you ever wondered why something is done the way it is, only to find out that this is "just the way it has always been done"? Sometimes it is necessary to challenge the paradigm in which we find ourselves operating to discover a more true understanding of the problem, this change of thinking is referred to as a "paradigm shift". In this podcast, we explore detection and response to define the presuppositions that describe the craft, while also engaging in long form discussion with some of the industry's leading experts to challenge the convention we find ourselves operating within.

Detection: Challenging Paradigms DCP Podcast

    • Technology
    • 5.0 • 16 Ratings

Have you ever wondered why something is done the way it is, only to find out that this is "just the way it has always been done"? Sometimes it is necessary to challenge the paradigm in which we find ourselves operating to discover a more true understanding of the problem, this change of thinking is referred to as a "paradigm shift". In this podcast, we explore detection and response to define the presuppositions that describe the craft, while also engaging in long form discussion with some of the industry's leading experts to challenge the convention we find ourselves operating within.

    Episode 37: Steve Luke and Roman Daszczyszak

    Episode 37: Steve Luke and Roman Daszczyszak

    The Summiting the Pyramid project by MITRE's Center for Threat Informed Defense (CTID) released in September 2023, allowing for a unified method of "grading" detections for efficacy. Two of the pivotal members of that project join Jared and Luke to talk about how it came to be, and how it can be used to further the detection program of any organization!



    Project Links:


    Initial Release Blog Post
    Summiting the Pyramid Documentation
    Get Involved

    • 1 hr 12 min
    Episode 36: Chris Thompson

    Episode 36: Chris Thompson

    Chris Thompson (@_Mayyhem on X) joins Jared and Luke on this episode of DCP! Chris has led the charge on offensive research into System Center Configuration Manager (SCCM), and shares his insight into this often overlooked aspect of the threat landscape!



    Resources:

    #sccm on the BloodHoundGang slack workspace: https://bloodhoundgang.herokuapp.com/

    https://medium.com/@Mayyhem

    • 54 min
    Episode 35: Luke Jennings

    Episode 35: Luke Jennings

    DCP is back! New intro, new cover, new host! With Jonny stepping away from the podcast, Luke has moved into the co-host position with Jared. On this first episode, we are joined by Luke Jennings of Push Security to talk all things SaaS.



    Links:

    https://github.com/pushsecurity/saas-attackshttps://pushsecurity.com/blog/saas-attack-techniques/https://pushsecurity.com/blog/samljacking-a-poisoned-tenant/https://pushsecurity.com/blog/nearly-invisible-attack-chain/https://pushsecurity.com/blog/slack-phishing-for-initial-access/https://pushsecurity.com/blog/phishing-slack-persistence/

    • 59 min
    Episode 34: Ryan Hausknecht (Again)

    Episode 34: Ryan Hausknecht (Again)

    In this captivating episode, we delve into the world of Azure security with Ryan Hausknecht, Senior Security Researcher at Microsoft. Learn about his groundbreaking projects, the Azure Threat Research Matrix and the AzDetectSuite, and how they assist researchers and defenders in protecting against various attack techniques. We also discuss the complexities of Azure permissions and access control, and explore the nuances of the REST API, PowerShell, Azure CLI, and the Azure Portal. Don't miss this opportunity to learn from an expert and take your Azure security skills to new heights!

    • 1 hr 31 min
    Episode 33: Casey Smith (Part 2)

    Episode 33: Casey Smith (Part 2)

    Discover the power of canaries in cybersecurity and learn how to implement them the right way with our special guest, Casey Smith from Thinkst Canary. Casey shares his extensive background in pentesting and defending, as well as the inspiration behind his current projects. This episode is jam-packed with insights on using various security methods, understanding the limitations of InfoSec tools, and exploring telemetry.

    • 47 min
    Episode 32: Casey Smith (Part 1)

    Episode 32: Casey Smith (Part 1)

    Discover the power of canaries in cybersecurity and learn how to implement them the right way with our special guest, Casey Smith from Thinkst Canary. Casey shares his extensive background in pentesting and defending, as well as the inspiration behind his current projects. This episode is jam-packed with insights on using various security methods, understanding the limitations of InfoSec tools, and exploring telemetry.

    • 44 min

Customer Reviews

5.0 out of 5
16 Ratings

16 Ratings

mikermcneil ,

Legit

Lots of next-gen advice on detections, especially for folks working with tools like osquery on big fleets.

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
No Priors: Artificial Intelligence | Machine Learning | Technology | Startups
Conviction | Pod People
TED Radio Hour
NPR
Acquired
Ben Gilbert and David Rosenthal

You Might Also Like