46 episodes

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

Exploring Information Security Archive 1 Timothy De Block

    • Technology

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

    FIN

    FIN

    This isn’t the easiest thing to do. Now that I’m writing the podcast post after recording and editing the podcast, I have a sense of relief. For the last month plus, I’ve tried to decide whether or not to shut down the podcast. The fact that it took this long to record a final episode tells me that it was time. I wrote about my reasoning in a blog post on the main page. This may or may not be the end. That largely depends on if someone would like to pick up the podcast and produce it themselves. I’d love to guide and mentor someone on the journey.

    The podcast has been beneficial to me and the many people who have reached out providing appreciative feedback. I’d love to see it continue. I’m also content that this is the end of the podcast. I will be at BSides Nashville shooting pictures and very likely be at DEFCON manning the Social Engineering door. Come see high or reach out to me on social media (@TimothyDeBlock) or email (timothy[.]deblock[@]gmail[.]com).

    • 17 min
    Who is looking for more in infosec - Feb 27, 2017

    Who is looking for more in infosec - Feb 27, 2017

    In this job posting edition of the Exploring Information Security podcast, who is looking for more in infosec?
    This is a bonus episode of the podcast. This is a solo podcast where I discuss open positions and people looking for opportunities. I plan to do these based on demand. If you would like to submit a position you are looking to fill or looking for an opportunity send me an email timothy.deblock[at]gmail[dot]com or hit me up on Twitter @TimothyDeBlock.
    Employers looking to fill a roleSr. Splunk Admin - Premise Health
    Splunk experience a plus
    SIEM experience and management is required
    Must live in Nashville, TN, or be willing to relocate
    Jr. Pen Tester - Premise Health
    Testing experience a plus
    Familiarity with testing tools
    Must live in Nashville, TN, or be willing to relocate
    Sr. Endpoint Security Consultant - Optiv
    Focus on Carbon Black
    Optiv's Architecture & Implementation Services
    Location anywhere
    50% travel time
    Fill out position or contact Brad Pace (brad.pace[at]gmail[dot]com)
    Quicken Loans
    Multiple positions open at Quicken Loans as we continue to mature our information security team. All positions would require relocation to the metro Detroit area, no remote opportunities unfortunately. Great team of people, great company culture and atmosphere. At the end of the day the positions are what you make them. - Robert Knapp @power_napz or robertknapp[at]quickenloans[dot]com
    Sr. Information Security Analyst
    Information Security Engineer
    Information Security Architect
     
    People looking for an opportunityJoshua Ovalle - Resume
    Type of work: Entry level
    Interested Areas:I have been interested in the idea of breaking down and building up security networks and things of that sort. I had always pictured hacking as something fun and challenging. Challenging things are what really get me involved more deeply in my work.Experience:Navy Aviation Electronics Technician. My experiences are with mostly physical maintenance (wire running, electronic testing, circuit card installation/testing and software instillation. I am also familiar with Microsoft computers and Apple products.Community Contribution:I have recently started dedicating time to a prison ministry at my church spending time with the children of men and women who are incarcerated by teaching and playing sports with them.Education:I graduated high school in 2009 and went to college for 2 semesters until I decided to join the military.Willing to Relocate:I am currently in San Diego, and with a new born i don't know if i could relocate any time soon.Coding Experience:I don't have any experience with coding, but I am willing to learn it.How to contact:email: jgovalle[at]gmail[dot]com
    Again if you are looking to fill a role or looking for an opportunity email me timothy.deblock[at]gmail[dot]com




































    [RSS Feed] [iTunes]

    What is Tactical Edge?

    What is Tactical Edge?

    Ed (@EdgarR0jas) is the creator of Tactical Edge (@Tactical3dge), which runs October 24 - 27, 2016, and PVC Security podcast co-host. For listeners of that podcast, I apologize. You've heard about about Tactical Edge extensively. However, I managed to get a little more out of him in this episode. We discuss origins and what makes this conference unique.

    • 29 min
    What is social engineering?

    What is social engineering?

    Valerie (@hacktress09) is an executive consultant for Securicon. She uses many techniques to pentest an organization via social engineering. One of the techniques she uses the most is phishing emails. In this episode we discuss what is social engineering and why it's important.

    • 21 min
    How to be a better mentor

    How to be a better mentor

    Chris (@_Lopi_) has some interesting thoughts on mentorship and how the infosec community can be better at it. Here is the tweet from Chris that caught my attention, "What do I want? To get more folks interested in infosec and help them break into the industry. We need better mentors." Upon further investigation I noted that Chris is creating a game for people trying to break into information security. How this applies? You will have to listen to the episode.

    • 22 min
    What is a security framework?

    What is a security framework?

    Steven (@ZenM0de) is a principal security strategist at eSentire. Part of his role is implementing, and even sometimes creating, security frameworks for organizations. We define what a security framework is and then discuss the process for choosing a framework.

    • 23 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
In Her Ellement
Boston Consulting Group BCG
Acquired
Ben Gilbert and David Rosenthal
Deep Questions with Cal Newport
Cal Newport
Hard Fork
The New York Times