Phillip Wylie Show

Phillip Wylie
Phillip Wylie Show

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

  1. From Hacking to Entrepreneurship: The PhantomSec Story

    4D AGO

    From Hacking to Entrepreneurship: The PhantomSec Story

    Summary In this episode of the Phillip Wylie Show, host Phillip Wylie engages with cybersecurity experts Grant Smith and Justin Perez, exploring their unique journeys into the world of hacking and cybersecurity. The conversation delves into their origins as hackers, the founding of their company PhantomSec, and the innovative techniques they are developing for EDR evasion. They discuss the importance of hands-on experience in cybersecurity education, the value of certifications, and what qualities they look for in ideal candidates for cybersecurity roles. The episode provides insights into the evolving landscape of cybersecurity and the challenges faced by newcomers in the field. Takeaways • Justin's early fascination with technology led to his hacking journey. • Grant's childhood pranks sparked his interest in cybersecurity. • PhantomSec was born out of a need for better EDR evasion tools. • Hands-on experience is crucial for success in cybersecurity. • Curiosity drives innovation in the cybersecurity field. • Many educational institutions lack practical cybersecurity training. • Certifications can help but shouldn't be the only focus for candidates. • Real-world experience often outweighs theoretical knowledge in hiring. • CVE contributions can enhance a candidate's profile significantly. • Passion and curiosity are key traits for success in cybersecurity. Sound Bites • "That's like kind of the hacker story." • "You have to learn those things." • "Don't get discouraged as well." Chapters 00:00 Introduction to Cybersecurity Journeys 01:13 Hacker Origin Stories: Justin Perez 04:12 Hacker Origin Stories: Grant Smith 06:57 The Birth of PhantomSec 10:08 Innovations in EDR Evasion 13:49 Getting Started in Offensive Security 16:20 The Role of Education in Cybersecurity 21:01 The Importance of Hands-On Experience 24:50 Certifications and Their Value 29:32 Evaluating Candidates in Cybersecurity Resources https://www.linkedin.com/in/justin-perez215/ https://www.linkedin.com/in/grant-smith-cyber/ https://www.linkedin.com/company/phantom-cyber-group/ https://phantomsec.tools/

    35 min
  2. Luke McOmie: Pyr0's Red Team Journey

    MAY 13

    Luke McOmie: Pyr0's Red Team Journey

    Summary In this episode of the Phillip Wylie Show, Phillip Wylie interviews Luke McOmie, also known as Pyro, a prominent figure in the hacker and cybersecurity community. They discuss the value of smaller conferences, Luke's journey into hacking, memorable red teaming experiences, and the importance of community engagement in the cybersecurity field. Luke shares insights on getting started in red teaming, the evolution of the industry, and the significance of building relationships at conferences. Takeaways • Smaller conferences foster better relationships. • Luke's first computer was an AST-486SX. • Hacking the school district led to early trouble. • Red teaming involves both physical and digital penetration testing. • Community engagement is crucial in cybersecurity. • Training and certifications are essential for aspiring red teamers. • Physical security assessments are increasingly required by insurance underwriters. • Networking at conferences can lead to lifelong relationships. • Urban exploration can provide valuable skills for red teaming. • The landscape of cybersecurity is evolving with new challenges. Sound Bites "I got to play with Commodore 64." "I am God." "I had a backpack full of data." Chapters 00:00 Introduction to the Hacker Community 03:02 The Value of Smaller Conferences 06:10 Luke's Hacker Origin Story 08:59 Red Teaming Experiences and War Stories 17:57 Close Calls and Getting Caught 24:13 The Unexpected Consequences of Cyber Operations 30:37 Navigating the Path to Red Teaming 35:15 The Evolution of Penetration Testing 38:19 Building Connections in the Cybersecurity Community Resources https://www.linkedin.com/in/lmcomie/

    42 min
  3. Evan Dornbush: Desired Effect

    MAY 6

    Evan Dornbush: Desired Effect

    Summary In this episode of the Phillip Wylie Show, host Phillip Wylie interviews Evan Dornbush, a seasoned cybersecurity professional with a rich history in the field. They discuss Evan's journey from a summer internship focused on cybercrime to his work with the NSA and his entrepreneurial ventures in cybersecurity. The conversation delves into the challenges of hiring in tech, the importance of proving technical skills, and the evolving landscape of security research. They also explore the impact of AI on cybersecurity, the economics of cybercrime, and Evan's new podcast aimed at educating listeners about vulnerabilities and exploits. Takeaways • Evan's journey into cybersecurity began with a summer internship focused on cybercrime. • The importance of hands-on experience in proving technical skills in cybersecurity. • Entrepreneurship in cybersecurity can lead to innovative solutions for hiring and skill assessment. • AI is changing the landscape of cybersecurity, creating both challenges and opportunities. • The economics of cybercrime are driven by profitability, making it a persistent issue. • Bug bounties provide a platform for researchers to monetize their skills and contribute to security. • The rise of CVEs reflects the increasing complexity and volume of software vulnerabilities. • Community involvement and education are crucial for the future of cybersecurity. • Evan's podcast aims to demystify vulnerabilities and educate the research community. • The need for better options for researchers to disclose and monetize their findings. Sound Bites "I was totally fanboying." "Research is protected free speech." "It's a shame there's nothing US based." Chapters 00:00 Introduction and Background 01:16 Evan's Hacker Origin Story 04:15 Transitioning from NSA to Entrepreneurship 06:53 The Mission of Point Three Security 09:32 Innovative Hiring Practices in Cybersecurity 12:32 Proving Technical Skills in Cybersecurity 14:42 Breaking into Security Research 17:51 The Evolving Landscape of Vulnerability Research 20:55 The Value of CVEs vs Certifications 23:59 The Economics of Cybercrime 26:20 The Future of Exploit Markets 30:07 Evan's New Podcast: Explain it Like I'm Five 37:36 Closing Remarks and Nonprofit Involvement Resources https://www.linkedin.com/in/evandornbush/ https://www.desiredeffect.io/ https://www.securityweek.com/ethical-zero-day-marketplace-desired-effect-emerges-from-stealth/ https://podcasters.spotify.com/pod/show/hackersontherocks4 https://goldstargamers.org/

    37 min
  4. Tim Fowler: Space Security The Final Cyber Frontier

    MAY 2

    Tim Fowler: Space Security The Final Cyber Frontier

    Summary In this episode of the Phillip Wylie Show, Tim Fowler discusses the importance of networking and community in the cybersecurity field. He emphasizes the value of continuous learning, mentorship, and sharing knowledge to foster growth within the industry. Tim also shares his personal journey into cybersecurity, highlighting the significance of relationships and the evolving landscape of space cybersecurity, including his upcoming training program. Takeaways • Networking is crucial in cybersecurity. • Community learning can be more valuable than formal education. • Conferences provide opportunities for relationship building. • Mentorship is a two-way street; both parties benefit. • Continuous learning is essential to stay relevant in the field. • Sharing knowledge helps others and reinforces your own understanding. • The grind mentality can hinder new professionals in the industry. • Asking for help is a skill that can be developed. • Effective questioning is key to problem-solving. • Tim's journey into cybersecurity began with a passion for technology. Sound Bites "Networking is crucial in cybersecurity." "The grind mentality can hinder new professionals." "Effective questioning is key to problem-solving." Chapters 00:00 Introduction and Background 02:57 The Importance of Networking in Cybersecurity 06:07 Community Engagement and Learning 08:54 The Value of Lobby Con and Informal Learning 12:13 Building Relationships and Mentorship 14:45 The Joy of Giving Back 18:07 Continuous Learning and Staying Relevant 21:00 Sharing Knowledge and Experiences 23:55 Asking for Help and Overcoming Challenges 27:28 The Art of Mentorship and Learning 32:16 Tim's Hacker Origin Story 39:16 Innovations in Space Cybersecurity Training 45:40 The Future of Space Security and Technology Resources https://ethoslabs.space/ https://www.antisyphontraining.com/course/foundations-in-space-cybersecurity-with-tim-fowler/ https://x.com/roobixx https://www.linkedin.com/in/roobixx

    48 min
  5. Gerald Auger PhD: Transform Your Cybersecurity Career with Community

    APR 29

    Gerald Auger PhD: Transform Your Cybersecurity Career with Community

    Summary In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Gerald Auger from Simply Cyber about his journey in cybersecurity, the importance of community building, and the role of personal branding in career advancement. They discuss Gerry's transition from software engineering to Governance, Risk, and Compliance (GRC), the impact of AI in GRC, and the significance of engaging with the community through content creation. Gerry shares insights on training, certifications, and the value of networking, emphasizing that anyone can contribute to the community regardless of their experience level. Takeaways • Simply Cyber launched in December 2019 to help others. • Gerry's journey into cybersecurity began with a failed audit. • GRC is becoming more recognized and accepted in the industry. • AI can enhance GRC processes and training. • Personal branding is crucial for career advancement in cybersecurity. • Engaging with the community can lead to unexpected opportunities. • Consistency in content creation builds a personal brand. • Networking is about building genuine relationships, not just seeking jobs. • Everyone can contribute to the community, regardless of experience. • Celebrating small wins in personal branding is important. Sound Bites "AI is super useful." "Just hit record. Just start." "You never know who's watching." Chapters 00:00 Introduction to Simply Cyber and Community Building 02:50 Gerry's Hacker Origin Story 07:29 Transitioning from Technical Background to GRC 13:04 Training and Career Path in GRC 18:14 Certifications and Their Importance in GRC 20:01 Leveraging AI in GRC Practices 25:50 Navigating Cybersecurity Hype and AI's Role 27:14 The Power of Personal Branding 30:50 Building a Personal Brand Through Content Creation 32:41 Transforming Job Opportunities Through Networking 39:54 The Importance of Community Engagement 45:50 Creating Value in Cybersecurity Education Resources https://www.linkedin.com/in/geraldauger/ https://www.simplycyber.io/ https://www.linkedin.com/company/simply-cyber/ https://academy.simplycyber.io/courses https://www.youtube.com/c/GeraldAuger

    47 min
  6. Bdubzz: Building Connections in Cybersecurity

    APR 22

    Bdubzz: Building Connections in Cybersecurity

    Summary In this episode of the Phillip Wylie Show, Phillip Wylie interviews Bdubzz, a member of the cybersecurity community who shares his journey from a curious child to a professional in application security. Bdubzz discusses the importance of networking, community engagement, and personal branding in the cybersecurity field. He emphasizes the value of volunteering, public speaking, and content creation as ways to grow and connect with others in the industry. The conversation highlights the significance of having a hacker mindset and the opportunities available in Governance, Risk, and Compliance (GRC). Takeaways • Bdubzz has always had a hacker mindset, starting from childhood. • Networking is crucial for job opportunities in cybersecurity. • Volunteering at local events can accelerate community connections. • Public speaking is a skill that improves with practice. • Personal branding is important for visibility in the industry. • Blogging is a foundational step in content creation. • Newcomers to the industry have valuable insights to share. • GRC offers a comprehensive view of cybersecurity practices. • Building friendships in the community can lead to job opportunities. • Being open-minded is essential for learning and mentoring. Sound Bites "Your name is in that person's head." "We all have that one thing in common." "Be consistent in all of that." Chapters 00:00 Introduction to the Cybersecurity Community 01:01 Bdubzz's Hacker Origin Story 03:06 Current Role in Application Security 04:43 Networking and Building Relationships 11:42 Conferences and Community Involvement 14:21 Public Speaking and Personal Growth 18:37 Personal Branding and Content Creation 27:02 The Importance of GRC in Cybersecurity 28:07 Closing Thoughts and Future Aspirations Resources https://www.linkedin.com/in/bbrittwhite/ https://brittwhite.io/

    29 min
  7. Patrick Laverty: Layer 8

    APR 22

    Patrick Laverty: Layer 8

    Summary In this episode of the Phillip Wylie Show, Patrick Laverty shares his unique journey into the cybersecurity field, emphasizing the diverse backgrounds of professionals in the industry. He discusses the importance of foundational skills, networking, and certifications for those looking to break into penetration testing. The conversation also highlights the significance of social engineering and communication skills, as well as the upcoming Layer 8 Conference focused on OSINT and social engineering. Patrick reflects on the value of podcasting as a means to connect with experts and build a personal brand in the cybersecurity community. Takeaways • Many cybersecurity professionals come from non-IT backgrounds. • Building foundational skills is essential before specializing in penetration testing. • Soft skills, such as communication and report writing, are crucial in cybersecurity roles. • Networking can significantly enhance job prospects in the cybersecurity field. • Certifications can help get past HR but proving skills is more important. • Starting a blog can showcase your learning and skills to potential employers. • Coding is helpful for penetration testing but not mandatory. • Social engineering relies heavily on effective communication skills. • The Layer 8 Conference focuses on OSINT and social engineering topics. • Podcasting can be a valuable tool for networking and learning in cybersecurity. Sound Bites "Networking is key to getting hired." "Coding is helpful, but not a requirement." "Always have something to share with others." Chapters 00:00 Introduction to Cybersecurity Journeys 04:53 Diverse Paths into Cybersecurity 09:36 Foundations for Offensive Security 13:10 The Role of Certifications in Cybersecurity 17:05 Social Engineering Skills and Training 18:54 Layer 8 Conference Overview 21:52 The Benefits of Podcasting in Cybersecurity Networking Resources https://www.linkedin.com/in/plaverty9/ https://x.com/plaverty9 https://layer8conference.com/

    31 min
  8. Jeff Caruso: Inside Cyber Warfare

    APR 8

    Jeff Caruso: Inside Cyber Warfare

    Summary In this episode of the Phillip Wylie Show, host Phillip Wylie interviews Jeff Caruso, an expert in cyber warfare and author of a book on the subject. They discuss Jeff's unique background, including his experience in the Coast Guard and his transition into the world of cybersecurity. The conversation delves into the evolution of cyber warfare, the integration of information warfare, and the challenges posed by misinformation. Jeff emphasizes the importance of resilience in cybersecurity and the need for individuals and organizations to prepare for future threats, including the implications of artificial intelligence in this landscape. Takeaways • Jeff Caruso shares his unique hacker origin story. • Cyber warfare has evolved significantly since 2008. • Information warfare is now a critical component of conflict. • Misinformation can easily manipulate public perception. • The importance of resilience in cybersecurity cannot be overstated. • Future threats require proactive preparation and awareness. • AI presents both opportunities and challenges in cybersecurity. • Understanding the threat landscape is essential for defense. • The integration of cyber and physical operations is a new norm. • Individuals should apply common sense to their personal security. Sound Bites • "You can put up the fact, right?" • "We lost an educated population." Chapters 00:00 Introduction to Jeff Caruso 00:56 Jeff's Hacker Origin Story 06:10 Evolution of Cyber Warfare 13:02 The Role of Information Warfare 19:23 The Impact of Misinformation 24:53 Cybersecurity Challenges and Resilience 30:53 Preparing for Future Threats 33:18 AI and Cybersecurity Threats Resources https://www.linkedin.com/in/jeffreycaruso/ Inside Cyber Warfare, 3rd Edition https://www.oreilly.com/library/view/inside-cyber-warfare/9781098138509/

    37 min

Trailers

Ratings & Reviews

4.9
out of 5
17 Ratings

About

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

You Might Also Like

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes, and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada