Phillip Wylie Show

Phillip Wylie
Phillip Wylie Show

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

  1. STÖK: Hacking, Content Creation, and Good Vibes

    5 NGÀY TRƯỚC

    STÖK: Hacking, Content Creation, and Good Vibes

    Summary In this episode of the Phillip Wylie Show, Stök shares his journey from a technical background in infrastructure to becoming a successful bug bounty hunter and content creator. He emphasizes the importance of communication skills in the cybersecurity field, offers tips for aspiring content creators, and discusses the significance of building a personal brand. Stök also highlights the need for balance in life, the value of understanding target needs in bug bounty hunting, and the challenges of dealing with online criticism. Takeaways • Stök transitioned from infrastructure to web hacking. • Communication skills are crucial in bug bounty reporting. •Content creation can open many professional doors. • Being authentic helps in building a personal brand. • Understanding the target's needs is key in bug bounty. • Balancing hobbies with work is essential for mental health. • Starting with simple tools is enough for bug bounty beginners.• Automation should aid, not replace manual testing. • Building a personal brand requires consistency and authenticity. • Online criticism is common; focus on constructive feedback. Chapters 00:00 Introduction to Stök and His Journey 01:21 The Allure of Bug Bounty Hunting 06:15 Stök 's Technical Background and Transition to Web Hacking 08:32 The Path to Bug Bounty: A Personal Story 13:48 The Importance of Communication in Bug Bounty 16:57 Content Creation Tips and Building a Personal Brand 22:22 Dealing with Criticism and Haters 29:04 Building an Authentic Personal Brand 32:04 The Importance of Hobbies and Balance 35:39 Getting Started in Bug Bounty Hunting Resources https://www.linkedin.com/in/fredrikalexandersson/ https://x.com/stokfredrik https://www.stokfredrik.com/

    43 phút
  2. Celina Stewart: Demystifying Cyber Risk Management

    31/12/2024

    Celina Stewart: Demystifying Cyber Risk Management

    Summary In this episode of the Phillip Wylie Show, Celina Stewart, Directory of Cyber Risk Management at Neuvik, discusses her journey in cybersecurity, focusing on the often-overlooked area of risk management. She emphasizes the importance of translating technical cybersecurity insights into business language, the need for diverse career paths in the field, and the value of education and certifications. The conversation also covers frameworks for effective risk management, the challenges faced in the industry, and the importance of communication between technical and non-technical teams. Takeaways Risk management is essential for understanding business impact. There is a significant divide between offensive security and risk management. Non-technical skills can be valuable in cybersecurity roles. Understanding risk can enhance communication with executives. Education and certifications are important for a career in risk management. Familiarity with NIST frameworks is crucial for risk management professionals. Risk quantification is a specialized skill that is in demand. Effective communication is key to translating technical findings for business leaders. Mindset shifts are necessary for executives to embrace risk management. There are numerous opportunities for diverse backgrounds in cybersecurity. Sound Bites "Risk management is crucial in cybersecurity." "Communication is key in risk management." "Mindset shifts are needed in risk management." Resources https://www.linkedin.com/in/celina-r-stewart/ https://neuvik.com/

    30 phút
  3. SquareX CISO Series: David Malicoat & Vivek Ramachandran

    25/12/2024 · NỘI DUNG TẶNG THÊM

    SquareX CISO Series: David Malicoat & Vivek Ramachandran

    Summary In this episode, Phillip Wylie engages with David Malicoat and Vivek Ramachandran to discuss the evolving role of the Chief Information Security Officer (CISO) in today's cybersecurity landscape. They explore the unique challenges faced by CISOs, particularly in the context of direct marketing and data protection, the impact of AI and automation on security practices, and the limitations of traditional security solutions. The conversation also delves into the future challenges for CISOs and the importance of adapting to new threats in an increasingly digital world. Takeaways David Malicoat emphasizes the importance of understanding threats in the context of specific tools. The browser is becoming a critical endpoint for security measures. CISOs need to identify and address vulnerabilities among users. AI and automation are essential for scaling security efforts. Traditional security solutions often fall short in addressing modern threats. The demand for effective cybersecurity solutions is continuously increasing. CISOs must prioritize application security (AppSec) in their strategies. There is a need for better visibility into user behavior and security risks. The uptake of SASE solutions has not met expectations in the industry. Future cybersecurity strategies must focus on browser security and threat detection. Sound Bites "The uptake on SASE just hasn't been there." "I need to understand how that threat looks." "We need to make AppSec a priority." Chapters 00:00 Introduction to the CISO Perspective 09:38 The Journey into Cybersecurity and Podcasting 13:52 Challenges in Direct Marketing and Data Protection 18:46 Addressing Browser-Based Vulnerabilities 22:09 Enhancing Security Awareness Training 23:13 AI and Automation in Cybersecurity 26:36 Navigating Risks with AI Tools 27:33 Browser DLP: A New Approach to Security 31:23 Limitations of Traditional Security Solutions 32:27 The Evolution of Secure Web Gateways 35:53 Architectural Vulnerabilities in Web Security 40:00 Challenges Faced by CISOs 41:43 Future Directions for Square X and Browser Security Resources Get your free Chrome plugin: ⁠⁠⁠http://sqrx.io/pw_x⁠⁠⁠ ⁠⁠⁠https://www.linkedin.com/company/getsquarex/⁠⁠⁠ ⁠⁠⁠https://twitter.com/getsquarex⁠⁠⁠ ⁠⁠⁠https://www.instagram.com/getsquarex/ https://www.linkedin.com/in/david-malicoat-cissp/ https://www.theprofessionalciso.com/ https://www.linkedin.com/in/vivekramachandran/

    46 phút
  4. SquareX CISO Series: Robert Pace & Vivek Ramachandran

    24/12/2024 · NỘI DUNG TẶNG THÊM

    SquareX CISO Series: Robert Pace & Vivek Ramachandran

    Summary In this episode, Phillip Wylie engages with Robert Pace and Vivek Ramachandran to discuss the evolving landscape of cybersecurity, particularly focusing on browser security, fraud prevention in real estate, and the challenges posed by remote work and BYOD policies. They emphasize the importance of education, transparency, and innovative solutions in addressing security threats. The conversation also highlights the need for organizations to adapt to new technologies and approaches to effectively manage risks and protect their assets. Takeaways Education is crucial for residents to understand security risks. Risks and vulnerabilities are universal across industries. The browser has become the primary endpoint for security. Traditional security measures may not address modern threats. BYOD policies need to be flexible and secure. Transparency in security solutions builds trust with users. Organizations must adapt to the evolving threat landscape. Effective communication with vendors is essential for security. Policy-based access control can streamline security processes. User-centric policies can enhance security without hindering productivity. Sound Bites "Risks do not discriminate." "The browser is the new endpoint." "We need to manage risk intelligently." Chapters 00:00 Introduction and Backgrounds 03:29 Cybersecurity Landscape and Education 06:45 Fraud Prevention in Real Estate 09:39 Transparency in Security Solutions 12:32 Understanding Industry-Specific Threats 15:41 The Role of EDR and Browser Security 18:33 BYOD and Remote Work Policies 27:19 Dynamic Policy Management in Cybersecurity 37:17 The Future of Browser Security 46:28 Innovations in Security Solutions for 2025 Resources Get your free Chrome plugin: ⁠⁠⁠http://sqrx.io/pw_x⁠⁠⁠ ⁠⁠⁠https://www.linkedin.com/company/getsquarex/⁠⁠⁠ ⁠⁠⁠https://twitter.com/getsquarex⁠⁠⁠ ⁠⁠⁠https://www.instagram.com/getsquarex/ https://www.linkedin.com/in/robert-pace097/ https://www.linkedin.com/in/vivekramachandran/

    53 phút
  5. Int Eighty of Dualcore: Hack All The Things

    23/12/2024

    Int Eighty of Dualcore: Hack All The Things

    Summary In this episode of the Phillip Wylie Show, Int Eighty from Dualcore shares insights into his journey in cybersecurity and music. He discusses the evolution of bug bounty programs, the importance of hands-on experience in cybersecurity education, and his personal hacker origin story. Int Eighty also delves into red teaming, physical pentesting, and career hacking strategies for aspiring professionals. He emphasizes the significance of leveraging AI in cybersecurity and shares his experiences as a musician in the hacking community. Takeaways Int Eighty has performed at various cybersecurity events, including Nolacon and Bugcrowd events. Bug bounty programs have evolved to provide opportunities for hackers globally. Hands-on experience is crucial in cybersecurity education, often lacking in traditional university settings. Int Eighty's hacker origin story began with creative problem-solving as a child. Red teaming involves finding vulnerabilities without causing actual damage to the business. Physical pentesting can be approached creatively, often involving social engineering. Building a portfolio through free projects is essential for career advancement in cybersecurity. Avoiding burnout involves optimizing work schedules and understanding personal productivity patterns. AI can be leveraged to enhance productivity and efficiency in cybersecurity tasks. Dualcore combines Int Eighty's passion for hacking with his love for music, creating a unique niche. Sound Bites "I prefer to sit at home." "I just like computers." "Hack all the things." Chapters 00:00 Introduction to Dualcore and Live Performances 03:44 The Evolution of Bug Bounty Programs 06:20 The Role of Education in Cybersecurity 09:38 Hacker Origin Stories 12:22 Red Teaming and Offensive Security 15:39 Physical Pen Testing Experiences 24:32 The Art of Red Teaming 28:25 Career Hacking: Getting Your Foot in the Door 32:18 Optimizing Work and Avoiding Burnout 36:23 Leveraging AI in Red Teaming 41:26 The Intersection of Hacking and Music Resources https://x.com/int0x80 https://t.co/myhSQyweOp https://github.com/int0x80 https://inteighty.bandcamp.com/album/loyalty-2

    48 phút
  6. Lauren Lynch: Cybersecurity Marketing Professional

    17/12/2024

    Lauren Lynch: Cybersecurity Marketing Professional

    Summary In this episode of the Phillip Wylie Show, host Phillip Wylie welcomes Lauren Lynch, a marketing professional and podcast producer, to discuss her journey into the world of marketing and podcasting. They explore the evolution of podcasting, the importance of video content, and the growth of HOU.SEC.CON, a cybersecurity conference that emphasizes community engagement and accessibility. Lauren shares insights on how to get started in podcasting and content creation, highlighting the low-cost opportunities available for aspiring creators. The conversation also touches on the significance of quality content in conferences and the collaborative efforts behind HOU.SEC.CON's success. Takeaways Lauren Lynch shares her unexpected journey into marketing. Podcasting is a low-cost way to disseminate information. The importance of video content in modern podcasting. Community engagement is key to successful conferences. Quality content is essential for attracting attendees. HOU.SEC.CON has seen significant growth in attendance. Accessibility in conferences helps include more participants. Aspiring podcasters should leverage free resources to learn. Networking and community involvement can lead to job opportunities. The balance between vendor sponsorship and quality content is crucial. Sound Bites "I think we've seen that over and over again." "We grew our audience by 46% in that first year." "We blew past that really quick." Chapters 00:00 Introduction to the Podcast and Guest 06:32 The Evolution of Podcasting and Content Creation 14:32 Getting Started in Content Creation and Marketing 25:03 Accessibility and Community Engagement in Conferences Resources https://www.linkedin.com/in/laurenandruslynch/ https://www.linkedin.com/company/houseccon/ http://houstonseccon.org/

    28 phút
  7. John Hammond: New Frontiers in Cybersecurity Education

    10/12/2024

    John Hammond: New Frontiers in Cybersecurity Education

    Summary In this episode of the Philip Wylie Show, host Phillip Wylie interviews cybersecurity expert John Hammond. They discuss John's journey into hacking, the importance of Capture the Flag competitions, and the value of training and certifications in cybersecurity. John shares insights about his new educational platform, Just Hacking Training, and emphasizes the role of content creation in advancing one's career in the cybersecurity field. The conversation highlights the collaborative nature of cybersecurity education and encourages listeners to share their knowledge and experiences. Takeaways John Hammond's journey into cybersecurity began with a passion for video games and hacking. Capture the Flag competitions provide valuable skills that are applicable in real-world scenarios. Training resources for penetration testing are abundant and accessible online. Just Hacking Training aims to provide free and affordable cybersecurity education. Collaboration with other experts enhances the quality of educational content. Certifications can help beginners get their foot in the door in cybersecurity. The OSCP certification is highly regarded in the penetration testing community. Content creation can significantly impact career opportunities in cybersecurity. Sharing knowledge and experiences is crucial for community growth in cybersecurity. Continuous learning and adaptation are essential in the ever-evolving field of cybersecurity. Sound Bites "CTF is more difficult than real world." "Building up free accessible training." "It's a buffet assortment of training." Chapters 00:00 Introduction to John Hammond 01:36 John's Hacker Origin Story 04:07 The Value of Capture the Flag Competitions 07:08 Training for Aspiring Penetration Testers 09:11 Introducing Just Hacking Training 10:57 Collaborators in Cybersecurity Education 13:24 The Role of Certifications in Cybersecurity 16:55 Navigating Penetration Testing Certifications 19:14 The Impact of Content Creation on Career Growth 23:23 Encouragement for Aspiring Cybersecurity Professionals Resources https://www.linkedin.com/in/johnhammond010/ https://www.youtube.com/@_JohnHammond https://x.com/_JohnHammond https://www.justhacking.com/

    25 phút

Xếp Hạng & Nhận Xét

5
/5
16 Xếp hạng

Giới Thiệu

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

Có Thể Bạn Cũng Thích

Bạn cần đăng nhập để nghe các tập có chứa nội dung thô tục.

Luôn cập nhật thông tin về chương trình này

Đăng nhập hoặc đăng ký để theo dõi các chương trình, lưu các tập và nhận những thông tin cập nhật mới nhất.

Chọn quốc gia hoặc vùng

Châu Phi, Trung Đông và Ấn Độ

Châu Á Thái Bình Dương

Châu Âu

Châu Mỹ Latinh và Caribê

Hoa Kỳ và Canada