Phillip Wylie Show

Phillip Wylie
Phillip Wylie Show

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

  1. Jessica Hoffman: Live from Boardwalk Bytes 2025

    5D AGO

    Jessica Hoffman: Live from Boardwalk Bytes 2025

    Summary In this engaging conversation, Phillip Wylie and Jessica Hoffman discuss the importance of community in cybersecurity, sharing insights on networking, hiring practices, and the value of volunteering. Jessica shares her hacker origin story and emphasizes the need for soft skills in the industry. They also explore the significance of mentorship and leadership in advancing careers within cybersecurity, encouraging individuals to seek connections and support in their professional journeys. Takeaways Networking is essential for success in cybersecurity.Community involvement can significantly enhance career opportunities.Hiring managers should prioritize skills and initiative over degrees.Volunteering can open doors and create valuable connections.Soft skills are crucial for effective communication in cybersecurity roles.Mentorship is vital for personal and professional growth.Imposter syndrome is common; everyone experiences it.A diverse network of mentors can provide guidance and support.Being proactive and showing up can lead to unexpected opportunities.Leadership in cybersecurity requires emotional intelligence and support for team members. Sound bites "Networking is your secret weapon." "Forget about the college, right?" "You should have a gang gang of mentors." Chapters 00:00 Community Connections in Cybersecurity 02:10 Jessica Hoffman's Hacker Origin Story 05:08 The Importance of Networking and Community 08:44 Hiring Insights: Skills Over Degrees 11:53 Volunteering: A Pathway to Career Advancement 15:43 Building a Supportive Network 18:27 The Role of Soft Skills in Cybersecurity 22:17 Leadership and Mentorship in Cybersecurity Connect with Jessica! https://www.linkedin.com/in/jessica-hoffman-cissp/

    28 min
  2. Matt Brown: Hardware Hacking & Content Creation

    JUL 7

    Matt Brown: Hardware Hacking & Content Creation

    Episode OverviewJoin host Phillip Wylie as he interviews Matt Brown, a cybersecurity professional, hardware hacker, and successful YouTuber who has grown from zero to over 100,000 subscribers in just two years. This episode dives deep into hardware security, IoT penetration testing, content creation strategies, and the future of cybersecurity careers in the age of AI. Guest BioMatt Brown is a cybersecurity professional specializing in hardware hacking and IoT security. He's the creator of a popular YouTube channel focused on unedited, real-time hardware hacking tutorials. Matt has experience in offensive security, bug bounty hunting, and has won multiple live hacking events, including competitions hosted by Amazon. He holds degrees in IT and computer engineering with a focus on information assurance. Key Topics CoveredHardware Security & IoT HackingGetting started in hardware hacking without expensive equipmentEssential tools and techniques for IoT penetration testingMicrocontroller vs. Linux-based device securityHardware security conference insights from Hardwear.io USAThe growing demand for hardware security professionals Content Creation SuccessHow Matt grew from 0 to 100K+ YouTube subscribers in 2 yearsThe power of unedited, mistake-inclusive contentEquipment setup for hardware hacking videosMonetization through bug bounty opportunitiesBuilding authentic connections with technical audiences Career DevelopmentBreaking into offensive security and penetration testingThe value of diverse technical backgrounds (sysadmin, development, blue team)Academic vs. self-taught paths in cybersecurityWhy communication skills are crucial for pen testersJob market opportunities in hardware security AI and the Future of CybersecurityHow AI tools can enhance rather than replace security professionalsUsing AI for reconnaissance and information gatheringThe importance of critical thinking when using AI toolsCareer advice for staying relevant in an AI-driven world Hacker Origin StoryMatt's journey began in junior high with an electronics and soldering class - an opportunity he notes many people don't have today. His first real introduction to hacking came through a YouTube video demonstrating WEP cracking using a bootable Linux CD. This experience of seeing his home network's Wi-Fi password decrypted sparked his passion for cybersecurity. Connect with Matt BrownYouTube Channel: https://www.youtube.com/ ⁨@mattbrwn⁩ LinkedIn: https://www.linkedin.com/in/mattbrwn/Website: https://brownfinesecurity.com/

    31 min
  3. Matt Toussain: From JAG Aspirations to Cybersecurity

    JUN 30

    Matt Toussain: From JAG Aspirations to Cybersecurity

    Summary In this engaging episode of "The Phillip Wylie Show," host Phillip Wylie welcomes cybersecurity expert Matthew Toussain. Known for his extensive history in the cybersecurity field, Matt opens up about his unconventional career path, from aspiring to be an Air Force lawyer to developing a passion for cybersecurity. This episode covers a multitude of insights into the world of offensive security, open-source development, and vulnerability management, all backed by Matt's diverse experiences and successes in the cybersecurity landscape. Throughout the episode, Matt shares invaluable advice for those entering the offensive security field, highlighting the importance of contributing to open-source projects and understanding key programming languages. He elaborates on his project, SeriousScan, an open-source vulnerability scanner aimed at providing affordable security solutions for mid-cap firms. Discussing the evolving landscape of cybersecurity, Matt emphasizes the impact of artificial intelligence on security practices and development, shedding light on modern strategies to secure environments against potential threats. Listeners are treated to an in-depth look at the significance of vulnerability management and how organizations can optimize their cybersecurity efforts. Takeaways: The advanced capabilities of modern AI tools enable them to understand programming languages like TypeScript, Golang, and Python significantly better than others. The podcast discusses the importance of vulnerability management, emphasizing that organizations must actively manage vulnerabilities to prevent exploitation. Penetration testing provides a crucial opportunity to not only identify vulnerabilities but also to understand the context and potential risks associated with them. Listeners are encouraged to leverage real-world examples and case studies to justify security budgets and improve vulnerability management programs. The conversation highlights the significance of hands-on experience and practical application in learning cybersecurity skills, particularly through capture-the-flag competitions. The necessity of open-source contributions is reiterated as a vital avenue for aspiring cybersecurity professionals to demonstrate their skills and commitment to the field. Resources: https://www.linkedin.com/in/matthew-toussain/ https://www.linkedin.com/company/open-security/ https://opensecurity.com/ https://sirius.publickey.io/

    47 min
  4. Kevin Woods: Why Companies MUST Invest in Junior Cyber Talent

    JUN 24

    Kevin Woods: Why Companies MUST Invest in Junior Cyber Talent

    Summary In this episode of the Phillip Wylie Show, Kevin Woods from GuidePoint Security shares his unique journey into cybersecurity, emphasizing the importance of community support, hands-on experience, and investing in entry-level talent. He discusses the various paths one can take in the cybersecurity field, the value of certifications, and the role of education in preparing individuals for careers in this industry. The conversation highlights the need for companies to take risks on junior talent and the significance of providing opportunities for growth and development in cybersecurity. Takeaways • Kevin Woods transitioned from a biology background to cybersecurity through military service. • Community support plays a crucial role in career development in cybersecurity. • Investing in entry-level talent can yield long-term benefits for companies. • Hands-on experience is essential for success in cybersecurity roles. • There are various paths in cybersecurity beyond just pen testing. • Certifications can help demonstrate foundational knowledge to employers. • Boot camps can be beneficial, but research is necessary to find quality programs. • Passion for cybersecurity can be showcased through personal projects and contributions. • Companies need to take risks on junior talent to address the skills gap in the industry. • Education must evolve to meet the demands of the cybersecurity landscape. Sound Bites "Education is key for our success." "We have to invest in people." Chapters 00:00 Introduction to Cybersecurity Journeys 02:28 Kevin's Unique Path to Cybersecurity 05:27 The Importance of Community and Support 07:50 Investing in Entry-Level Talent 09:47 The Role of Education in Cybersecurity 11:05 Exploring Different Cybersecurity Roles 13:13 Hands-On Experience vs. Theory 17:17 Finding Your Passion in Cybersecurity 20:01 Showcasing Skills on LinkedIn 21:46 The Value of Certifications 23:48 Boot Camps: Pros and Cons 27:25 Encouraging Risk-Taking in Hiring 29:21 The Future of Cybersecurity Careers Resources https://www.linkedin.com/in/krwoods/

    33 min
  5. From Military to Cybersecurity: John Rodriguez on Mentorship, Ransomware, and Building Resilient Defenses

    JUN 17

    From Military to Cybersecurity: John Rodriguez on Mentorship, Ransomware, and Building Resilient Defenses

    The Phillip Wylie Show episode featuring John Rodriguez from Cyber Dagger: 🔍 Episode Summary: In this episode of The Phillip Wylie Show, cybersecurity expert John Rodriguez, founder of Cyber Dagger, shares his inspiring journey from the military to launching a cybersecurity company. John dives into the critical challenges faced by educational institutions and nonprofits, the growing threat of ransomware, and why a holistic security strategy is vital. He emphasizes the power of mentorship, community service, and continuous hands-on learning in shaping the next generation of cybersecurity professionals. This conversation is packed with real-world insights, career tips, and practical approaches to improving cyber defenses. ✅ Key Takeaways: Giving back through cybersecurity strengthens communities and builds talent pipelines.Diverse backgrounds, like military service, offer valuable skills for cyber careers.Schools and nonprofits are prime targets for ransomware and must prioritize security.Mentorship and guidance are essential to developing future cyber leaders.Adversarial thinking is crucial for effective red teaming and threat response.Building in-house tools and platforms can greatly improve cyber resilience.Don’t rush—take time to master the fundamentals and stay curious. 🎧 Memorable Sound Bites: "It's important that we stay together.""Don't rush through it.""Leave it better than what you found it." 🕒 Episode Chapters: 00:00 – Intro to John Rodriguez & Cyber Dagger 02:22 – From Military to Cybersecurity 04:45 – Mentorship's Role in Cybersecurity 07:05 – Securing K–12 and Nonprofits 09:31 – Ransomware Realities in Education 12:16 – Why Incident Response Matters 15:48 – Pen Testing vs. Incident Response 18:18 – Real-World Testing in Cybersecurity 21:38 – Role of EDR & Security Platforms 24:53 – Military Influence on Cyber Strategy 27:49 – Holistic Security: Why It Matters 31:05 – Building In-House Security Tools 36:09 – Career Advice for Aspiring Pros 41:15 – The Power of Mentorship & Community 🔗 Resources & Links: Connect with John Rodriguez: LinkedInLearn more about Cyber Dagger: Website | LinkedIn

    49 min
  6. Dan DeCloss: The Evolution of Cybersecurity

    JUN 11

    Dan DeCloss: The Evolution of Cybersecurity

    Summary In this episode of the Phillip Wylie Show, host Phillip Wylie speaks with Dan DeCloss, founder of PlexTrac, about his journey in cybersecurity, the evolution of pen testing, and the challenges faced in the industry. Dan shares his hacker origin story, insights on recruiting talent, and the inspiration behind PlexTrac, a tool designed to streamline the pen testing reporting process. They discuss the future of cybersecurity, including the role of AI and the importance of community engagement in recruiting talent. Takeaways • Dan DeCloss has over 20 years of experience in cybersecurity. • PlexTrac aims to simplify the pen testing reporting process. • Networking is crucial for breaking into cybersecurity. • BSides events are great for recruiting talent. • The cybersecurity landscape has evolved significantly over the years. • AI is becoming increasingly important in cybersecurity tools. • Pen testing is not just about finding vulnerabilities but also about effective reporting. • Community engagement is vital for talent acquisition in cybersecurity. • PlexTrac was inspired by the challenges of report writing in pen testing. • The future of PlexTrac includes enhanced features and AI integration. Sound Bites "I feel like we truly helped the industry." "AI is going to help our customers." "We do have a free trial." Chapters 00:00 Introduction to PlexTrac and Dan DeCloss 03:01 Dan's Hacker Origin Story 07:19 Evolution of Cybersecurity and Pen Testing 13:39 Types of Pen Testing and Experience 16:31 Advice for Aspiring Pen Testers 20:33 Recruiting Talent in Cybersecurity 23:13 Inspiration Behind PlexTrac 30:10 Future Roadmap for PlexTrac Resources https://www.linkedin.com/in/ddecloss/ https://www.linkedin.com/company/plextrac/ Try PlexTrac Core for Free

    37 min
  7. Ashley Sequeira: The Importance of Community in Cybersecurity

    JUN 10

    Ashley Sequeira: The Importance of Community in Cybersecurity

    Summary In this episode of the Phillip Wylie Show, Ashley Sequeira shares her journey into cybersecurity, discussing her new role at Census, her hacker origin story, and the importance of community and networking in the field. She provides valuable advice for those looking to break into cybersecurity, emphasizing the need for persistence, mentorship, and the significance of understanding the geopolitical context in security research. Ashley also delves into her research on streaming devices and the importance of community involvement in the cybersecurity space. Takeaways • Ashley started her career in music and martial arts before pivoting to IT and cybersecurity. • Networking and mentorship are crucial for career advancement in cybersecurity. • Persistence is key; many rejections can lead to success. • Community involvement can accelerate your career and connections. • Research in cybersecurity can benefit from understanding geopolitical contexts. • Security research can be approached from various angles, not just technical. • Volunteering in the community can lead to valuable connections and opportunities. • Reading and self-education are essential for getting started in security research. • The cybersecurity community is supportive and fosters lifelong friendships. • Foundational knowledge in IT and networking is vital for success in cybersecurity. Sound Bites "This is where I'm supposed to be." "Community is everything." "I was in that Google video!" Chapters 00:00 Introduction to Cybersecurity Community 04:51 Hacker Origin Stories and Career Advice 11:21 Research on Hardware Security Risks 16:56 The Importance of Community in Cybersecurity Resources https://www.linkedin.com/in/ashleyars/

    27 min
  8. Eric Cole: From CIA to Cybersecurity

    JUN 3

    Eric Cole: From CIA to Cybersecurity

    Summary In this episode of the Phillip Wylie Show, Dr. Eric Cole shares his journey from a computer science student to a cybersecurity expert with a rich history at the CIA. He discusses the importance of personal branding in the cybersecurity field, the transition from offensive to defensive security, and the need for CISOs to be recognized as chief officers within organizations. Eric emphasizes the significance of teaching and contributing to the cybersecurity community while also addressing the challenges posed by misinformation and the evolving landscape of technology. Takeaways • Personal branding can significantly enhance your career opportunities. • Eric Cole's journey into cybersecurity began with a CIA internship. • The transition from offensive to defensive cybersecurity is crucial. • Teaching is a natural progression for those passionate about cybersecurity. • CISOs should be recognized as chief officers, not just technical roles. • Cybersecurity is fundamentally a business problem that requires risk management. • Building a personal brand in cybersecurity is essential for visibility. • Embracing technology is vital for modern cybersecurity practices. • Data quality and correlation are more pressing issues than data storage. • Cybersecurity professionals must adapt to the evolving technological landscape. Sound Bites "CISO role is broken in most companies." "Embrace technology, don't fight it." "Don't think of cybersecurity as a roadblock." Chapters 00:00 Introduction to Personal Branding in Cybersecurity 01:11 Eric Cole's Hacker Origin Story 09:44 Transitioning from CIA to Cybersecurity Leadership 14:54 The Importance of Experience Over Pay 20:11 Misinformation and Data Quality Issues 24:36 The Role of the CISO in Modern Organizations 30:24 Building a Strong Personal Brand 32:42 Embracing Technology in Cybersecurity Resources https://www.linkedin.com/in/ericcole1/ https://secure-anchor.com/

    35 min

Trailers

Ratings & Reviews

4.9
out of 5
17 Ratings

About

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

You Might Also Like

To listen to explicit episodes, sign in.

Stay up to date with this show

Sign in or sign up to follow shows, save episodes, and get the latest updates.

Select a country or region

Africa, Middle East, and India

Asia Pacific

Europe

Latin America and the Caribbean

The United States and Canada