The Audit - Cybersecurity Podcast

IT Audit Labs

Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of the organization.

  1. 6D AGO

    Field Notes: Coffee, Gliders & Trademark Scams

    Ever wonder what the hosts of The Audit talk about when the mics are rolling but the formal interview isn't happening? This Field Notes episode gives you exactly that—unfiltered conversations covering everything from coffee preferences and glider flying to trademark scams targeting cybersecurity professionals.  Nick and Eric dive into Eric's latest aviation adventures (spoiler: gliders are apparently safer than planes with engines), share war stories about scam calls trying to exploit trademark filings, and swap tales about expensive vet visits. Plus, hear some nostalgic cybersecurity stories from the Wild West days when networks ran without firewalls and people could taste peanut butter straight from the jar at grocery stores.  Key Topics:   Eric's glider pilot training and why it's "safer" than powered flight  Trademark registration scams targeting IT professionals  Coffee roasting tips from flight instructors  Cybersecurity nostalgia: Temple University's router-only network  Why Eric kept a scammer on the phone for 5 minutes during pickleball Whether you're here for the cybersecurity insights or just want to know why Nick prefers Diet Coke to Coke Zero, this episode delivers the authentic conversations that happen between industry pros. Don't miss Eric's glider safety argument—it might just change your perspective on risk management.  #cybersecurity #infosec #fieldnotes #aviation #scamcalls #itauditlabs

    25 min
  2. AUG 11

    How CTF Culture Gamifies Your Way to Unbreakable Security Teams

    Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI era.  Whether you're a CISO looking to revolutionize your hiring process, a security professional wanting to level up your skills, or just curious about what happens when cybersecurity meets escape room logic, this episode delivers actionable insights you can implement immediately.  Key Topics Covered:   How Meta CTF's Jeopardy-style competitions work and why they're addictive Real examples of CTF challenges that test critical thinking over pure technical knowledge The shocking rise of AI-assisted interview cheating (and how to spot it)  Why "CTF culture" is becoming the new hiring differentiator for top security teams  Practical tips for using competitions to build team camaraderie and retention How smaller companies can compete with Big Tech for cybersecurity talent Don't let your next hire fool you with AI-generated answers. Learn how CTF competitions reveal the real problem-solvers from the pretenders. Like, share, and subscribe for more cybersecurity hiring secrets that actually work!  #MetaCTF #CybersecurityHiring #CTF #InfoSec #CyberSecurity #AIInterviews #TechRecruiting

    30 min

Ratings & Reviews

5
out of 5
7 Ratings

About

Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad guys do, identifying likelihood and impact, while our security control assessments rank the level of maturity relative to the size of the organization.

You Might Also Like