
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
Episodes
Friday Jul 30, 2021
QuickQ: What is Threat Hunting?
Friday Jul 30, 2021
Friday Jul 30, 2021
In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Valentina Palacín, who you might have heard on HVS Blue season 1. Valentina is an author, public speaker, self-taught developer, and Threat Operations lead at Marqeta Incorporated, armed with a background in translation and interpretation.
Join Chris, Ron and Valentina for this round-table masterclass in all things Threat Hunting to discuss the questions you may be asking yourself:
What is Threat Hunting? How do you become a Threat Hunter? What’s it like to be in the shoes of a Threat Hunter? Or work with one?
Key Takeaways:
0:00 Welcome to the podcast!
1:10 Introduction/ Bio
2:55 What is Threat Hunting?
5:25 Chris’ take on working with a Threat Hunter (Ron)
7:08 Valentina’s Threat Hunting flow
9:18 Ron and Valentina talk about progressions in Threat Intelligence
12:20 The group talks about the ideal characteristics of a Threat Hunter in both junior and senior level positions
18:00 How to get into Threat Hunting
20:55 Get in touch with Valentina!
Valentina Palacín: Book | LinkedIn | Twitter
Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website
Support Hacker Valley Studio on Patreon.
Join our monthly mastermind group via Patreon
Wednesday Jul 28, 2021
Episode 158 - Wild Adventures with Chef Bri Van Scotter
Wednesday Jul 28, 2021
Wednesday Jul 28, 2021
In this episode, Chris, Ron, and their special guest going to be talking about your table. Not the table itself, but what is on it. They are talking about food and following our passions. They've brought in Bri Van Scotter, professional Chef, author, hunter, and host of the TV series Wilderness to Table. Bri is so unbelievably talented in so many areas. Everyone is going to love this episode and learn a little bit about the food we eat.
Key Moments
00:56 - Intro to Bri
02:41 - Bri’s Background
03:59 - The darker side of food production
04:57 - The hunt begins
06:13 - For the love of food
11:41 - On going deep with your craft
16:10 - Getting more in touch with your food
21:33 - Eating for Health
22:52 - Honoring our food sources
25:28 - Knowledge is power
Visit Bri at her website
Follow Bri on Instagram
Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram
Join our monthly mastermind group via Patreon
Visit our friends and sponsor Panther Labs
Thursday Jul 22, 2021
QuickQ: What is Security Architecture?
Thursday Jul 22, 2021
Thursday Jul 22, 2021
Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic.
Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money.
Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )
Key Takeaways:
0:00 - Welcome back to the Hacker Valley Studio
1:10 - Ron's favorite topic! Security Architecture
1:45 - Security architecture is the foundation
2:21 - Where a security architecture starts and stops
4:00 - A security architect is playing a game of Tower Defense
6:27 - Using EASY Framework as a security architect
10:04 - Prerequisites for becoming a security architect
13:55 - Differences between security architect and security engineers
16:55 - Resources for learning more about security architecture
19:21 - Stay in touch with Hacker Valley Studio!
Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram
Join our monthly mastermind group via Patreon
Learn more about our fantastic sponsor Upytcs
Tuesday Jul 20, 2021
Episode 156 - Detection as Code with Nick Hakmiller
Tuesday Jul 20, 2021
Tuesday Jul 20, 2021
In this episode, we speak to a Detection and Response expert! Our guest is Nick Hakmiller, Senior Engineering Manager at Panther Labs.
Nick was first exposed to technology in High School where he took an introduction to Visual Basic programming course. When learning about multi-threaded applications Nick became curious and began exploring how to open too many threads to crash a computer. Throughout Nick’s career he’s maintained an interest and focus on attack techniques and building defensive security programs.
On occasions, security controls may fail to catch an attacker. A detection is logic that is applied to logs, security controls, and alerts to notify teams and automated processes. Nick describes Python as an exceptional programming language to apply detections and create detections as code.
Nick describes many aspects of security as an engineering problem. As organizations transform and adopt new technologies, security issues arise and evolve. Nick describes that the team’s that are most successful with applying detection as code have chosen to view security as a function that engineering should participate in and help solve.
As an organization’s security program matures, Nick mentions that the most impactful detections will likely be written and created by someone within the organization. For instance, creating a detection that defines which users should have access to sensitive data is likely to be created by a member of the organization with knowledge of team structure.
Towards the end of the episode, Nick shares his wisdom to any practitioner that wants to step into the role of creating detections and providing impact while doing so.
Key Takeaways
0:00 - Welcome Back to the Hacker Valley Studio Podcast!
2:29 - Nick Hakmiller, Senior Engineering Manager at Panther Labs
4:20 - How Nick became interested in technology
6:00 - What is a detection?
7:25 - How detection as code applies to cybersecurity and software engineering
10:11 - Prerequisites to consider before applying detection as code
12:27 - Thinking beyond out of the box solutions and applying detections
15:54 - Categories of detections and which are most impactful
23:45 - Reducing alerts by engineering efforts
27:40 - Is it possible to automate everything for security?
32:56 - Advice on getting started with creating detections
Keep in touch with Nick Hakmiller on LinkedIn
Reach out to Nick on Panther’s Community Slack
Stay up to date with Nick’s work by viewing Panther Analysis
Learn more about Panther Labs
Thursday Jul 15, 2021
QuickQ: What is Threat Intelligence?
Thursday Jul 15, 2021
Thursday Jul 15, 2021
Today’s guests are our very own hosts! Ron and Chris. Together they tackle everything that surrounds threat intelligence by answering both the hard and easy questions.
Between the stories they share about past experiences, and the facts behind threat intelligence, you will learn something new, and that’s a promise!
In essence, threat intelligence is taking the information about threats or things that can go wrong and applying it to their network and company. It’s the processing, collection and analyzation of data to understand threat actors, motives, targets and attack behaviors.
Key Takeaways
1:10 Episode starts
2:39 Threat intelligence
3:00 Ron & Chris share what threat intelligence means to them
6:33 Organizations and threat intelligence
8:39 Back in the day
12:54 Benefits of threat intelligence
15:08 Skills needed to be in threat intelligence
19:22 Networking
23:34 E.A.S.Y.
Links:
Email Ron & Chris
Support Hacker Valley Studio on Patreon. Follow Hacker Valley Studio on Twitter.
Follow hosts Ron Eddings and Chris Cochran on Twitter.
