PodcastsBusinessSimply Defensive

Simply Defensive

Simply Cyber Media Group
Simply Defensive
Latest episode

42 episodes

  • Simply Defensive

    S6E2: John Hammond on Security Research, Storytelling, Deception, and Getting Hired in Cybersecurity

    2026/03/17 | 39 mins.
    John Hammond on Security Research, Storytelling, and Deception for Defenders
    In this Simply Defensive episode, hosts Josh Mason and Wade Wells interview John Hammond, a Huntress security researcher, YouTuber, and educator, about his career path and defensive research. Hammond explains he has never worked as a penetration tester, SOC analyst, or detection engineer, instead โ€œfalling intoโ€ security research through hands-on Capture the Flag work and building cyber threat emulation course content, earning Offensive Securityโ€™s OSCE3 bundle recognition. He discusses why storytelling and communication are critical for translating attacker tradecraft into actionable defenses, emphasizing understanding the attack chain to identify places to break it. He recommends building a public portfolio of write-ups and notes, and says multiple creators covering the same topic can still provide value through different explanations. The conversation also highlights endpoint deception and honeypots, challenges of reversing compiled binaries versus script-based malware, and his advice to document thoroughly in shared organizational knowledge bases.
    00:00 S6E2: John Hammond on Security Research, Storytelling, Deception, and Getting Hired in Cybersecurity
    01:27 Meet John Hammond
    01:57 Security Researcher Life
    04:43 OffSec Certs Explained
    06:55 From CTF to Research
    08:47 Storytelling in Cyber
    12:10 Turning Attacks to Defense
    15:19 Getting Hired as Researcher
    16:48 Portfolio and Honeypots
    19:05 Make the Video Anyway
    21:40 Alternate Data Streams Nerdout
    23:36 CTFs Then and Now
    24:28 Life Shifts Priorities
    25:44 Beyond CTFs Next Trend
    26:52 Deception Meets Detection
    28:48 Honeypots and Program Maturity
    31:13 Malware Reversing Boss Fights
    35:09 Blue Team Advice Document Everything
    37:51 Where to Find John and Training
    38:49 Wrap Up and Farewell
  • Simply Defensive

    From Blue Team Challenges to AI Innovations: A Conversation with Jason Haddix

    2026/02/24 | 31 mins.
    In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Jason Haddix โ€” CISO veteran, AI security thought leader, and founder of Arcanum Information Security โ€” for a wide-ranging conversation on where AI is actually headed in cybersecurity, and what blue teamers need to know right now.
    Jason shares what he's learned from running AI scaling assessments inside major enterprises, why most organizations are still in the early stages of AI adoption, and how the industry needs to stop thinking about AI security like traditional web app security. He breaks down the stages of AI adoption (from custom bots to agents), explains why input validation is a losing game for LLM security, and makes the case for classifiers, guardrails, and LLM-based routing as the real defense-in-depth play for AI systems.
    Wade and Jason also revisit the Red Blue Purple AI course, talk through how RAG and context engineering are transforming what's possible for blue teamers, and discuss why the credential leakage problem is still one of the biggest vectors defenders aren't taking seriously enough.
    Topics covered:
    Why CTI struggles to prove value โ€” and where it actually matters most
    Stealer logs, credential leakage, and when rolling an account isn't enough
    AI adoption stages: custom bots โ†’ RAG โ†’ agents
    Why SOAR skepticism is a preview of AI hesitancy
    Context engineering vs. prompt engineering
    Defending AI systems: prompt-level protections, classifiers, guardrails, and LLM routing
    When does a prompt become IP?
    Jason's advice for blue teamers: embrace AI as a tool, find your annoying tasks, and start chipping away
    Connect with Jason Haddix:
    Twitter/X: @jhaddix
    Arcanum Information Security: arcanam-sec.com
    GitHub (free tools & resources): ARCanum Information Security on GitHub
    Newsletter: Executive Offense by Jay Haddix
    Resources mentioned:
    Red Blue Purple AI Course (ARCanum)
    Flare (threat intelligence / credential monitoring): flare.io
    Detections.ai
    Connect with the Hosts:
    Josh Mason: linkedin.com/in/joshuacmason
    Wade Wells: linkedin.com/in/wadingthrulogs
  • Simply Defensive

    From Pre-Law to FLARE: How Josh Stroschein Became Google's Malware Analyst

    2025/12/01 | 39 mins.
    In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein โ€” aka The Cyber Yeti โ€” a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world.

    Josh shares his unconventional path through .NET development, credit card processing security, and academia before landing at Google. He opens up about teaching reverse engineering while learning it himself, building educational CTFs, and the realities of making it as a full-time reverse engineer in an industry where those roles are rare.

    What you'll hear:
    ๐Ÿ”น From pre-law to pilot training to PhD in cybersecurity
    ๐Ÿ”น How teaching RE forced him to truly master it
    ๐Ÿ”น Life inside Google's FLARE team (via Chronicle โ†’ Mandiant)
    ๐Ÿ”น Flareon CTF โ€” the RE challenge that's run for 12 years
    ๐Ÿ”น A wild Black Hat NOC story involving an infected Mac and Atomic Stealer
    ๐Ÿ”น Using AI to build malware samples for training labs
    ๐Ÿ”น Why going low-level is the best advice for blue teamers

    Chapters:
    00:00 Introduction and Welcome
    00:50 Josh's Connection to Dr. Gerald Auger
    02:00 The Non-Traditional Path: Pre-Law, Pilot Training & .NET Dev
    05:00 Getting Into Security at a Credit Card Processor
    07:00 Teaching Reverse Engineering at Dakota State
    10:00 Flareon CTF and Educational CTF Design
    14:00 Is Reverse Engineering Offensive or Defensive?
    17:00 How Rare Are Full-Time RE Roles?
    21:00 The Path to Google: Chronicle, Mandiant & FLARE
    25:00 Learning Through Teaching and YouTube Content
    28:00 Black Hat NOC Story: Catching Atomic Stealer Live
    33:00 Using AI to Create Malware Training Samples
    37:00 Building a Defang Tool (and .NET Nightmares)
    40:00 Advice for Blue Teamers: Go Low-Level

    ๐ŸŽง Find Josh Stroschein:
    โ†’ Website: https://www.thecyberyeti.com
    โ†’ YouTube: The Cyber Yeti
    โ†’ Podcast: The Cyber Yeti Podcast

    ๐Ÿ‘ฅ Connect with the Hosts:
    โ†’ Josh Mason: https://www.linkedin.com/in/joshuacmason/
    โ†’ Wade Wells: https://www.linkedin.com/in/wadingthrulogs/
    โ†’ Swimlane: https://www.linkedin.com/company/swimlane

    ๐ŸŽ™๏ธ Listen on Your Favorite Platform:
    โ†’ Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4
    โ†’ Apple Podcasts: https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182
    โ†’ Full Playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4

    ๐Ÿ‘ If you enjoyed this episode, don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.

    =========================
    All the ways to connect with Simply Cyber
    https://SimplyCyber.io/Socials
    =========================
    This podcast is presented by Simply Cyber Media Group
  • Simply Defensive

    Building Zero Trust Tools: Inside ThreatLocker with Product Manager Yuriy Tsibere

    2025/11/24 | 36 mins.
    In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built.

    Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatLocker, he shapes the tools defenders use dailyโ€”from allow listing to compliance automation.

    Episode Highlights:
    What product managers actually do at security companies
    APT attack patterns: social engineering meets technical exploitation
    How allow listing, ring fencing, and network control protect endpoints
    Defense Against Configuration (DAC): automating FedRAMP, HIPAA, and NIST compliance
    Why misconfigurations remain one of the biggest security gaps
    Balancing strict security with real-world usability
    Yuriy's top advice for defenders: Educate your personnel
    Key Takeaway: Most breaches still come from employees clicking without paying attention. Security products matter, but user education accounts for the largest share of issues. Yuriy also emphasizes that when compliance drift happensโ€”when systems become uncompliantโ€”it should trigger an investigation into what changed and why.

    Resources Mentioned:
    ThreatLocker Zero Trust Endpoint Protection
    Defense Against Configuration (DAC) for compliance monitoring
    Zero Trust World Conference
    Perfect for blue teamers, SOC analysts, security engineers, and anyone interested in how security products evolve from concept to deployment.
    Connect with Yuriy Tsibere (Guest) on LinkedIn: https://www.linkedin.com/in/yuriy-tsibere/

    ๐Ÿ”— Links & Resources:
    โ†’ ThreatLocker Free Trial: https://www.threatlocker.com/simplydefensive
    โ†’ Zero Trust World Conference: https://www.intlcybersec.org/zerotrustworldmain

    ๐Ÿ‘ฅ Connect with the Hosts:
    โ†’ Josh Mason: https://www.linkedin.com/in/joshuacmason/
    โ†’ Wade Wells: https://www.linkedin.com/in/wadingthrulogs/
    โ†’ Swimlane: https://www.linkedin.com/company/swimlane

    ๐ŸŽ™๏ธ Listen on Your Favorite Platform:
    โ†’ Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4
    โ†’ Apple Podcasts: https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182
    โ†’ Full Playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4

    ๐Ÿ‘ If you enjoyed this episode, don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.

    ๐Ÿ’ก Brought to you by ThreatLocker โ€“ Secure your business with zero trust application control. https://www.threatlocker.com/simplydefensive

    =========================
    Sponsored by @ThreatLocker - Free 30-day trial visit:
    https://www.threatlocker.com/simplydefensive
    =========================
    All the ways to connect with Simply Cyber
    https://SimplyCyber.io/Socials
    =========================
    This podcast is presented by Simply Cyber Media Group
  • Simply Defensive

    Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident

    2025/11/17 | 32 mins.
    From teaching AP art history to brokering cyber insurance deals. ๐ŸŽ“โžก๏ธ๐Ÿ›ก๏ธ

    In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Andy Runyan from Yukon to break down everything blue teamers need to know about cyber insurance โ€” before an incident happens. Andy shares his unconventional journey from fourth-generation educator and baseball coach to becoming a cyber insurance specialist, and explains why understanding your policy is just as important as your incident response plan.

    What you'll hear:
    ๐Ÿ”น How cyber insurance actually works (and what it doesn't cover)
    ๐Ÿ”น Why having an incident response retainer matters โ€” before you need it
    ๐Ÿ”น The role of cyber insurance in incident response and recovery
    ๐Ÿ”น Third-party contract requirements and state mandates on the rise
    ๐Ÿ”น Common mistakes companies make when filing claims
    ๐Ÿ”น FTC Safeguard Rules and what they mean for businesses
    ๐Ÿ”น How to prepare your organization for cyber insurance requirements
    ๐Ÿ”น What lowers premiums (and what should, but doesn't)

    Why This Matters for Blue Teamers:
    If you're in a SOC or handling incident response, you will interact with cyber insurance at some point. Understanding how policies work, what triggers coverage, and how to prepare can make the difference between a smooth recovery and a catastrophic financial loss. This episode gives you the insider knowledge to help your organization be ready.

    โฑ๏ธ Timestamps:
    00:00 Introduction and Welcome
    00:15 Andy's Unique Background: From Teacher to Cyber Insurance
    03:00 Getting Into Cyber Insurance in 2019
    04:00 The Wild West of Cyber Insurance During COVID
    06:00 When Companies Actually Buy Cyber Insurance
    08:00 What Blue Teamers Need to Know About Insurance
    10:00 The Problem with Incident Response Retainers
    12:00 How Insurance Companies Handle IR vs. What You Need
    15:00 Multi-Factor Authentication and Premium Discounts
    18:00 Why Having an IR Plan Doesn't Lower Your Premium (But Should)
    21:00 Third-Party Contract Requirements on the Rise
    24:00 State Mandates: What's Coming Next?
    27:00 FTC Safeguard Rules and Compliance Reality
    30:00 Where to Learn More About Yukon

    ๐Ÿ”— Connect with Andy Runyan:
    โ†’ Yukon Website: https://www.ukon.com
    โ†’ LinkedIn: https://www.linkedin.com/in/andy-runyan
    โ†’ Email: [email protected]

    ๐Ÿ‘ฅ Connect with the Hosts:
    โ†’ Josh Mason: https://www.linkedin.com/in/joshuacmason/
    โ†’ Wade Wells: https://www.linkedin.com/in/wadingthrulogs/
    โ†’ Swimlane: https://www.linkedin.com/company/swimlane

    ๐ŸŽ™๏ธ Listen on Your Favorite Platform:
    โ†’ Spotify: https://open.spotify.com/show/72QTocT5FSTSPV7o1UcMS4
    โ†’ Apple Podcasts: https://podcasts.apple.com/us/podcast/simply-defensive/id1773806182
    โ†’ Full Playlist: https://youtube.com/playlist?list=PL4Q-ttyNIRAr6DVrsASx1-Fv-TsooJ3M4

    ๐Ÿ‘ If you enjoyed this episode, don't forget to like, subscribe, and share with your fellow defenders. Every week, Josh Mason and Wade Wells bring you practical, no-fluff conversations with cybersecurity professionals who are doing the work.

    =========================
    Sponsored by @ThreatLocker - Free 30-day trial visit:
    https://www.threatlocker.com/simplydefensive
    =========================
    All the ways to connect with Simply Cyber
    https://SimplyCyber.io/Socials
    =========================
    This podcast is presented by Simply Cyber Media Group

More Business podcasts

About Simply Defensive

Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in as we discuss the latest threats, emerging technologies, and best practices for protecting your organization from cyberattacks. ========================= Connect with your hosts: Josh Mason: https://www.linkedin.com/in/joshuacmason Wade Wells: https://www.linkedin.com/in/wadingthrulogs ========================= Simply Cyber empowers people who want a rewarding cybersecurity career ๐Ÿ’ช ========================= ========================= All the ways to connect with Simply Cyber https://SimplyCyber.io/Socials =========================
Podcast website

Listen to Simply Defensive, She's So Lucky and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Simply Defensive: Podcasts in Family

Social
v8.8.10| ยฉ 2007-2026 radio.de GmbH
Generated: 4/15/2026 - 12:37:39 PM