POPULARITY
TechSpective Podcast Episode 073 My guest for this episode is my friend Marcus Carey. Marcus is currently an Enterprise Architect at ReliaQuest. He was founder and CEO of ThreatCare–which was acquired by ReliaQuest–and he is the creator of the ‘Tribe of Hackers‘ book series. He is also well known on social media for being a [...] The post Marcus Carey Shares Insight on Getting Started in a Tech or Cybersecurity Career appeared first on TechSpective.
Don't miss out on the next #womenintech podcast episode, get notified by signing up here http://womenintechshow.com. Be featured in the Women in Tech Community by creating your profile here http://womenintechvip.com/“Remix: Jill Dretzka, Jennifer Aldoretta, and Barbary Brunner”#womenintech Show is a WeAreTech.fm production.To support the Women in Tech podcast go to https://www.patreon.com/womenintechTo be featured on the podcast go to http://womenintechshow.com/featureHost, Espree Devorahttps://twitter.com/espreedevorahttps://www.linkedin.com/in/espreeGuest,Jill Dretzkahttps://www.instagram.com/jill_dretzka/https://www.linkedin.com/in/jilldretzka/Guest,Jennifer Aldorettahttps://twitter.com/jaldorettahttps://www.linkedin.com/in/jaldoretta/Guest,Barbary Brunnerhttps://twitter.com/barbaryhttps://www.linkedin.com/in/barbarybrunner/Be featured in the Women in Tech Community by creating your profile here http://womenintechvip.com/In LA? Here's some awesome resources for you to become immersed in the LA Tech scene -For a calendar of all LA Startup events go to, http://WeAreLATech.comGet Podcast Listeners, http://getpodcastlisteners.com/Resources Mentioned:Work & Woof, https://www.workandwoofatx.com/Impact Hub Austin, https://www.impacthubaustin.com/Threatcare, https://www.threatcare.com/Techstars, https://www.techstars.com/Phunware, https://www.phunware.com/Credits:Produced and Hosted by Espree Devora, http://espreedevora.comStory Produced, Edited and Mastered by Cory Jennings, https://www.coryjennings.com/Production and Voiceover by Adam Carroll, http://www.ariacreative.ca/Team support by Janice GeronimoMusic by Jay Huffman, https://soundcloud.com/jayhuffmanShort Title: Jill Dretzka, Jennifer Aldoretta, and Barbary Brunner
According to the Department of Homeland Security, our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.In fact, the global cyber security market size was valued at USD 167.13 billion in 2020 and is expected to register a compounded annual growth rate (CAGR) of 10.9% from 2021 to 2028. This growth can be attributed to the growing sophistication of cyberattacks and the frequency and intensity of cybercrimes that have increased over the last decade and have resulted in huge losses for businesses. As a result, businesses and governments worldwide are channeling their spending to strengthen their in-house security infrastructure, creating a pool of opportunities for industry participants.Join us as we talk to Marcus J. Carey, a cybersecurity advocate and startup founder with more than 25 years of protecting government and commercial sensitive data. Marcus started his cybersecurity career in the U.S. Navy and the National Security Agency (NSA). After his service, Marcus founded a cybersecurity startup Threatcare which he later sold to Reliaquest. Marcus is also the author of Tribe of Hackers, a series of books providing cybersecurity advice from the Best Hackers in the World.Find Marcus on Twitter: @marcusjcareyLinkedin: https://www.linkedin.com/in/marcuscarey/Check out Tribe of Hackers
In this episode of the C3 Podcast I sit down with Marcus Carey and talk about knowing your super power, being like Jay-Z, and the process of writing a book, and of course much more. Meet Marcus: Marcus J. Carey is an Enterprise Architect at ReliaQuest where he does security research and product development. Prior to joining ReliaQuest, Marcus was the founder and CEO at Threatcare (acquired by ReliaQuest) and has 20 years of cybersecurity experience. Marcus has worked in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA.
Brakesec Podcast is now on Pandora! Find us here: https://pandora.app.link/p9AvwdTpT3 Book club Book club is starting up again with Hands-On AWS penetration testing with Kali Linux from Gilbert and Caudill. You read and get together to discuss or demo every Monday. Get the book, start reading and meet us for the kick off Monday the 24 at 10pm eastern. The book club meets virtually on zoom, and organizes on slack..get invited like this.” Book: https://smile.amazon.com/Hands-Penetration-Testing-Kali-Linux/dp/1789136725 NolaCon Training: https://nolacon.com/training/2020/security-detect-and-defense-ttx Roberto Rodriguez Bio @Cyb3rWard0g on Twitter Threat Intel vs. Threat Hunting = what’s the difference? What datasets are you using? Did you start with any particular dataset, or created your own? Technique development - what skills are needed? C2 setup Detection mechanisms Honeypots How can people get involved? Blacksmith - create ‘mordor’ environment to push scripts to setup honeypot/nets https://Threathunterplaybook.com https://github.com/hunters-forge/ThreatHunter-Playbook https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190815181010.html https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4 https://medium.com/threat-hunters-forge/writing-an-interactive-book-over-the-threat-hunter-playbook-with-the-help-of-the-jupyter-book-3ff37a3123c7 https://www.exploit-db.com/exploits/47995 - Sudo buffer overflow Mordor: The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption. YAML Example: https://github.com/hunters-forge/ThreatHunter-Playbook/blob/master/playbooks/WIN-190810201010.yaml Notebook Example: https://threathunterplaybook.com/notebooks/windows/08_lateral_movement/lateral_movement/WIN-190810201010.html Jupyter notebook - Definition: https://jupyter-notebook-beginner-guide.readthedocs.io/en/latest/what_is_jupyter.html Lateral Movement - WMI - IMAGE Below SIGMA? What is a Notebook? Think of a notebook as a document that you can access via a web interface that allows you to save input (i.e live code) and output (i.e code execution results / evaluated code output) of interactive sessions as well as important notes needed to explain the methodology and steps taken to perform specific tasks (i.e data analysis). https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4 Have a goal for expanding to other parts of ATT&CK? Threat Hunter Playbook - Goals Expedite the development of techniques an hypothesis for hunting campaigns. Help Threat Hunters understand patterns of behavior observed during post-exploitation. Reduce the number of false positives while hunting by providing more context around suspicious events. Share real-time analytics validation examples through cloud computing environments for free. Distribute Threat Hunting concepts and processes around the world for free. Map pre-recorded datasets to adversarial techniques. Accelerate infosec learning through open source resources. Sub-techniques: https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a Slack Channel: https://launchpass.com/threathunting Twitter; https://twitter.com/mattifestation https://twitter.com/tifkin_ https://twitter.com/choldgraf https://twitter.com/Cyb3rPandaH on Brakeing Down Security Podcast on #Pandora- https://www.pandora.com/podcast/brakeing-down-security-podcast/PC:27866 Marcus Carey https://twitter.com/marcusjcarey Prolific Author, Defender, Enterprise Architect at ReliaQuest https://twitter.com/egyp7 https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950 “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.” Security model - everyone’s is diff How do you work with your threat model? A proper threat model Attack Simulation - How is this different from doing a typical Incident Response tabletop? Threat modeling systems? How is this different than a pentest? Is this automated red teaming? How effective can automated testing be? Is this like some kind of constant scanning system? How does this work with threat intel feeds? Can it simulate ransomware, or any attacks? Hedgehog principles A lot of things crappily, and nothing good Mr. Boettcher: “Why suck at everything…” Atomic Red Team - https://github.com/redcanaryco/atomic-red-team ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/ Tribe of Hackers https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 - Red Book The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #Pandora: https://pandora.app.link/p9AvwdTpT3 #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
Brakeing Down Security Podcast on #Pandora- https://www.pandora.com/podcast/brakeing-down-security-podcast/PC:27866 Marcus Carey https://twitter.com/marcusjcarey Prolific Author, Defender, Enterprise Architect at ReliaQuest https://twitter.com/egyp7 https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950 “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.” Security model - everyone’s is diff How do you work with your threat model? A proper threat model Attack Simulation - How is this different from doing a typical Incident Response tabletop? Threat modeling systems? How is this different than a pentest? Is this automated red teaming? How effective can automated testing be? Is this like some kind of constant scanning system? How does this work with threat intel feeds? Can it simulate ransomware, or any attacks? Hedgehog principles A lot of things crappily, and nothing good Mr. Boettcher: “Why suck at everything…” Atomic Red Team - https://github.com/redcanaryco/atomic-red-team ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/ Tribe of Hackers https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 - Red Book The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
Marcus Carey https://twitter.com/marcusjcarey Prolific Author, Defender, Enterprise Architect at ReliaQuest https://twitter.com/egyp7 https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950 “GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.” Security model - everyone’s is diff How do you work with your threat model? A proper threat model Attack Simulation - How is this different from doing a typical Incident Response tabletop? Threat modeling systems? How is this different than a pentest? Is this automated red teaming? How effective can automated testing be? Is this like some kind of constant scanning system? How does this work with threat intel feeds? Can it simulate ransomware, or any attacks? Hedgehog principles A lot of things crappily, and nothing good Mr. Boettcher: “Why suck at everything…” Atomic Red Team - https://github.com/redcanaryco/atomic-red-team ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/ Tribe of Hackers https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 - Red Book The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation https://smile.amazon.com/Tribe-Hackers-Security-Leaders-Cybersecurity/dp/1119643775 - Green Book (Next out!) Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businesses and governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world’s top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What’s the most important decision you’ve made or action you’ve taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? https://smile.amazon.com/Tribe-Hackers-Blue-Team-Cybersecurity/dp/1119643414 - Blue Book (OUT SOON!) Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Check out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
Mixtape: The Year that Was: 2019 Volume One We had quite a year here on the InSecurity podcast. From the opening bell of the year through RSA and SXSW then onto Hacker Summer Camp before closing out the year in DC with ICIT surrounded by the movers and shakers of cybersecurity in the Federal Government, we have had the enormous good fortune to speak with some of the most interesting people in our industry… What did we learn? Take a listen and find out for yourself Kip Boyle: Cybersecurity is a Business Problem, not a Technical Problem… How can companies reconcile the two? Marcus Carey: A young veteran with top security clearance… who faced a job market that knew exactly how much he had been paid… what now? Stephanie Domas: What are the unique issues we face securing medical devices? Greg Silberman: Are Privacy, Secrecy and Security the same thing? John Strand: What Security buzzwords need to be retired? Rob Capps: From Napster to Gnutella to Bit Torrent… How has the revolution started by Napster changed not just music, but the world at large? Kim Crawley: Autism… truths, misconceptions and the need for a diversity of brains in this world Richard Stiennon: Documenting the entirety of the Cybersecurity Industry for the first time (yes, that is a MiniDisc) About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of InSecurity podcast and video series at events all over the world. Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review
Happy Holidays from the upside team!Last year, we shared an episode called: JE006: eight crazy months of upside. This year, we're back and sharing the 12 episodes of Christmas — 12 exceptionally notable episodes we recommend listening to again.The episodes mentioned, in order: CC033: Alex Rubalcava of Stage Venture Partners // investing in early-stage enterprise software UP050: opendorse // helping athletes share more content (feat. Braxton Miller of the Philadelphia Eagles) CC007: the rise of platform in venture capital // a Coffee Chat with Stephanie Manning (Lerer Hippeau) CC032: Kate Shillo Beardsley of Upslope Ventures // scaling early stage investments across the country CC024: investing in the picks and shovels of esports and gaming // a Coffee Chat with Josh Chapman (Konvoy Ventures) UP043: inKind // redesigning restaurant financing with House Accounts (feat. Kevin Tien of Himitsu and Hot Lola's) CC016: a new source of funding and optionality for early stage founders // a Coffee Chat with Tyler Tringas (Earnest Capital) and Kevin McArdle (SureSwift Capital) UP024: Intrinio // powering fintech innovation with access to financial data UP046: MITO Material Solutions // chemical additives for tougher composites UP042: Threatcare // automated third-party threat detection CC017: building a world class venture firm in Chicago // a Coffee Chat with Ezra Galston (Starting Line) UP008: Loop Returns // creating the perfect ecommerce customer returns experience (live from Columbus Podcast Festival) Follow upside on Twitter: https://twitter.com/upsidefmTake our listener survey: https://upside.fm/surveyAdvertise with an upside classified: https://upside.fm/classifieds
#BlackHat2018: A Look Back The world of Cybersecurity is about to descend upon Las Vegas like a plague of locusts. Oh… wait… that appears to have already happened. Tens of thousands of our Cybersecurity colleagues will converge for Hacker Summer Camp next week. We’ll be attending Black Hat, BSidesLV, The Diana Initiative and DEFCON. Before we dive into what’s coming next week… let’s take a look at what we learned last year and see how the passing year shook out. Volume III of the InSecurity Podcast Mixtape features CEOs, legendary technology journalists, and some of the key players in the world of cybersecurity talking about what expected out of Hacker Summer Camp 2018. Kick back and enjoy the perspectives this group of experts has to offer on the present state and future of cybersecurity Enjoy! Katie Moussouris: When Bug Bounties Go Bad: Don’t Get Extorted Javvad Malik: Cybersecurity Is a Lot Like 80s TV Shows Josh Corman: Hackers Are Making the World a Safer Place. You Need Them Marcus Carey: Protect the Endpoint. Simulate an Attack. Make Sure You’re Protected Elinor Mills: Is It Really 25 Years Since L0pht Heavy Industries Testified in Congress? Dave Bittner: Cyberwire: The Daily Paper of Record for the Cybersecurity Industry Justin Kallhoff: How an MSSP Turns Many Small Businesses into One Large Enterprise A lesser blog would rip off someone else’s good writing, change a few words and then not give credit where it’s due… But that’s not how we roll here on the InSecurity Podcast. If you want to read a really good summation of Hacker Summer Camp, check out System Overlord’s lowdown on Hacker Summer Camp and what is about to happen in Las Vegas next week . He drops some serious knowledge on how to maximize your experience. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Matt to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlay as well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts!
Interview begins: 07:55Debrief begins: 52:27Marcus Carey is the founder and CEO of Threatcare.Threatcare allows organizations to better defend against cybersecurity threats by improving vulnerability management and defense capabilities. Threatcare's Violet platform is a Breach and Attack Simulation Technology that allows security teams, incident responders, and network forensic practitioners to reduce their attack surface by continuously monitoring their cybersecurity posture. Threatcare was founded in 2014 and based in Austin, Texas.Learn more about Threatcare: https://www.threatcare.com/Follow Marcus on Twitter: https://twitter.com/marcusjcarey//This episode is sponsored by Taft, Stettinius & Hollister, a full-service law firm known for assisting entrepreneurs across the Heartland.Learn more about or get in touch with Taft: https://www.taftlaw.com/ Follow upside on Twitter: https://twitter.com/upsidefm
In this inaugural episode of Cyber Speaks LIVE, I sit down with Marcus J Carey, CEO of Threatcare and Co-Author of Tribe of Hackers, to talk with our live audience about his growing up in Texas, doing crypto-communications in the US Navy, running a cyber startup and the birth of Tribe of Hackers. Marcus kindly takes questions from our audience that leads to some lively debate and engagement. --- Send in a voice message: https://anchor.fm/cyberspeakslive/message
This week, we welcome Marcus Carey, CEO and Founder of ThreatCare, to talk about Tribe of Hackers, a collection of industry, career, and personal insights from 70 cybersecurity professionals! In the Security News, WordPress plugin removed after zero day discovered, why you should change your facebook password NOW, threat hunting tips to improve security operations, hacked tornado sirens taken offline ahead of a major storm, and how a white hat hacker found a new bug class in Windows! In the final segment, we run a Technical Demo with our sponsor DomainTools, all about Domain Investigation w/ DomainTools Iris! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode598 To learn more about DomainTools and Iris, visit: https://securityweekly.com/domaintools Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Marcus Carey, CEO and Founder of ThreatCare, to talk about Tribe of Hackers, a collection of industry, career, and personal insights from 70 cybersecurity professionals! In the Security News, WordPress plugin removed after zero day discovered, why you should change your facebook password NOW, threat hunting tips to improve security operations, hacked tornado sirens taken offline ahead of a major storm, and how a white hat hacker found a new bug class in Windows! In the final segment, we run a Technical Demo with our sponsor DomainTools, all about Domain Investigation w/ DomainTools Iris! All that and more, on this episode of Paul's Security Weekly! Full Show Notes: https://wiki.securityweekly.com/Episode598 To learn more about DomainTools and Iris, visit: https://securityweekly.com/domaintools Visit https://www.securityweekly.com/psw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Marcus Carey is the Founder & CEO at Threatcare. Navy Cryptologist turned cybersecurity entrepreneur, Marcus Carey is Currently working as founder and CEO of cybersecurity company Threatcare. He joins us talk about the book that he Co-Authored, "Tribe of Hackers"! Full Show Notes: https://wiki.securityweekly.com/Episode598 Follow us on Twitter: https://www.twitter.com/securityweekly
Marcus Carey is the Founder & CEO at Threatcare. Navy Cryptologist turned cybersecurity entrepreneur, Marcus Carey is Currently working as founder and CEO of cybersecurity company Threatcare. He joins us talk about the book that he Co-Authored, "Tribe of Hackers"! Full Show Notes: https://wiki.securityweekly.com/Episode598 Follow us on Twitter: https://www.twitter.com/securityweekly
Marcus Carey is a cybersecurity researcher, hacker, and the founder and CEO of Threatcare. Marcus is also the author of a new book entitled Tribe of Hackers.
Marcus Carey (Twitter, LinkedIn), the founder and CEO of Threatcare, actually grew up in Texas with very little access to technology. But that changed when he joined the Navy and went into cryptology. While serving the country, Marcus worked with the most advanced tech in the world. And, when his service time was finished, he stayed in the field working in various government agencies for a number of years. At Threatcare, Marcus applies the lessons he’s learned along the way to help his customers secure their data and test their cybersecurity. In this interview, he and Ian talk about what it means to be a white-hat hacker versus a black-hat hacker, creating automated technology, and finding your superpower. Topics Discussed: Technology, cryptography, white-hat hacking, black-hat hacking, cybersecurity, entrepreneurship, leadership. IT Visionaries is brought to you by The Lightning Platform by Salesforce. The Lightning Platform is a leading cloud platform that makes building AI-powered apps faster and easier. With Salesforce, now everyone is empowered to build apps for their organization! Learn more at salesforce.com/buildmobileapps. Salesforce and MIT recently teamed up to create a whitepaper exploring what happens when AI meets CRM. Read: AI Meets CRM: An MIT Tech Review Whitepaper The Mission publishes the #1 newsletter for accelerated learning. Join our community of hundreds of thousands at themission.co/subscribe.
At some point in just about everyone's life, they struggle with imposter syndrome — a feeling that you don't belong where you are or that you aren't qualified to be doing what you're doing. This is especially true for many small business owners. Marcus Carey (Twitter, LinkedIn), the founder and CEO of Threatcare, had been dealing with imposter syndrome his entire life. “I wanna do what I was called to do, essentially. So the big setback was not having that confidence initially.” Listening to Marcus' journey, you'll learn how he overcame his circumstances and found the confidence within himself to not just survive in business, but thrive, all while trying to give back to others. Learn more about The Journey at mission.org/thejourney. The Journey is sponsored by our friends at Salesforce Essentials. We use Salesforce Essentials every day and it's part of our own business journey. Essentials combines sales and service tools in a single app to help small businesses win customers and keep them happy. See how Salesforce Essentials can help you be your best business at salesforce.com/thejourney.
Marcus Carey: Tribe of Hackers There are already hundreds of thousands of cybersecurity professionals and according to some sources, there is a shortage of several more hundreds of thousands. With his new book Tribe of Hackers, Marcus Carey wants to change that. Tribe of Hackers is a collection of industry, career, and personal insights from 70 cybersecurity luminaries. In this week’s episode of InSecurity, Matt Stephenson sits down with world renowned hacker Marcus Carey, CEO of Threatcare, to talk about talk about his new book, Tribe of Hackers as well as mentors from his past who have influenced him and, by extension, influenced the world of cybersecurity. About Tribe of Hackers These are the wisdom and perspectives of real-life hackers and cybersecurity practitioners, including David Kennedy, Wendy Nather, Lesley Carhart, and Bruce Potter. Threatcare will be giving away three copies per day (fifteen total) at the RSA Conference. Follow Threatcare on Twitter and Sign Up for the Risk Report to learn more about the details. All proceeds from the book will go towards Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid’s Club. About Marcus Carey Marcus Carey is renowned in the cybersecurity industry and has spent his more than 20-year career working in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA. He started his career in cryptography in the U.S. Navy and holds a Master’s degree in Network Security from Capitol College. Marcus regularly speaks at security conferences across the country. Currently, working as founder and CEO of cybersecurity company Threatcare, Marcus is passionate about giving back to the community through things like mentorship, hackathons, and speaking engagements, and is a voracious reader in his spare time. Tribe of Hackers is his first published book, but will definitely not be his last. About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcast and host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us wherever you get your podcasts including Spotify, Stitcher, SoundCloud, I Heart Radio as well as ThreatVector InSecurity Podcasts: https://threatvector.cylance.com/en_us/category/podcasts.html iTunes/Apple Podcasts link: https://itunes.apple.com/us/podcast/insecurity/id1260714697?mt=2 GooglePlay Music link: https://play.google.com/music/listen#/ps/Ipudd6ommmgdsboen7rjd2lvste Make sure you Subscribe, Rate and Review!
Marcus Carey has been hacking since we was five. A true MacGuyver he had to make due with little resources available to him. He later enrolled for the Navy, worked for 3 letter agencies including the NSA, and now has his own security startup. Marcus shares a TON with us in this episode. BIO: Marcus is renowned in the cybersecurity industry and has spent his more than 20-year career working in penetration testing, incident response, and digital forensics with federal agencies such as NSA, DC3, DIA, and DARPA. He started his career in cryptography in the U.S. Navy and holds a Master’s degree in Network Security from Capitol College. Marcus regularly speaks at security conferences across the country. He is passionate about giving back to the community through things like mentorship, hackathons, and speaking engagements, and is a voracious reader in his spare time. Notes: Marcus had an opportunity to play college basketball, but couldn't since it was only a partial scholarship After taking the ASVAB test had the choice of nuclear engineering or cryptography. He chose cryptography. Marcus made a olympic sized track pit, up to spec as a child. Marcus like many other security professionals, had a strong artistic side. Achieved first chair in just a few weeks in Jr. High. Marcus teaches us "How to Learn". Marcus achieved over 115 college credits, on his own, without attending college! Open source tools Marcus created ended up being used be used to save people's lives in other parts of the world. Quotes: "[I] Told them all I wanted to do was work with computers." "I've always been a tinkerer. I built stuff, I was a science fair geek... the whole nine." "I was the poorest person growing up... so anything I did was a hack. I made my own hackey sack. I used to make my own toys." "You can't learn how Marcus learns, because everyone is different.... Nobody can tell you how to learn as good as yourself." "So now, I'm like a finely tuned weapon when it comes to learning... cause I know exactly how to learn." "Never be surprised how your work turns out to be used for good... it actually blew my mind that my stuff was being used to do that [saving people's lives]. " "Show externally that you've mastered those concepts in some way." "Sometimes your employees are going to go rouge, and hopefully you can detect when they do." "If you're focusing on a specific set of skills that are evergreen, and if you work that long enough, it doesn't matter your aptitude, you can become an expert at that." "There's people out here that are celebrities and they act like they know everything. Don't be one of those people." "Aptitude allows people to learn stuff faster. I think the military requires you to learn stuff fast." Links: Marcus Carey Twitter (@marcusjcarey) Marcus's Company: Threatcare ASVAB Test MacGuyver Python The Hard Way Sub-Vocalization Book: "How to Measure Anything in Cybersecurity Risk" Clep Test DSST Excelsior College Examinations Book: "Never split the difference on negotiating" Threat Agent and Honeydocs Intro Music: Cascadia by @Trash80 Outro Music: Coupe by @yungkartz Resources Mentioned: The Paradox of Choice by Azeria Labs Cyberseek Pathways
Today we get to know Jennifer Aldoretta of Threatcare. Designed by security professionals for security professionals, Threatcare validates controls, identifies gaps, and delivers executive insights in minutes. This episode is powered by SpyCloud - https://spycloud.com/ - Protect employees and customers from account takeover & Impact Hub Austin - https://www.impacthubaustin.com/ - Inspiring coworking, shared office spaces, programs and accelerators in the heart of Austin. Tweet @womenintechshow and @EspreeDevora https://www.threatcare.com/ http://twitter.com/womenintechshow https://twitter.com/espreedevora