Artwork

Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥

58:42
 
Share
 

Manage episode 477274770 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

What if the hackers are actually the heroes?

In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats.

🎖️ From serving in the U.S. Air Force as a Senior Cyber Tactics Lead, to becoming a NetWars Champion and SANS instructor, Matt shares battle-tested insights and introduces Sirius — the groundbreaking open-source vulnerability scanner that’s changing the game.

🚨 Whether you run a business or just want to finally get serious about cybersecurity, this episode is PACKED with unfiltered truth, practical strategies, and behind-the-scenes access to the front lines of cyber warfare.

Takeaways

• Matt Toussaint's journey from military to cybersecurity is inspiring.

• DEF CON is a great platform for new voices in cybersecurity.

• Penetration testing is crucial for identifying vulnerabilities.

• Real-world examples highlight the importance of cybersecurity.

• Sirius is an open-source vulnerability scanning tool.

• Organizations often overlook basic security practices like password management.

• The Colonial Pipeline incident serves as a cautionary tale.

• Effective remediation is key after penetration testing.

• Cybersecurity is a constantly evolving field.

• Networking at events like DEF CON can lead to valuable connections. Password management is a significant challenge for organizations.

• MSPs often lack the resources to provide adequate security.

• Outsourcing IT can lead to increased tech debt and security risks.

• Incident response requires a deep understanding of the threat landscape.

• Nation-state actors pose unique challenges in cybersecurity.

• Prosecution of cybercriminals is complicated by international law.

• Geopo

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. Introduction To Cybersecurity And Matt Toussaint (00:00:00)

2. Behind The Scenes At DEF CON (00:05:49)

3. Security Best Practices For Small Businesses (00:08:36)

4. How Offensive Security Helps Business (00:12:03)

5. The Colonial Pipeline Incident: Lessons Learned (00:18:30)

6. The Role Of Vulnerability Scanning In Cybersecurity (00:23:31)

7. Common Security Pitfalls: Password Management (00:28:00)

8. How Hackers Help Business Reduce Risk (00:32:11)

9. Incident Response And Real-World Breaches (00:34:53)

10. The Complexity Of Cybercrime Prosecution (00:38:35)

11. The Role Of AI In Cybersecurity (00:44:20)

12. AI Risks To Small Business (00:48:01)

13. Challenges Of Detection (00:53:01)

14. Entitlements Management Vs. Access Control (00:56:38)

249 episodes

Artwork
iconShare
 
Manage episode 477274770 series 3559123
Content provided by Cyber Crime Junkies. Host David Mauro.. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Cyber Crime Junkies. Host David Mauro. or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

What if the hackers are actually the heroes?

In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats.

🎖️ From serving in the U.S. Air Force as a Senior Cyber Tactics Lead, to becoming a NetWars Champion and SANS instructor, Matt shares battle-tested insights and introduces Sirius — the groundbreaking open-source vulnerability scanner that’s changing the game.

🚨 Whether you run a business or just want to finally get serious about cybersecurity, this episode is PACKED with unfiltered truth, practical strategies, and behind-the-scenes access to the front lines of cyber warfare.

Takeaways

• Matt Toussaint's journey from military to cybersecurity is inspiring.

• DEF CON is a great platform for new voices in cybersecurity.

• Penetration testing is crucial for identifying vulnerabilities.

• Real-world examples highlight the importance of cybersecurity.

• Sirius is an open-source vulnerability scanning tool.

• Organizations often overlook basic security practices like password management.

• The Colonial Pipeline incident serves as a cautionary tale.

• Effective remediation is key after penetration testing.

• Cybersecurity is a constantly evolving field.

• Networking at events like DEF CON can lead to valuable connections. Password management is a significant challenge for organizations.

• MSPs often lack the resources to provide adequate security.

• Outsourcing IT can lead to increased tech debt and security risks.

• Incident response requires a deep understanding of the threat landscape.

• Nation-state actors pose unique challenges in cybersecurity.

• Prosecution of cybercriminals is complicated by international law.

• Geopo

Send us a text

Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

Chapters

1. Introduction To Cybersecurity And Matt Toussaint (00:00:00)

2. Behind The Scenes At DEF CON (00:05:49)

3. Security Best Practices For Small Businesses (00:08:36)

4. How Offensive Security Helps Business (00:12:03)

5. The Colonial Pipeline Incident: Lessons Learned (00:18:30)

6. The Role Of Vulnerability Scanning In Cybersecurity (00:23:31)

7. Common Security Pitfalls: Password Management (00:28:00)

8. How Hackers Help Business Reduce Risk (00:32:11)

9. Incident Response And Real-World Breaches (00:34:53)

10. The Complexity Of Cybercrime Prosecution (00:38:35)

11. The Role Of AI In Cybersecurity (00:44:20)

12. AI Risks To Small Business (00:48:01)

13. Challenges Of Detection (00:53:01)

14. Entitlements Management Vs. Access Control (00:56:38)

249 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play