Go offline with the Player FM app!
🔥 How Hackers Can Protect Your Business | AI Risks & DEF CON Secrets🔥
Manage episode 477274770 series 3559123
What if the hackers are actually the heroes?
In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats.
🎖️ From serving in the U.S. Air Force as a Senior Cyber Tactics Lead, to becoming a NetWars Champion and SANS instructor, Matt shares battle-tested insights and introduces Sirius — the groundbreaking open-source vulnerability scanner that’s changing the game.
🚨 Whether you run a business or just want to finally get serious about cybersecurity, this episode is PACKED with unfiltered truth, practical strategies, and behind-the-scenes access to the front lines of cyber warfare.
Takeaways
• Matt Toussaint's journey from military to cybersecurity is inspiring.
• DEF CON is a great platform for new voices in cybersecurity.
• Penetration testing is crucial for identifying vulnerabilities.
• Real-world examples highlight the importance of cybersecurity.
• Sirius is an open-source vulnerability scanning tool.
• Organizations often overlook basic security practices like password management.
• The Colonial Pipeline incident serves as a cautionary tale.
• Effective remediation is key after penetration testing.
• Cybersecurity is a constantly evolving field.
• Networking at events like DEF CON can lead to valuable connections. Password management is a significant challenge for organizations.
• MSPs often lack the resources to provide adequate security.
• Outsourcing IT can lead to increased tech debt and security risks.
• Incident response requires a deep understanding of the threat landscape.
• Nation-state actors pose unique challenges in cybersecurity.
• Prosecution of cybercriminals is complicated by international law.
• Geopo
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
Chapters
1. Introduction To Cybersecurity And Matt Toussaint (00:00:00)
2. Behind The Scenes At DEF CON (00:05:49)
3. Security Best Practices For Small Businesses (00:08:36)
4. How Offensive Security Helps Business (00:12:03)
5. The Colonial Pipeline Incident: Lessons Learned (00:18:30)
6. The Role Of Vulnerability Scanning In Cybersecurity (00:23:31)
7. Common Security Pitfalls: Password Management (00:28:00)
8. How Hackers Help Business Reduce Risk (00:32:11)
9. Incident Response And Real-World Breaches (00:34:53)
10. The Complexity Of Cybercrime Prosecution (00:38:35)
11. The Role Of AI In Cybersecurity (00:44:20)
12. AI Risks To Small Business (00:48:01)
13. Challenges Of Detection (00:53:01)
14. Entitlements Management Vs. Access Control (00:56:38)
249 episodes
Manage episode 477274770 series 3559123
What if the hackers are actually the heroes?
In this mind-blowing episode, host David Mauro sits down with Matt Toussain, elite military cyber warrior, DEF CON speaker, and Founder of Open Security, to reveal how offensive security and real-world hacking tactics are helping businesses reduce risk, fight cybercrime, and stay ten steps ahead of threats.
🎖️ From serving in the U.S. Air Force as a Senior Cyber Tactics Lead, to becoming a NetWars Champion and SANS instructor, Matt shares battle-tested insights and introduces Sirius — the groundbreaking open-source vulnerability scanner that’s changing the game.
🚨 Whether you run a business or just want to finally get serious about cybersecurity, this episode is PACKED with unfiltered truth, practical strategies, and behind-the-scenes access to the front lines of cyber warfare.
Takeaways
• Matt Toussaint's journey from military to cybersecurity is inspiring.
• DEF CON is a great platform for new voices in cybersecurity.
• Penetration testing is crucial for identifying vulnerabilities.
• Real-world examples highlight the importance of cybersecurity.
• Sirius is an open-source vulnerability scanning tool.
• Organizations often overlook basic security practices like password management.
• The Colonial Pipeline incident serves as a cautionary tale.
• Effective remediation is key after penetration testing.
• Cybersecurity is a constantly evolving field.
• Networking at events like DEF CON can lead to valuable connections. Password management is a significant challenge for organizations.
• MSPs often lack the resources to provide adequate security.
• Outsourcing IT can lead to increased tech debt and security risks.
• Incident response requires a deep understanding of the threat landscape.
• Nation-state actors pose unique challenges in cybersecurity.
• Prosecution of cybercriminals is complicated by international law.
• Geopo
Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466
🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss a video episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Youtube (FKA Google) Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!
Chapters
1. Introduction To Cybersecurity And Matt Toussaint (00:00:00)
2. Behind The Scenes At DEF CON (00:05:49)
3. Security Best Practices For Small Businesses (00:08:36)
4. How Offensive Security Helps Business (00:12:03)
5. The Colonial Pipeline Incident: Lessons Learned (00:18:30)
6. The Role Of Vulnerability Scanning In Cybersecurity (00:23:31)
7. Common Security Pitfalls: Password Management (00:28:00)
8. How Hackers Help Business Reduce Risk (00:32:11)
9. Incident Response And Real-World Breaches (00:34:53)
10. The Complexity Of Cybercrime Prosecution (00:38:35)
11. The Role Of AI In Cybersecurity (00:44:20)
12. AI Risks To Small Business (00:48:01)
13. Challenges Of Detection (00:53:01)
14. Entitlements Management Vs. Access Control (00:56:38)
249 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.