Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez
Manage episode 448823446 series 3516169
In this week's episode of the Security Repo Podcast, we dive into an unusual topic for the program, navigating the US immigration system and the challenges that many security professionals working in the US face. Join us as we discuss how to apply lessons from the world of pentesting to succeeding in the face of bureaucracy. We are joined by José A. Martinez. José is the owner of too many Pokemon games which he still hasn’t played. Born in Mexico but raised in Chicago, José loves guitars, books, cameras, and trying out new food. José worked in retail before transitioning to information security as an apprentice in a consulting firm, where he currently focuses on web application pentesting as a senior delivery analyst. Links mentioned in this episode: https://www.linkedin.com/in/jose-martinez-castro/
93 episodes
Manage episode 448823446 series 3516169
In this week's episode of the Security Repo Podcast, we dive into an unusual topic for the program, navigating the US immigration system and the challenges that many security professionals working in the US face. Join us as we discuss how to apply lessons from the world of pentesting to succeeding in the face of bureaucracy. We are joined by José A. Martinez. José is the owner of too many Pokemon games which he still hasn’t played. Born in Mexico but raised in Chicago, José loves guitars, books, cameras, and trying out new food. José worked in retail before transitioning to information security as an apprentice in a consulting firm, where he currently focuses on web application pentesting as a senior delivery analyst. Links mentioned in this episode: https://www.linkedin.com/in/jose-martinez-castro/
93 episodes
All episodes
×
1 Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak 21:05

1 Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci 23:04

1 From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski 20:03

1 Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko 23:06

1 Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson 24:19

1 How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen 22:20

1 Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz 22:53

1 The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill 22:36

1 Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel 22:15

1 Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen 22:45

1 Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin 41:51

1 What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher 42:21

1 Understanding Security Champions and Making Human Connections - Dustin Lehr 48:29

1 Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett 37:54

1 Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee 30:59

1 The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore 36:39

1 Securing Workload Identities And Working On Conjure - Jody Hunt 43:31

1 The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan 42:37

1 Securing Flight Simulators And Other Operational Technology - Coburn Slay 45:02

1 Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison 36:03

1 Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley 37:37

1 Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer 41:39

1 Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker 33:14

1 Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer 33:58

1 Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez 27:13

1 STIR/SHAKEN and Password Policies- Per Thorsheim 34:14

1 Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne 31:05

1 From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock 44:36

1 Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough 35:29

1 Countering Shadow IT Through Nudging Intervention - Garret Gross 28:35

1 What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host 0:59

1 Data Loss Prevention and Stopping Breaches Before They Start 36:09

1 Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee 39:32

1 Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey 36:14

1 Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix 46:40

1 DeepCover & DART Academy: Fighting Scammers Through Educating Seniors 31:17

1 Mining for Vulnerabilities: Hidden Dangers of Open Buckets 42:48

1 The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri 44:38

1 Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen 41:00

1 Behind the Scenes of Offensive Security with Bobby Kuzma 33:56

1 Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy 36:32

1 Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot 37:02

1 Securing the Future - The Art of Threat Modeling with Paul McCarty 32:50

1 Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson 40:19

1 From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity 40:14

1 Navigating AI in Cybersecurity: Insights from Sonya Moisset 36:58

1 Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO 39:47

1 The Secrets behind GitGuardian: Building a security platform with Eric Fourrier 45:39

1 Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees 42:02

1 Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz 56:38

1 Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran 34:25

1 Unpacking ASPM: Trends, Truths, and the Future of Security Tools 28:34

1 Decoding Security: An Analyst's Perspective on Trends and Tools 31:05

1 Building Conferences and Communities in Cybersecurity with Huxley Barbee 42:40

1 The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba 36:37

1 Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas 34:39

1 The Evolution of Offensive Security with Erik Cabetas 41:41

1 From Bank Heists to Security Insights: The Jayson E. Street Story 55:19

1 Reducing the noise: Cutting through the data in security Buck Bundhund 40:05

1 Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman 34:00

1 The right tool for the job: Finding and evaluating security tools with James Berthoty 41:44

1 Securing our APIs - Thinking differently about API Security with Isabelle Mauny 43:52

1 Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta 28:43

1 API Security Unveiled: Safeguarding the Heart of Modern Applications 30:33

1 Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering 32:48

1 Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett 33:28

1 Mastering Physical Security: Unveiling the Secrets with Brice Self 35:13

1 Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes 35:44

1 Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk 38:03

1 Scaling security and AppSec in fast moving enterprises with Jeevan Singh 38:12

1 Enterprise Software Distribution - Managing updates and security in enterprise software at scale 37:53

1 Securing data in a world of AI with Jeremiah Jeschke 29:43

1 Getting boardroom buy-in for security - CISO conversations with Walt Powell 37:16

1 Social engineering, phishing and building grass roots communities with Dan and Ken 48:34

1 Code signing and securing the software supply chain with Billy Lynch 34:44

1 Getting started in AppSec with Tanya Janca SheHacksPurple 48:22

1 Securing the remote workforce, the future of cloud development environments 26:15

1 Understanding digital forensics with Desi - A deep dive post breach investigations 29:23

1 The hacker in the board room: The journey from hacker to CISO with Jason Haddix 55:40

1 Security landscape in 2023 : Insights from the ground at RSA (Special Edition Episode) 15:25

1 Modern ransomware: How hackers are targeting your organization with Adriel Disatel and Noah Tongate 44:58

1 Understanding intent based access control with Uri Sarid 28:24

1 Multi Factor Authentication for APIs with Anusha Iyer 30:13

1 Offensive security tools with Brendan O'Leary from ProjectDiscovery 31:55

1 Threat modeling in security with Audrey Long 38:56

1 Understanding and building the SOC (Security Operations Center) - With Troy Santana 21:33

1 Staff augmentation in security with Troy Santana 35:04

1 Episode 6: Securing the development environment with Laurent Balmelli 35:34

1 Episode 5: Product Lead Growth in Security with Ross Haleliuk 33:25

1 Episode 4: Understanding confidential computing & web assembly to build secure apps 25:43

1 Epsiode 3: Implementing a DevSecOps approach to software development with Will Kelly 30:05

1 Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscape 44:10

1 Episode 1 - A deep dive into supply chain risk 53:16
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.