Conf T with your SE cover art

Conf T with your SE

By: Bryan Young
  • Summary

  • "Conf T with your SE" is a trailblazing podcast designed specifically for the tech-savvy listener. Launched in 2019, it brings together thought leaders, experts, and enthusiasts in the world of technology to spark insightful discussions, share industry trends, and tackle complex technical concepts in an accessible and engaging way. Hosted by seasoned systems engineer, Bryan Young, the show breaks down the barriers between the intricate world of computer networking and software and the everyday listener. Bryan's knack for simplifying complex concepts, paired with his infectious enthusiasm for the new and disruptive technology makes the podcast a hit among novices and experts alike. The "Conf T with your SE" podcast dives deep into a wide array of topics, from the nitty-gritty of coding and algorithm design to the larger implications of technology on society. It also covers career guidance, industry trends, the latest research, and interviews with leading figures from tech giants to startup pioneers. Listeners of "Conf T with your SE" not only gain a deeper understanding of the world of Information Technology but also get a chance to be part of a growing community that's passionate about learning, innovating, and pushing the boundaries of what's possible in tech. Yet the dialogue doesn't end with the podcast! We invite listeners to join our growing Discord community at https://discord.gg/shgnswpKzw. Here, you can extend the discussions, engage directly with Bryan and other listeners, and even suggest topics for forthcoming episodes. It's a place for learning, debating, networking, and experiencing the thrill of the ever-evolving tech industry. Whether you're an experienced professional hunting for fresh insights, a student aspiring to carve out a career in the industry, or a tech enthusiast keen to grasp the world of systems engineering, "Conf T with your SE" caters to all. Tune in, participate in the Discord discourse, and be part of this enlightening voyage through the technological landscape!
    Show More Show Less
Episodes
  • Ep 65 - Day in the Life of a SOC Analyst
    Mar 4 2024
    Summary This conversation explores the role of a SOC analyst and the challenges they face in the cybersecurity field. It covers the structure and responsibilities of a SOC team, the impact of remote work on communication and collaboration, and the skills required to be a successful SOC analyst. The conversation also delves into the tools and technologies used in a SOC, the career path of a SOC analyst, and the importance of passion and continuous learning in the IT industry. In this conversation, Bryan and Jordan discuss the qualities of a SOC analyst, the challenges and rewards of the job, significant threats and their mitigation, collaboration with other teams, the role of AI in the SOC, future threats such as quantum computing, and advice for aspiring SOC analysts. They also share funny incidents that have occurred in the SOC. Overall, the conversation highlights the importance of continuous learning, effective communication, and a passion for cybersecurity in the SOC role. Takeaways
    • A SOC (Security Operations Center) is responsible for mitigating threats and analyzing network data to identify potential security breaches.
    • Communication and collaboration are crucial skills for SOC analysts, especially in a remote work environment.
    • SOC analysts need to prioritize and manage alerts effectively to differentiate between actual threats and false positives.
    • Key skills for SOC analysts include analytical thinking, programming knowledge, and incident handling.
    • Becoming a SOC analyst typically involves obtaining a degree in cybersecurity and gaining experience through tiered roles within a SOC team. SOC analysts should have a passion for cybersecurity and be coachable and willing to learn.
    • Challenges in the SOC can be mentally taxing, but the job is rewarding when able to identify and mitigate threats.
    • Collaboration with other teams, such as security engineers, is crucial for a cohesive and effective defense.
    • AI can play a role in automating certain aspects of the SOC, such as alerting and response.
    • Future threats, including quantum computing, should be considered and prepared for in the SOC.
    • Aspiring SOC analysts should be open to learning, ask questions, and embrace the challenges of the job.
    Show More Show Less
    1 hr and 23 mins
  • Ep 64 - Pen Testing and Remediation
    Dec 6 2023
    Show Notes for Episode 64: Penetration Testing and Remediation in Cybersecurity

    Welcome to Episode 64 of our cybersecurity-focused podcast! In this installment, our host Bryan Young is joined by two experts in the field of cyber defense, Megan Scherer and Ryan Wager from Secure Network Technologies. Dive deep with us as we explore the critical roles that penetration testing and remediation play in safeguarding organizations against digital threats.

    Main Themes:
    • The Importance of Penetration Testing: Our guests discuss how penetration tests are crucial for identifying weaknesses in a variety of infrastructural setups, from small businesses to large enterprises.

    • Cybersecurity Remediation: Learn about the steps that need to be taken once vulnerabilities are found, and the importance of timely and effective action to protect an organization’s data integrity.

    • Awareness of Cyber Risks: Megan and Ryan stress the need for organizations to be fully aware of the potential risks to their clients, suppliers, and internal operations. They also address the unique challenges faced by organizations without specialized IT teams or a Chief Information Security Officer (CISO).

    • Internal Collaboration: Drawing parallels with the development issues of the Ford Pinto, the discussion turns to the importance of internal collaboration within organizations to prevent and mitigate security risks.

    • Keeping Up with Evolving Threats: The ever-changing landscape of cybersecurity means constant vigilance and updates to security measures are necessary. The episode touches on the possibility of using automation to stay ahead of the game, especially with the emergence of state-sponsored cyber threats.

    • Partnership with Driven: Hear about Secure Network Technologies’ partnership with Driven and how it has helped in pinpointing security vulnerabilities.

    • Call to Action: Listeners are encouraged to visit the podcast’s website for more information and resources, and to share the episode with others who are interested in cybersecurity.

    Don’t miss this in-depth conversation that could help you better understand and improve your organization’s cyber defenses. Stay safe and stay informed!

    Remember to subscribe and share Episode 64 with your network. Until next time, keep your data secure and your systems checked!

    For additional resources and episode transcripts, please visit our website. If you have questions or topics you’d like us to cover in future episodes, reach out to us through our contact page.

    Show More Show Less
    53 mins
  • Ep 63 - Quantum Computing
    Nov 22 2023

    Episode Summary:
    In this episode, Bryan Young invites Igor Barshteyn to demystify quantum computing and its implications for cybersecurity. They dive into the intricacies of how quantum computing challenges current encryption methods, specifically public key cryptography, and what that means for data security. The discussion pivots around the looming necessity for transition to post-quantum cryptography and the roles that various entities like NIST, NSA, and leading tech companies are playing in this arena.

    Key Points Discussed:

    • Quantum computing's impact on current encryption standards.
    • How recorded encrypted data can be at risk in the future with advancements in quantum computing.
    • The urgency and challenges in transitioning to post-quantum cryptography.
    • The roles of NIST and NSA in standardizing new cryptographic measures.
    • The legal and personal implications for CISOs in the wake of cybersecurity breaches.
    • Global efforts towards developing quantum-resistant cryptographic standards.

    Notable Quotes:

    • "Quantum computers can rapidly factor large numbers, breaking the key establishment part of encryption protocols."
    • "The threat of quantum computing on data security is here now due to the ability to capture and store encrypted data for future decryption."
    • "There's a cybersecurity jobs crisis looming with the emergence of quantum computing technology."

    Resources Mentioned:

    • SolarWinds lawsuit article
    • NIST's post-quantum cryptography project
    • Open Quantum Safe project

    Call to Action:

    • For listener questions and feedback: hello@conft.show
    • Join the Conf T Discord community to engage in discussions: https://discord.conft.show
    • Visit the Conf T merch shop: Conf T Merch

    Closing Thoughts:
    Bryan and Igor emphasize the importance of staying informed and proactive in the face of quantum computing's challenges to cybersecurity. They encourage listeners to audit their encryption protocols and prepare for the inevitable transition to quantum-resistant cryptography.

    Show More Show Less
    1 hr and 4 mins

What listeners say about Conf T with your SE

Average customer ratings

Reviews - Please select the tabs below to change the source of reviews.