Episodes

  • Ep 65 - Day in the Life of a SOC Analyst
    Mar 4 2024
    Summary This conversation explores the role of a SOC analyst and the challenges they face in the cybersecurity field. It covers the structure and responsibilities of a SOC team, the impact of remote work on communication and collaboration, and the skills required to be a successful SOC analyst. The conversation also delves into the tools and technologies used in a SOC, the career path of a SOC analyst, and the importance of passion and continuous learning in the IT industry. In this conversation, Bryan and Jordan discuss the qualities of a SOC analyst, the challenges and rewards of the job, significant threats and their mitigation, collaboration with other teams, the role of AI in the SOC, future threats such as quantum computing, and advice for aspiring SOC analysts. They also share funny incidents that have occurred in the SOC. Overall, the conversation highlights the importance of continuous learning, effective communication, and a passion for cybersecurity in the SOC role. Takeaways
    • A SOC (Security Operations Center) is responsible for mitigating threats and analyzing network data to identify potential security breaches.
    • Communication and collaboration are crucial skills for SOC analysts, especially in a remote work environment.
    • SOC analysts need to prioritize and manage alerts effectively to differentiate between actual threats and false positives.
    • Key skills for SOC analysts include analytical thinking, programming knowledge, and incident handling.
    • Becoming a SOC analyst typically involves obtaining a degree in cybersecurity and gaining experience through tiered roles within a SOC team. SOC analysts should have a passion for cybersecurity and be coachable and willing to learn.
    • Challenges in the SOC can be mentally taxing, but the job is rewarding when able to identify and mitigate threats.
    • Collaboration with other teams, such as security engineers, is crucial for a cohesive and effective defense.
    • AI can play a role in automating certain aspects of the SOC, such as alerting and response.
    • Future threats, including quantum computing, should be considered and prepared for in the SOC.
    • Aspiring SOC analysts should be open to learning, ask questions, and embrace the challenges of the job.
    Show More Show Less
    1 hr and 23 mins
  • Ep 64 - Pen Testing and Remediation
    Dec 6 2023
    Show Notes for Episode 64: Penetration Testing and Remediation in Cybersecurity

    Welcome to Episode 64 of our cybersecurity-focused podcast! In this installment, our host Bryan Young is joined by two experts in the field of cyber defense, Megan Scherer and Ryan Wager from Secure Network Technologies. Dive deep with us as we explore the critical roles that penetration testing and remediation play in safeguarding organizations against digital threats.

    Main Themes:

    • The Importance of Penetration Testing: Our guests discuss how penetration tests are crucial for identifying weaknesses in a variety of infrastructural setups, from small businesses to large enterprises.

    • Cybersecurity Remediation: Learn about the steps that need to be taken once vulnerabilities are found, and the importance of timely and effective action to protect an organization’s data integrity.

    • Awareness of Cyber Risks: Megan and Ryan stress the need for organizations to be fully aware of the potential risks to their clients, suppliers, and internal operations. They also address the unique challenges faced by organizations without specialized IT teams or a Chief Information Security Officer (CISO).

    • Internal Collaboration: Drawing parallels with the development issues of the Ford Pinto, the discussion turns to the importance of internal collaboration within organizations to prevent and mitigate security risks.

    • Keeping Up with Evolving Threats: The ever-changing landscape of cybersecurity means constant vigilance and updates to security measures are necessary. The episode touches on the possibility of using automation to stay ahead of the game, especially with the emergence of state-sponsored cyber threats.

    • Partnership with Driven: Hear about Secure Network Technologies’ partnership with Driven and how it has helped in pinpointing security vulnerabilities.

    • Call to Action: Listeners are encouraged to visit the podcast’s website for more information and resources, and to share the episode with others who are interested in cybersecurity.

    Don’t miss this in-depth conversation that could help you better understand and improve your organization’s cyber defenses. Stay safe and stay informed!

    Remember to subscribe and share Episode 64 with your network. Until next time, keep your data secure and your systems checked!

    For additional resources and episode transcripts, please visit our website. If you have questions or topics you’d like us to cover in future episodes, reach out to us through our contact page.

    Show More Show Less
    53 mins
  • Ep 63 - Quantum Computing
    Nov 22 2023

    Episode Summary:
    In this episode, Bryan Young invites Igor Barshteyn to demystify quantum computing and its implications for cybersecurity. They dive into the intricacies of how quantum computing challenges current encryption methods, specifically public key cryptography, and what that means for data security. The discussion pivots around the looming necessity for transition to post-quantum cryptography and the roles that various entities like NIST, NSA, and leading tech companies are playing in this arena.

    Key Points Discussed:

    • Quantum computing's impact on current encryption standards.
    • How recorded encrypted data can be at risk in the future with advancements in quantum computing.
    • The urgency and challenges in transitioning to post-quantum cryptography.
    • The roles of NIST and NSA in standardizing new cryptographic measures.
    • The legal and personal implications for CISOs in the wake of cybersecurity breaches.
    • Global efforts towards developing quantum-resistant cryptographic standards.

    Notable Quotes:

    • "Quantum computers can rapidly factor large numbers, breaking the key establishment part of encryption protocols."
    • "The threat of quantum computing on data security is here now due to the ability to capture and store encrypted data for future decryption."
    • "There's a cybersecurity jobs crisis looming with the emergence of quantum computing technology."

    Resources Mentioned:

    • SolarWinds lawsuit article
    • NIST's post-quantum cryptography project
    • Open Quantum Safe project

    Call to Action:

    • For listener questions and feedback: hello@conft.show
    • Join the Conf T Discord community to engage in discussions: https://discord.conft.show
    • Visit the Conf T merch shop: Conf T Merch

    Closing Thoughts:
    Bryan and Igor emphasize the importance of staying informed and proactive in the face of quantum computing's challenges to cybersecurity. They encourage listeners to audit their encryption protocols and prepare for the inevitable transition to quantum-resistant cryptography.

    Show More Show Less
    1 hr and 4 mins
  • Ep 62 - Empowering our Veterans in the Digital Age
    Nov 8 2023

    Show Notes: Episode 62 - Empowering Veterans in the Digital Age

     

    - Guest Introduction:
       - Guests from Tech4Troops, an organization providing free computers and education programs to veterans.
       - Guests share their military backgrounds, highlighting their experiences and challenges.

    - Importance of Supporting Veterans:
       - Conversation emphasizes the significance of supporting veterans and addressing their unique needs.
       - Tech4Troops' mission to bridge the digital divide for veterans is highlighted.

    - Role of Video Games:
       - Guests discuss the positive impact of video games on their lives, aiding in relaxation and camaraderie.
       - Highlight the therapeutic benefits of gaming for veterans.

    - Commitment to Sustainability:
       - Tech4Troops' commitment to sustainability, data destruction, and recycling efforts are discussed.
       - The environmental benefits of e-waste recycling are highlighted.

    - Educating Veterans:
       - Tech4Troops' in-person programs across the US to educate veterans in computer usage are emphasized.
       - The importance of providing education and skills to veterans for their successful transition is discussed.

    - Call to Action:
       - Encourage listeners to donate their electronics to support Tech4Troops' initiatives.
       - Highlight the significance of recycling e-waste for a sustainable future.
       - Express desire for expansion, collaboration with an educational institution, and increased support for veterans nationwide.


    Links

    Tech for Troops - https://techfortroops.org/

    Donate to T4T - https://techfortroops.org/support/donate/

    T4T Discord - https://discord.gg/jkqNAg9bT9

    T4T Twitch - http://twitch.tv/tech4troops

    Show More Show Less
    55 mins
  • Ep 61 - Tales from the De-Crypt
    Oct 31 2023

    In this Halloween-themed episode, the hosts share several spooky and comical IT horror stories submitted by listeners. One mishap involved a prank wav file being mistakenly played on thousands of households. Another incident recounted a technician's struggle to fix power outages amid a tropical storm. Mistakes like wrong hard drive shipments and accidental data erasure are also shared. 

    The speaker highlights the impact of network configuration errors and the importance of thorough double-checking. Lessons from various IT professionals are shared, including stories about wrong interface deletions, eerie experiences like a basement full of satanic symbols, close calls, and being trapped in an elevator. Other tales involve humorous incidents, near-death experiences, a hacking incident, and dealing with flash floods.

    Data centers with outdated equipment and piles of wires, comical encounters like spilling beer on the boss, and intricate phone system repairs turned lawsuits are discussed. Finally, an intricate cable management disaster resulting in a severe power outage affecting thousands of people is shared. The speaker expresses gratitude, encourages listeners to connect on social media, and emphasizes the need to back up configurations.

    **Links:**

    - Follow Alexis - https://linktr.ee/digital.byte
    - Join the Discord - https://discord.conft.show
    - Driven - https://www.driven.tech

    Thanks for tuning in to Conf T with your SE! If you found this episode informative and entertaining, please consider rating and reviewing our show on your favorite podcast platforms. Your support helps spread the word!

    Show More Show Less
    55 mins
  • Ep 60 - Safeguarding Bytes with Fortinet
    Oct 11 2023

    In this episode of Conf T with your SE, host Bryan Young welcomes special guest Steve Staurovsky from Fortinet. They start by discussing their previous meeting at the CT NUG event and the wide range of products in Fortinet's portfolio. The importance of interoperability and collaboration with other vendors in the industry is highlighted. Steve emphasizes the need for securing operational technology (OT) environments, especially in industrial and healthcare settings, where secure access and data transmission are crucial.

    The conversation then shifts to the challenges of securing and updating machines in the manufacturing industry that are connected to the network but cannot be easily updated due to their age. The speakers stress the importance of keeping these assets online and the difficulties in finding replacements or compatible hardware. They also discuss the lack of interaction between IT and OT, the vulnerabilities created by preventative maintenance schedules and legacy applications, and the increasing sophistication of ransomware attacks. Fortinet's EDR product is mentioned as a solution for securing legacy devices such as old versions of Windows.

    The need for legacy asset support is further emphasized through a story about a critical asset running on an outdated system. Fortinet's ability to run on unsupported assets and provide peace of mind is highlighted. The conversation then moves on to Fortinet's FortiLink feature, which enables traffic routing through the firewall, offering advantages in terms of defense in depth strategy and flexibility. The evolution of FortiGate firewall from separate boxes for different functions to a single integrated solution is discussed, along with the variety of hardware sizes, feature sets, and licensing options available.

    The speakers then delve into the cycle of expansion and contraction in IT, from mainframes and terminals to the current cloud services and multiple clouds. They touch on the increasing need for processing power and how the cloud addresses this demand. The conversation takes a nostalgic turn as they reminisce about gaming, specifically playing Unreal Tournament and attending a LAN party at the Rochester Institute of Technology. Fortinet's free training and certification program, offered during the pandemic, is mentioned, with praise for its high quality and polished production.

    The importance of using correct terminology in the IT industry is emphasized, along with a personal anecdote about using the correct terms with a doctor. The discussion briefly touches on Chromebooks and the speaker's experience with an original CR-48 Chromebook from Google. The speakers stress the significance of understanding and using the correct terminology in IT and networking, highlighting its impact on communication and professionalism. They also mention the benefits of having knowledge in electrical systems within the IT industry.

    The conversation veers towards programming and its integration into networking, mentioning the use of Postman and sharing their experiences with programming tasks. They conclude by briefly mentioning upcoming merchandise related to their podcast and recommending checking out Fortinet's training and certification at training.fortinet.com. The features of FortiGates, including the use of custom ASICs for better performance and lower power requirements, are discussed. The issues with the supply chain and its impact on product availability are touched upon, with an overall optimistic outlook for improvement.

    The cloud management capabilities of Fortinet's products are then explored, with a focus on FortiManager. The speaker explains how FortiManager allows centralized management and logging of devices, making changes and ensuring synchronization across multiple devices easier. The ability to templatize network configurations for scalability and automation is mentioned, along with the advantages of using FortiManager compared to manual device configuration. The availability of an Ansible playbook for automation is highlighted, and the importance of training to fully utilize Fortinet's offerings is emphasized. The diverse portfolio of Fortinet beyond the well-known FortiGate firewall is mentioned, and listeners are encouraged to explore their products. The episode concludes with an invitation to join the CT Network Users Group's Discord channel and to review and share the show.

     

    Links

    Discord: https://discord.conft.show

    Fortinet Training: https://training.fortinet.com

    Show More Show Less
    1 hr and 13 mins
  • Ep 59 - Redefining Storage with Pure Storage
    Sep 27 2023

    Show Notes: Episode 59 - Redefining Storage with Pure Storage | Conf T with your SE

    Overview
    In this episode of Conf T with your SE, Bryan Young welcomes Chandler Bassett from Pure Storage. Together, they explore the groundbreaking world of affordable SSD storage and discuss the history and evolution of Pure Storage. Tune in to learn about the company's innovative solutions to Flash reliability concerns, its execution pipeline, and its advanced technology for enhancing storage performance and efficiency.

    Topics Covered

    • Introduction to Pure Storage, a pioneer in redefining the storage array industry.
    • Insight into Pure Storage's software-driven approach and its impact on Flash reliability.
    • Pure Storage's execution pipeline and commitment to projections.
    • Introduction to Purity, Pure Storage's technology for managing wear leveling and cell health degradation.
    • Discussion on different features of Pure Storage arrays depending on the product family.
    • Analysis of the shift from traditional hard drives to SSDs and its implications.

    In-Depth Conversations

    • Examination of NAND flash storage, Pure arrays, Pure One, and SSDs.
    • Addressing concerns regarding supply chain disruptions due to factory fires and natural disasters.
    • Understanding the long-term benefits and future-proofing of investing in advanced storage solutions.
    • Exploring the Evergreen concept as a foundational model for Pure Storage.

    Pure Storage Products

    • Flash Arrays for legacy workloads, offering various data services and feature sets.
    • FlashBlade, originally built for analytics, now used primarily for data protection.
    • Portworx, a tool that simplifies microservices or Kubernetes-based architecture.
    • Collaboration with Cohesity to enhance data protection software.

    Concluding Thoughts

    • Reiteration of the importance of Evergreen and its role in keeping Pure's fleet modern.
    • Discussion on the environmental benefits and efficiencies of using Pure's technologies.
    • Chandler’s passion for Pure's product and platform, and his commitment to helping customers.
    • Invitation for listeners to join the discussion on Discord and to explore Pure's innovative solutions.

    Connect with Us

    • Join the conversation on Discord.
    • Reach out to Bryan Young for more insights.
    • Discover more about Pure Storage with Chandler Bassett.

    Don't miss out on this in-depth exploration of Pure Storage and the redefinition of storage solutions in the modern age. Tune in now!

    Show More Show Less
    1 hr and 10 mins
  • Ep 58 - Demystifying NaaS with Nile Secure
    Sep 13 2023

    **Show Notes:**

    In this episode, Bryan sits down with experts Austin Hawthorne and Michael Kowal from Nile to unpack the intriguing topic of networking as a service. Dive into the discussions that span from defining the technology to its market implications and challenges.

    **Topics Covered:**

    - Introduction to Networking as a Service:
      - Defined as tech always ready for business needs without complexities and costs.
      - Other definitions including broadband, outsourcing IT, and managed services.
      
    - Market Expectations:
      - Influence of cloud adoption disrupting the market.
      - Need for alignment of spend based on business performance.
      
    - Challenges:
      - For incumbent vendors to adjust due to tech debt, customer, and market demands.
      - Complexity of delivering network as-a-service compared to other as-a-service offerings.
      
    - Speed Benefits:
      - Frequent software upgrades, faster fixes, and reduced failure radius.
      
    - Network Deployment:
      - Standardizing approaches for predictive outcomes.
      - Secure networking involving zero trust and RADIUS.
      
    - Automation & Configuration:
      - Addressing underlying complexities before introducing automation.
      - Reducing bugs through streamlined testing and the concept of a digital twin.
      
    - Vendor Challenges:
      - Existing codebase sizes, feature support, and delay in fixes and new features.
      - Documenting profiles for new QS features and identifying bug dependencies.
      
    - Security Aspects:
      - Approaches to network edge security.
      - Challenges between security and network teams.
      - The trade-off between risk, complexity, and cybersecurity insurance.
      
    - Zero-Trust Principles:
      - Challenges with implementing dynamic ACLs, roles, and more.
      - Importance of encryption, authorization, and enforcement.
      - Limitations of traditional networking setups using VLANs.
      
    - Firewalls:
      - Machine-to-machine traffic and security benefits.
      - Local switching and RADIUS and DHCP server roles.
      
    - Network Access Control (NAC):
      - Definition and implementations.
      - SSO as a form of NAC and Zero Trust constructs for the network layer.
      
    - Nile Network:
      - Payment models and Proof of Value (POV) offerings.
      
    - Network Implementation & Automation:
      - Benefits of automation over manual approaches.
      - Introduction of soft bots and Nile service block.
      
    - Closing Notes:
      - Visit the show's website, rate, and review the episodes, and reach out with questions, comments, or suggestions.

    ---

    **Links:**

    - Nile Secure - www.nilesecure.com
    - Join the Discord - discord.conft.show
    - Driven - www.driven.tech

    Thanks for tuning in to Conf T with your SE! If you found this episode informative and entertaining, please consider rating and reviewing our show on your favorite podcast platforms. Your support helps spread the word!

    Show More Show Less
    1 hr and 36 mins