SecOops Cybersecurity Podcast cover art

SecOops Cybersecurity Podcast

SecOops Cybersecurity Podcast

By: Ben Moiz and Sneh
Listen for free

About this listen

Join Ben, Moiz, and Sneh as they explore the ever-evolving world of cybersecurity. From phishing scams and hacking stories to emerging threats and defense strategies, they break down complex topics into relatable conversations. Whether you’re a tech pro or just cyber-curious, tune in to learn, laugh, and stay ahead of the latest in security—because in cybersecurity, there’s always an “oops” to uncover.Ben, Moiz and Sneh
Episodes
  • Deep Dive Series – Episode 3 – Advanced Threat Hunting: Tools, Frameworks, and Mindset
    Dec 1 2025

    🎙️ Episode: Advanced Threat Hunting – Tools, Frameworks, and Mindset


    In this episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, hosts Ben, Moiz, and Sneh take you deep into the proactive world of Advanced Threat Hunting. We explore the critical shift from reactive "alert fatigue" to a hypothesis-driven methodology—proactively searching for the sophisticated attackers already lurking past your perimeter defenses.


    We break down the essential Hunter's Mindset—one of curiosity, skepticism, and thinking like the adversary. You’ll learn how to build a scalable hunt program, justify its value to the business, and most importantly, how to use frameworks like MITRE ATT&CK to structure your searches around durable TTPs (Tactics, Techniques, and Procedures), rather than fleeting IoCs.


    👉 Tune in for a technical deep-dive on leveraging the right data sources (endpoint, network, logs), how to move beyond simple rules with statistical analysis, and the practical tools you need to find the "needle in the haystack" before it's too late.

    Show More Show Less
    27 mins
  • Deep Dive Series – Episode 2 – Zero Trust: The Real-World Implementation Guide
    Nov 1 2025

    🎙️ Episode: Zero Trust – The Real-World Implementation Guide


    In this episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, hosts Ben, Moiz, and Sneh cut through the hype to deliver a practical roadmap for Zero Trust.


    We explore the core philosophy of "never trust, always verify" and why the traditional "castle-and-moat" security model is obsolete. This episode provides the definitive 5-step implementation methodology: from identifying your "crown jewels" (the Protect Surface) and mapping transaction flows, to building micro-perimeters and writing rich, context-aware policies.


    You’ll also hear insights on how to scale this strategy for your organization—whether you’re a small business needing a tactical "bottom-up" win or a large enterprise requiring a "top-down" strategic plan. We tackle real-world hurdles, like securing legacy systems and the practical steps to replacing the VPN.


    👉 Tune in to learn how to build a modern, resilient security architecture that protects your most critical assets from the inside out—and how to align your strategy with your organization's business goals.

    Show More Show Less
    37 mins
  • Deep Dive Series – Episode 1 – Defense in Depth: The Layered Approach to Modern Security
    Oct 25 2025

    🎙️ Episode: Defense in Depth – The Layered Approach to Modern Security


    In this debut episode of the Deep Dive Series by Sec Oops, powered by Cyber View Point, hosts Ben, Moiz, and Sneh unravel one of cybersecurity’s most fundamental and enduring strategies — Defense in Depth.


    We explore how layering multiple security controls across people, processes, and technology forms the backbone of modern cyber resilience. From understanding risk-based control design and the CIA Triad, to integrating Zero Trust, SOAR, and threat intelligence, this episode breaks down how true layered security works in practice.


    You’ll also hear insights on how AI, automation, and deception technologies are transforming traditional defense models — and why the human element remains the most unpredictable layer of all. Real-world case studies highlight where Defense in Depth has succeeded, failed, and evolved into adaptive security.


    👉 Tune in to learn how to architect a resilient, multi-layered defense strategy that goes beyond firewalls and policies — one that anticipates, adapts, and endures against today’s most sophisticated threats.

    Show More Show Less
    18 mins
No reviews yet