Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

Embrace an Attacker Mindset to Improve Security

Embrace an Attacker Mindset to Improve Security

From8th Layer Insights


Embrace an Attacker Mindset to Improve Security

From8th Layer Insights

ratings:
Length:
64 minutes
Released:
Aug 3, 2021
Format:
Podcast episode

Description

Have you ever taken time to view the world through the eyes of an attacker? Doing so is an interesting and useful exercise. Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren’t simply oblivious to your vulnerabilities. 
This episode is a deep dive into attacker mindsets, we’ll hear from four experts who really know what it is to view the world through the eyes of an attacker. Featuring Chris Kirsch (DEF CON Social Engineering CTF Black Badge winner and co-founder of Rumble, Inc.), David Kennedy (Founder of Binary Defense and TrustedSec), Maxie Reynolds (Author of The Art of Attack: Attacker Mindset for Security Professionals, and Technical Team Leader, Social-Engineer, LLC), and Ted Harrington (Author of Hackable: How to Do Application Security Right, and Executive Partner at Independent Security Evaluators).
Guests:

Maxie Reynolds (https://www.linkedin.com/in/maxiereynolds/)

David Kennedy (https://www.linkedin.com/in/davidkennedy4/)

Chris Kirsch (https://www.linkedin.com/in/ckirsch/)

Ted Harrington (https://www.linkedin.com/in/securityted/)


Books and References:

Bruce Schneier blog about the Security Mindset: https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html


Origin of "Devil's Advocate": https://allthatsinteresting.com/devils-advocate-origin


Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html


What is Threat Modeling: https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/


12 Methods of threat Modeling: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/



The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds


Hackable: How to Do Application Security Right by Ted Harrington


The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick


Threat Modeling: Designing for Security by Adam Shostack


Threat Modeling: A Practical Guide for Development Teams by Izar Tarandach and Matthew J. Coles


Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter


Music and Sound Effects by Blue Dot Sessions & Storyblocks.
Artwork by Chris Machowski.
Released:
Aug 3, 2021
Format:
Podcast episode

Titles in the series (56)

Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.