Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
…
continue reading
Mandiant Podcasts
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
The Security Perspectives Podcast is a show that explores the world of information security and provides valuable insights into starting and advancing a career in this exciting field. Hosted by Nikolas Behar, each episode features a guest who shares their unique perspective on the latest trends, challenges, and opportunities in information security. From red team operators to chief information security officers, guests offer valuable advice and practical tips for listeners looking to break i ...
…
continue reading
In the season five finale of the Cyber Security Mentors podcast, hosts Steve and John reflect on the season's highlights, featuring insightful discussions with various cybersecurity experts. They recap key lessons learned, including leadership during crises, negotiation tactics, and the importance of community support. The episode also addresses li…
…
continue reading
1
We Tested ACI Learning’s Security+ Bundle — Here’s What We Found
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57In this episode of the Cyber Security Mentals podcast, hosts Steve and John delve into effective strategies for studying cybersecurity. They discuss the importance of structured learning, hands-on labs, and consistent practice, while exploring the challenges of self-paced learning. The episode highlights the benefits of programs like ACI Learning a…
…
continue reading
1
Think Like a Spy, Hunt Like a Hacker: Former FBI Agent Eric O’Neill on Outsmarting Cybercriminals
46:47
46:47
Play later
Play later
Lists
Like
Liked
46:47In this episode of the Cybersecurity Mentors Podcast, Eric O'Neill shares his experiences as an undercover FBI agent who caught one of the most damaging spies in U.S. history, Robert Hansen. He discusses the evolution of cybercrime, the importance of understanding cyber attacks, and the intersection of espionage and cybersecurity. O'Neill emphasize…
…
continue reading
1
Inside Mandiant: Charles Carmakal on the Front Lines of Global Cyber Warfare
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04In this episode of the Cybersecurity Mentors Podcast, Charles Carmakal, CTO at Mandiant, discusses the current state of cybersecurity, the evolving threat landscape, and the importance of resilience in organizations. He emphasizes the ongoing arms race between cyber attackers and defenders, the rise of ransomware and extortion tactics, and the crit…
…
continue reading
1
Lessons Learned From the Australian National University Breach with Suthagar Seevaratnam - Part 2
52:02
52:02
Play later
Play later
Lists
Like
Liked
52:02In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public br…
…
continue reading
1
Lessons Learned From the Australian National University Breach with Suthagar Seevaratnam - Part 1
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31In this episode of the Cybersecurity Mentors Podcast, Suthagar Seevaratnam, a former CISO at the Australian National University, shares his journey into cybersecurity and the challenges faced during a significant data breach. He discusses the importance of addressing organizational trauma, effective leadership during crises, and the human element i…
…
continue reading
1
Job Offer, Raise, or Promotion? Here’s How to Negotiate All Three
1:02:12
1:02:12
Play later
Play later
Lists
Like
Liked
1:02:12In this episode of the Cybersecurity Mentors Podcast, we break down how to negotiate with confidence — whether you’re reviewing a job offer, asking for a raise, or chasing that next promotion. Drawing from years of leadership experience, they share real-world stories about what hiring managers actually think during negotiations, how to spot red fla…
…
continue reading
Sarah Yoder (Manager, Mandiant Consulting) and Ashley Pearson (Senior Analyst, Advanced Practices on Google Threat Intelligence Group) join host Luke McNamara to discuss UNC5221 and their operations involving BRICKSTORM backdoor. This highly sophisticated, suspected China-nexus cyber-espionage threat group is known for aggressively targeting intern…
…
continue reading
1
Turning Sheep Into Wolves: Brian Brushwood’s Plan to Defend Against the Scampocalypse
50:50
50:50
Play later
Play later
Lists
Like
Liked
50:50Magician, podcaster, and World’s Greatest Con creator Brian Brushwood joins us to talk about the coming Scampocalypse, where AI-powered deception meets human vulnerability. We dive into how magic, psychology, and “deceptive role play” can transform security awareness from boring quizzes into hands-on human defense training. Learn why Brian says it’…
…
continue reading
1
How vSphere Became a Target for Adversaries
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01Stuart Carrera (Senior Consultant, Mandiant Consulting) joins host Luke McNamara to discuss how threat actors are increasingly targeting the VMware vSphere estate, and leveraging in this environment to conduct extortion and data theft. Stuart details why this has become an attractive target, and ways organizations can better engineer detections to …
…
continue reading
1
Ask Us Anything: Cybersecurity Career Q&A — Season 4 Finale
1:00:53
1:00:53
Play later
Play later
Lists
Like
Liked
1:00:53In the Season 4 finale of The Cybersecurity Mentors Podcast, Steve and John wrap up an incredible season with a special listener-driven Q&A. The episode opens with a recap of Episodes 1–7, revisiting key lessons on soft skills, leadership, resume pitfalls, networking strategies, and inspiring career journeys. From there, they dive into your most pr…
…
continue reading
1
The Networking Do’s and Don’ts in Cybersecurity
49:47
49:47
Play later
Play later
Lists
Like
Liked
49:47In this episode of The Cybersecurity Mentors Podcast, Steve and John explore one of the most powerful career accelerators in cybersecurity: networking. While a strong resume might get you noticed, it’s meaningful relationships that truly open doors. Together, we unpack the key do’s — being genuine, consistent, and adding value — and highlight the c…
…
continue reading
1
Land the Job: The 10 Resume Mistakes Holding You Back in Cybersecurity
49:54
49:54
Play later
Play later
Lists
Like
Liked
49:54Are you applying for cybersecurity jobs but not getting interviews? The problem might be your resume. In this episode of The Cybersecurity Mentors Podcast, we break down the Top 10 Resume Mistakes holding you back from landing your first cybersecurity role—and show you exactly how to fix them. From weak objectives to cluttered skills sections, irre…
…
continue reading
1
Interview with Grant Adams: How Picking Locks Opened the Door to a Cybersecurity Career
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38In this episode of the Cybersecurity Mentors Podcast, Grant Adams returns to share his journey over the past year, focusing on his job search experience, the importance of networking, and insights from his interview process. One highlight of his story is how a conversation at a lock-picking table during an in-person conference led directly to his c…
…
continue reading
1
AI Tools and Sentiment Within the Underground Cyber Crime Community
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Michelle Cantos (Senior Analyst, Google Threat Intelligence Group) joins host Luke McNamara to discuss some of the recent trends in underground marketplaces around the selling of illicit AI tools and services. Michelle discusses GTIG's research into this space, how threat actors are seeking to leverage these models, use cases being discussed, and m…
…
continue reading
1
Interview with Dr. TJ O'Connor: Enthusiasm is common, endurance is rare.
1:05:51
1:05:51
Play later
Play later
Lists
Like
Liked
1:05:51In this episode of the Cybersecurity Mentors Podcast, Dr. TJ O'Connor shares his journey from West Point to a retired U.S. Army Lieutenant Colonel and cybersecurity educator. He discusses his experiences at West Point, his military career, and the importance of hands-on learning in cybersecurity. Dr. O'Connor emphasizes the value of competitions in…
…
continue reading
1
Interview with Evan Reiser: Founder & CEO of Abnormal AI
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59In this episode of the Cybersecurity Mentors Podcast, John, Steve, and Evan Reiser, Founder & CEO of Abnormal AI, discuss Evan's journey from a gaming enthusiast to a leader in cybersecurity. We explore the evolution of email security, the impact of AI on the industry, and the importance of mentorship and continuous learning. Evan shares valuable l…
…
continue reading
In this episode of the Cybersecurity Mentors Podcast, we discuss the critical role of leadership in cybersecurity, emphasizing the principles of Extreme Ownership as outlined in Jocko Willink's book. We explore how effective leadership goes beyond technical skills, focusing on communication, team dynamics, and the importance of humility. The conver…
…
continue reading
1
Protecting the Core: Securing Protection Relays in Modern Substations
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Host Luke McNamara is joined by members of Mandiant Consulting's Operational Technology team (Chris Sistrunk, Seemant Bisht, and Anthony Candarini) to discuss their latest blog on securing assets in the energy grid. https://cloud.google.com/blog/topics/threat-intelligence/securing-protection-relays-modern-substations…
…
continue reading
1
Unlocking the Power of Soft Skills in Cybersecurity
1:02:26
1:02:26
Play later
Play later
Lists
Like
Liked
1:02:26In this episode of the Cyber Security Mentors Podcast, we discuss the critical role of soft skills in the cybersecurity field. We emphasize that while technical skills are essential, soft skills such as communication, empathy, adaptability, critical thinking, and teamwork are equally important for career growth and success. We provide insights on h…
…
continue reading
Dima Lenz (Security Engineer, Google Threat Intelligence Group) joins host Luke McNamara to discuss how threat actors have been using ClickFix to socially engineer users. Dima recounts the growth of this technique in 2024, some of the campaigns and actors that have leveraged it, and where it may be headed next.…
…
continue reading
1
Carlos Lozano - Founder @ BugCon 🇲🇽
1:04:54
1:04:54
Play later
Play later
Lists
Like
Liked
1:04:54https://bugcon.org/
…
continue reading
1
Can a Mentor or Coach Really Help You Succeed in Cybersecurity?
1:00:47
1:00:47
Play later
Play later
Lists
Like
Liked
1:00:47Can a cybersecurity mentor or coach really help you break into or grow your career? In this episode, we break down the difference between mentorship and coaching, why investing in guidance matters, and what a structured 6-month mentorship journey looks like. We also share real success stories from our mentees—and why going it alone might be slowing…
…
continue reading
Nick Guttilla and Emily Astranova, from Mandiant Consulting's Offensive Security team, join host Luke McNamara for an episode on voice-based phishing, or "vishing." Nick and Emily cover their respective blogs and experiences, diving into how they employ vishing techniques to social engineer organizations--both organically and using AI-powered voice…
…
continue reading
1
Mastering Cybersecurity: Part 3 - Hack to Defend: Why Offensive Knowledge Matters
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33In Part 3 of our Mastering Cybersecurity series, we explore why learning how to hack isn’t just for red teamers — it’s a critical skill for defenders, too. Understanding offensive tactics can sharpen your defensive abilities, improve threat detection, and help you shift from reactive to proactive security. Plus, having both offensive and defensive …
…
continue reading
1
A Day in the Life of a Penetration Tester with Carson Sallis
46:54
46:54
Play later
Play later
Lists
Like
Liked
46:54In this episode, we chat with Carson Sallis, Senior Offensive Security Engineer and Vulnerability Researcher at NVIDIA. Carson walks us through a day in the life of a pentester and shares actionable advice for anyone looking to break into offensive security. He also gives a live demo of fuzzing with AFL (American Fuzzy Lop) and explains how tools l…
…
continue reading
JP Glab (Mandiant Consulting) joins host Luke to discuss responding to activity from North Korean IT workers. He walks through what initially triggered the investigation at this organization, how it progressed in parallel with an HR investigation, and ultimately what was discovered. For more on the DPRK IT workers and trends in incident response, c…
…
continue reading
1
Mastering Cybersecurity: Part 2 – Securing Systems and Environments
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33In this episode, Steve and John dive into why securing systems is a must-know skill in cybersecurity. Learn the basics of system hardening, access control, and logging, plus practical tools and labs to get hands-on. They also explore how AI can boost your defense game — and why thinking like both an attacker and defender will set you apart. +++++++…
…
continue reading
1
Craig Sheffield's Unconventional Journey Into Cybersecurity
1:01:54
1:01:54
Play later
Play later
Lists
Like
Liked
1:01:54Craig Sheffield shares his unconventional journey transitioning from teaching English in Taiwan to pursuing a cybersecurity career, highlighting how his background in music and audio engineering provided unexpected transferable skills. He also shares his candid experiences with the TryHackMe Security Analyst Level 1 certification. Episode Resources…
…
continue reading
1
Giovanni Cruz - Founder @ BSides Colombia
48:31
48:31
Play later
Play later
Lists
Like
Liked
48:31Una conversación con Giovanni Cruz, fundador de BSides Colombia https://bsidesco.org/ https://www.linkedin.com/in/cruzgio/
…
continue reading
1
UNC5221 and The Targeting of Ivanti Connect Secure VPNs
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Matt Lin (Senior Incident Response Consultant, Mandiant) and Daniel Spicer (Chief Security Officer, Ivanti) dive into the research and response of UNC5221's campaigns against Ivanti. They cover how this threat actor has evolved from earlier campaigns, the continued focus of edge infrastructure by APT actors, and the shared responsibility of securit…
…
continue reading
1
Mastering Cybersecurity: Part 1 - Why learning how to "Build" is Essential
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In this episode, we delve into the often-overlooked yet fundamental importance of learning how to "build" systems, networks, and applications for cybersecurity professionals. Coining the philosophy "Build, Secure, Hack," we explore why hands-on experience in building provides an essential foundation for effectively securing and ultimately understan…
…
continue reading
1
Peeling Back the Network Layers with Doug Burks
1:05:10
1:05:10
Play later
Play later
Lists
Like
Liked
1:05:10In this episode, we talk with Doug Burks, founder and CEO of Security Onion Solutions. He shares his journey from computer enthusiast to cybersecurity company founder and how he's helping defenders catch bad guys through accessible network security monitoring tools. We also discuss how important setting up your home lab is as a crucial learning env…
…
continue reading
1
Mastering the Art of Deception in Cybersecurity
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26In this episode, we dive deep into the world of cyber deception—from classic honeypots to canary tokens and more. Learn how deception isn't just a defense tactic, but a skill every aspiring cybersecurity analyst should master. We'll explore real-world stories, ethical considerations, and how strategic deception can give you the upper hand against a…
…
continue reading
1
Windows Remote Desktop Protocol: Remote to Rogue
34:27
34:27
Play later
Play later
Lists
Like
Liked
34:27Host Luke McNamara is joined by GTIG Senior Security Researcher Rohit Nambiar to discuss Rohit's recent blog on some interesting usage of RDP by UNC5837. Rohit covers the discovery of the campaign, and the novel functionalities they were using to likely support cyber espionage goals. He delves into these findings and the usage of RemoteApps and vic…
…
continue reading
1
Cybersecurity Conversations with the C-Suite and Board
36:14
36:14
Play later
Play later
Lists
Like
Liked
36:14Imran Ahmad (Senior Partner, Canadian Head of Technology and Canadian Co-Head of Cybersecurity and Data Privacy at Norton Rose Fulbright) joins host Luke McNamara to discuss how executives are thinking about cyber risk in a changing and evolving landscape. He touches on the importance of training before a breach, how ransomware has changed security…
…
continue reading
Kelli Vanderlee, Kate Morgan, and Jamie Collier join host Luke McNamara to discuss trends that are top of mind for them in tracking emergent threats this year, from nation state intrusions to financially motivated ransomware campaigns. https://cloud.google.com/security/resources/cybersecurity-forecast https://cloud.google.com/blog/topics/threat-int…
…
continue reading
1
Navigating today's job market with Kelly Belding
56:29
56:29
Play later
Play later
Lists
Like
Liked
56:29This episode delves into the current state of the cybersecurity job market and offers essential strategies for breaking into the industry. Kelly Belding, an experienced IT recruiter, discusses hiring trends, the importance of relevant skills and certifications, and the significant role of networking for career advancement. • Overview of the changin…
…
continue reading
In this episode we chat with Daniel, who is just starting on his journey in cybersecurity. We work to give him guidance, direction, and a roadmap for landing his first job. • What sparked Daniel's interest in cybersecurity • Current job enhances troubleshooting skills and problem-solving mindset • Pursuing cybersecurity certifications one step at a…
…
continue reading