Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Joseph Carson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joseph Carson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Understanding Identity Threats in Cybersecurity with Filipi Pires

48:03
 
Share
 

Manage episode 494773169 series 3666971
Content provided by Joseph Carson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joseph Carson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Security by Default podcast, host Joe Carson speaks with Filipi Pires, a cybersecurity expert with a diverse background in both technical and sales roles. They discuss Filipi's journey into cybersecurity, the importance of identity in security, and the challenges organizations face with misconfiguration. The conversation also covers tools and techniques used in cybersecurity research, the significance of observability, and the need for continuous learning in the field. Filipi shares insights on community engagement and the importance of respecting the journey in one's cybersecurity career.

Takeaways

  • Identity is a central theme in cybersecurity.
  • Misconfiguration is a leading cause of security issues.
  • Continuous learning is essential in the cybersecurity field.
  • Tools should be used to understand techniques, not just for their own sake.
  • Community engagement is vital for knowledge sharing.
  • Phishing remains a simple yet effective attack method.
  • Legacy software poses significant risks to organizations.
  • Observability is crucial for effective security management.
  • Respecting the journey in cybersecurity is important for growth.

Chapters

  • 00:00 Introduction to Cybersecurity Journey
  • 02:49 Exploring Cybersecurity Research and Trends
  • 05:32 Tools and Techniques in Cybersecurity Research
  • 08:34 Learning Through Capture The Flag Events
  • 11:28 Identity Threats and Misconfigurations
  • 14:16 Legacy Systems and Their Impact on Security
  • 25:40 Understanding Use Cases in Security Permissions
  • 27:36 The Principle of Least Privilege
  • 29:31 The Complexity of Identity Management
  • 30:28 Challenges in Observability and Access Control
  • 32:16 Navigating Multi-Cloud Permissions
  • 34:07 Tools for Enhancing Security Visibility
  • 36:14 Continuous Learning in Cybersecurity
  • 41:53 Community Engagement and Knowledge Sharing
  • 45:32 Respecting the Journey in Cybersecurity

  continue reading

9 episodes

Artwork
iconShare
 
Manage episode 494773169 series 3666971
Content provided by Joseph Carson. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Joseph Carson or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

In this episode of the Security by Default podcast, host Joe Carson speaks with Filipi Pires, a cybersecurity expert with a diverse background in both technical and sales roles. They discuss Filipi's journey into cybersecurity, the importance of identity in security, and the challenges organizations face with misconfiguration. The conversation also covers tools and techniques used in cybersecurity research, the significance of observability, and the need for continuous learning in the field. Filipi shares insights on community engagement and the importance of respecting the journey in one's cybersecurity career.

Takeaways

  • Identity is a central theme in cybersecurity.
  • Misconfiguration is a leading cause of security issues.
  • Continuous learning is essential in the cybersecurity field.
  • Tools should be used to understand techniques, not just for their own sake.
  • Community engagement is vital for knowledge sharing.
  • Phishing remains a simple yet effective attack method.
  • Legacy software poses significant risks to organizations.
  • Observability is crucial for effective security management.
  • Respecting the journey in cybersecurity is important for growth.

Chapters

  • 00:00 Introduction to Cybersecurity Journey
  • 02:49 Exploring Cybersecurity Research and Trends
  • 05:32 Tools and Techniques in Cybersecurity Research
  • 08:34 Learning Through Capture The Flag Events
  • 11:28 Identity Threats and Misconfigurations
  • 14:16 Legacy Systems and Their Impact on Security
  • 25:40 Understanding Use Cases in Security Permissions
  • 27:36 The Principle of Least Privilege
  • 29:31 The Complexity of Identity Management
  • 30:28 Challenges in Observability and Access Control
  • 32:16 Navigating Multi-Cloud Permissions
  • 34:07 Tools for Enhancing Security Visibility
  • 36:14 Continuous Learning in Cybersecurity
  • 41:53 Community Engagement and Knowledge Sharing
  • 45:32 Respecting the Journey in Cybersecurity

  continue reading

9 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play