Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Red Team Warfare: A Navy Cyber Officer's Inside Look at Military Offensive Operations

41:13
 
Share
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on December 01, 2025 11:12 (10d ago)

What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 519866455 series 3404023
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBits, breaks down why traditional penetration tests become obsolete in weeks—and how continuous red teaming changes the game. From hunting pirates in the Indian Ocean to defending critical infrastructure, Foster shares hard-earned lessons about adversarial thinking, operational risk management, and why the junior person in the room might spot your biggest vulnerability.

What You'll Learn:

  • Why red teaming creates psychological advantages penetration testing can't match
  • How operational risk management translates technical findings into executive action
  • The real cost of point-in-time security assessments (hint: ask St. Paul, Minnesota)
  • Military-grade frameworks for continuous threat simulation in civilian organizations
  • Why attackers operate 365 days a year—but most organizations test once

Don't let your organization become another headline. Security teams need to think like attackers, not just defenders. Subscribe for more conversations that challenge conventional cybersecurity thinking.

#RedTeam #CybersecurityStrategy #PenetrationTesting #MilitaryCyber #ThreatHunting #InfoSec

  continue reading

Chapters

1. Host Intros And Guest Background (00:00:00)

2. Navy Career And Cyber Foundations (00:00:38)

3. Limits Of Traditional Red Teaming (00:00:59)

4. Outside-In Validation And Psychology (00:02:11)

5. Why Assessments Go Stale So Fast (00:03:15)

6. Minnesota Breaches And Public Impact (00:04:08)

7. Compliance Trap And Continuous Posture (00:05:28)

8. What Red Teaming Really Is (00:06:24)

9. Separation Of Teams And Game Planning (00:08:00)

10. Culture Shift To Proactive Security (00:10:00)

11. Board-Level Accountability And Funding (00:11:27)

12. Transparency Risks In Public Sector (00:13:10)

13. Military Vs Civilian Red Team Realities (00:14:24)

14. Incentives, Insurance, And Buy-In (00:16:35)

15. Making Cyber Tangible For Leaders (00:18:04)

16. A Junior Analyst Changes Everything (00:19:49)

17. Communicating Findings As Business Risk (00:22:05)

18. Elevating Young Talent And Embracing AI (00:24:10)

19. Piracy Lessons For Cyber Defense (00:26:05)

20. Remediation The Right And Wrong Way (00:28:00)

21. Continuous Follow-Through And False Positives (00:29:20)

22. Closing And Where To Find Guests (00:39:33)

80 episodes

Artwork
iconShare
 

Fetch error

Hmmm there seems to be a problem fetching this series right now. Last successful fetch was on December 01, 2025 11:12 (10d ago)

What now? This series will be checked again in the next day. If you believe it should be working, please verify the publisher's feed link below is valid and includes actual episode links. You can contact support to request the feed be immediately fetched.

Manage episode 519866455 series 3404023
Content provided by IT Audit Labs. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IT Audit Labs or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

What if your security team is playing defense while hackers play offense 24/7? Foster Davis, former Navy cyber warfare officer and founder of BreachBits, breaks down why traditional penetration tests become obsolete in weeks—and how continuous red teaming changes the game. From hunting pirates in the Indian Ocean to defending critical infrastructure, Foster shares hard-earned lessons about adversarial thinking, operational risk management, and why the junior person in the room might spot your biggest vulnerability.

What You'll Learn:

  • Why red teaming creates psychological advantages penetration testing can't match
  • How operational risk management translates technical findings into executive action
  • The real cost of point-in-time security assessments (hint: ask St. Paul, Minnesota)
  • Military-grade frameworks for continuous threat simulation in civilian organizations
  • Why attackers operate 365 days a year—but most organizations test once

Don't let your organization become another headline. Security teams need to think like attackers, not just defenders. Subscribe for more conversations that challenge conventional cybersecurity thinking.

#RedTeam #CybersecurityStrategy #PenetrationTesting #MilitaryCyber #ThreatHunting #InfoSec

  continue reading

Chapters

1. Host Intros And Guest Background (00:00:00)

2. Navy Career And Cyber Foundations (00:00:38)

3. Limits Of Traditional Red Teaming (00:00:59)

4. Outside-In Validation And Psychology (00:02:11)

5. Why Assessments Go Stale So Fast (00:03:15)

6. Minnesota Breaches And Public Impact (00:04:08)

7. Compliance Trap And Continuous Posture (00:05:28)

8. What Red Teaming Really Is (00:06:24)

9. Separation Of Teams And Game Planning (00:08:00)

10. Culture Shift To Proactive Security (00:10:00)

11. Board-Level Accountability And Funding (00:11:27)

12. Transparency Risks In Public Sector (00:13:10)

13. Military Vs Civilian Red Team Realities (00:14:24)

14. Incentives, Insurance, And Buy-In (00:16:35)

15. Making Cyber Tangible For Leaders (00:18:04)

16. A Junior Analyst Changes Everything (00:19:49)

17. Communicating Findings As Business Risk (00:22:05)

18. Elevating Young Talent And Embracing AI (00:24:10)

19. Piracy Lessons For Cyber Defense (00:26:05)

20. Remediation The Right And Wrong Way (00:28:00)

21. Continuous Follow-Through And False Positives (00:29:20)

22. Closing And Where To Find Guests (00:39:33)

80 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play