Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Jess Vachon. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jess Vachon or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Groundbreaker: Lessons from the Many Layers of Cyber

48:08
 
Share
 

Manage episode 514013425 series 3642651
Content provided by Jess Vachon. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jess Vachon or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Send us a text

Careers aren’t linear, and the most resilient defenders are forged in the messy middle. We sit down with Andrea Pullman—Air Force veteran, former Microsoft incident responder, and enterprise security advisor—to trace a path from identity trenches to global ransomware recovery and back to the architecture that holds it all together. Andrea opens the vault on Pass‑the‑Hash, ESAE bastion forests, and privileged access workstations, then connects those lessons to today’s Entra ID, Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps. If you’ve wondered how identity-first practices evolved into a full-stack defense strategy, this conversation maps the terrain with clarity.
What stands out is her through-line of grit. The military taught attention to detail, respect for mission, and composure under stress—skills that translate directly to enterprise response. Andrea explains how compromise recovery belongs beside incident response, not behind it, and why durable outcomes hinge on credential hygiene, tiered access, and secure admin workflows. We also explore the promise and limits of AI in detection and response: better signal and speed, not silver bullets, and the operational discipline required to turn insights into lasting change.
Community threads through every chapter. Scholarship for Service linked education to public impact and built a network that endures. Cyberjutsu—where Andrea now serves on the board—offers a technical, welcoming space that expects moxie and helps members level up through peer-led Small Tribes mentorship. We close with a bold wish: kill the password. Moving toward passkeys and passwordless reduces entire attack classes and the human burden that fuels social engineering. If you’re navigating a cyber career, leveling up your IR program, or looking for a community that matches your grit, you’ll find practical guidance and fresh energy here.
If this resonated, subscribe, leave a quick review, and share with a teammate who needs a nudge forward. Your support helps us bring more candid, useful conversations to your feed.

Support the show

https://www.vigilantviolet.com/
www.linkedin.com/in/jessvachon1

  continue reading

Chapters

1. Welcome & Guest Introduction (00:00:00)

2. Microsoft Security Roles & Scope (00:01:02)

3. Identity Roots and Pass‑the‑Hash Era (00:05:20)

4. From Recovery to Incident Response (00:10:40)

5. Tooling, Detections, and AI Hopes (00:13:40)

6. Military Foundations & Life Lessons (00:15:24)

7. Scholarship for Service Journey (00:22:36)

8. Community, DEF CON, and Career Growth (00:28:16)

9. Cyberjutsu: Community and Small Tribes (00:33:44)

10. The One Wish: Kill the Password (00:39:10)

11. Closing Remarks & Listener Ask (00:46:00)

10 episodes

Artwork
iconShare
 
Manage episode 514013425 series 3642651
Content provided by Jess Vachon. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jess Vachon or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Send us a text

Careers aren’t linear, and the most resilient defenders are forged in the messy middle. We sit down with Andrea Pullman—Air Force veteran, former Microsoft incident responder, and enterprise security advisor—to trace a path from identity trenches to global ransomware recovery and back to the architecture that holds it all together. Andrea opens the vault on Pass‑the‑Hash, ESAE bastion forests, and privileged access workstations, then connects those lessons to today’s Entra ID, Defender for Endpoint, Defender for Identity, and Defender for Cloud Apps. If you’ve wondered how identity-first practices evolved into a full-stack defense strategy, this conversation maps the terrain with clarity.
What stands out is her through-line of grit. The military taught attention to detail, respect for mission, and composure under stress—skills that translate directly to enterprise response. Andrea explains how compromise recovery belongs beside incident response, not behind it, and why durable outcomes hinge on credential hygiene, tiered access, and secure admin workflows. We also explore the promise and limits of AI in detection and response: better signal and speed, not silver bullets, and the operational discipline required to turn insights into lasting change.
Community threads through every chapter. Scholarship for Service linked education to public impact and built a network that endures. Cyberjutsu—where Andrea now serves on the board—offers a technical, welcoming space that expects moxie and helps members level up through peer-led Small Tribes mentorship. We close with a bold wish: kill the password. Moving toward passkeys and passwordless reduces entire attack classes and the human burden that fuels social engineering. If you’re navigating a cyber career, leveling up your IR program, or looking for a community that matches your grit, you’ll find practical guidance and fresh energy here.
If this resonated, subscribe, leave a quick review, and share with a teammate who needs a nudge forward. Your support helps us bring more candid, useful conversations to your feed.

Support the show

https://www.vigilantviolet.com/
www.linkedin.com/in/jessvachon1

  continue reading

Chapters

1. Welcome & Guest Introduction (00:00:00)

2. Microsoft Security Roles & Scope (00:01:02)

3. Identity Roots and Pass‑the‑Hash Era (00:05:20)

4. From Recovery to Incident Response (00:10:40)

5. Tooling, Detections, and AI Hopes (00:13:40)

6. Military Foundations & Life Lessons (00:15:24)

7. Scholarship for Service Journey (00:22:36)

8. Community, DEF CON, and Career Growth (00:28:16)

9. Cyberjutsu: Community and Small Tribes (00:33:44)

10. The One Wish: Kill the Password (00:39:10)

11. Closing Remarks & Listener Ask (00:46:00)

10 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play