Blueprint: Build the Best in Cyber Defense
Podrobnosti kanálu
Blueprint: Build the Best in Cyber Defense
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews w...
Nedávné epizody
62 epizod
Leading by Example: Confidence and Responsibilty in Cybersecurity with Zak Stufflebeam
Click here to send us your ideas and feedback on Blueprint!
In this episode, we sit down with Zak Stufflebeam, Director of Cybersecurity at a pu...

From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
Click here to send us your ideas and feedback on Blueprint!
This podcast episode is from the SANS Cyber Leaders Podcast.
The episode featu...

Redefining Security Operations: Lessons in AI Integration with James Spiteri
Click here to send us your ideas and feedback on Blueprint!
In this episode of Blueprint, host John Hubbard sits down with James Spiteri from El...

From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec
Click here to send us your ideas and feedback on Blueprint!
In this episode, we sit down with Rich Greene, a former United States Army Special F...

SOC Dashboards Done Right with Ryan Thompson
Click here to send us your ideas and feedback on Blueprint!
In this episode, we sit down with Ryan Thompson, a seasoned expert in building dashb...

Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard
Click here to send us your ideas and feedback on Blueprint!
Surprise!! It's a mini solo episode to kick off the new year and it's on one of the...

How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud
Click here to send us your ideas and feedback on Blueprint!
Mark Morowczynski returns for his 4th(!) time with his Microsoft coworker and identi...

From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin
Click here to send us your ideas and feedback on Blueprint!
In this episode, we take you behind the scenes of a complex gift card fraud investig...

How GenAI is Changing Your SOC for the Better with Seth Misenar
Click here to send us your ideas and feedback on Blueprint!
In this mega-discussion with Seth Misenar on GenAI and LLM usage for security operat...

Bonus Episode: What does it take to author a cybersecurity book?
Click here to send us your ideas and feedback on Blueprint!
Have you ever wondered what it takes to write and publish an information security bo...

Strategy 11: Turn up the Volume by Expanding SOC Functionality
Click here to send us your ideas and feedback on Blueprint!
"This final chapter of the book is no simple closer! "Turn Up the Volume by Expandin...

Strategy 10: Measure Performance to Improve Performance
Click here to send us your ideas and feedback on Blueprint!
"Metrics, is there any more confusing and contentious topic in cybersecurity? In thi...

Strategy 9: Communicate Clearly, Collaborate Often, Share Generously
Click here to send us your ideas and feedback on Blueprint!
"Research has shown that communication is one of the most important factors for succ...

Strategy 8: Leverage Tools and Support Analyst Workflow
Click here to send us your ideas and feedback on Blueprint!
Tool choice can be a make-or-break decision for security analysts, driving whether g...

Blueprint Live at the SANS Blue Team Summit 2023
Click here to send us your ideas and feedback on Blueprint!
In this special live recording from the SANS Blue Team Summit 2023, Kathryn Knerler,...

Strategy 7: Select and Collect the Right Data
Click here to send us your ideas and feedback on Blueprint!
There's no denying that the average security team is completely overwhelmed with opt...

Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence
Click here to send us your ideas and feedback on Blueprint!
Every security team has limited budget and time, how do you know where to focus? Cyb...

Strategy 5: Prioritize Incident Response
Click here to send us your ideas and feedback on Blueprint!
No security team is perfect, so in this episode, authors Carson, Ingrid, and Kathryn...

Strategy 4: Hire AND Grow Quality Staff
Click here to send us your ideas and feedback on Blueprint!
In this episode we dive deep on the "People" factor of the SOC. Who should you hire,...

Strategy 3: Build a SOC Structure to Match Your Organizational Needs
Click here to send us your ideas and feedback on Blueprint!
In this episode we discuss how to decide on the right org structure and capabilities...

Strategy 2: Give the SOC the Authority to Do Its Job
Click here to send us your ideas and feedback on Blueprint!
Though a SOC is responsible for protecting your organization's assets, it is not the...

Strategy 1: Know What You Are Protecting and Why
Click here to send us your ideas and feedback on Blueprint!
As the saying goes, "If you don't know where you're going, any road will take you th...

11 Strategies of a World-Class Security Operations Center: Fundamentals
Click here to send us your ideas and feedback on Blueprint!
Welcome to a brand new season of Blueprint! In this intro episode we discuss "Fundam...

Get Ready, A Very Special Season 4 Is On the Way!
Click here to send us your ideas and feedback on Blueprint!
Hello Blueprint listeners! We’re excited to announce that the release of season 4 of...

Brandon Evans: Cloud Security - Threats and Opportunities
Click here to send us your ideas and feedback on Blueprint!
Ever wonder how a cloud and application security expert views risks of cloud workloa...

Joe Lykowski: Building a Transparent, Data-Driven SOC
Click here to send us your ideas and feedback on Blueprint!
In this episode we speak with Joe Lykowski - Cyber Defense Lead at a major manufactu...

Rob Lee: Training and Reskilling in Cyber Security
Click here to send us your ideas and feedback on Blueprint!
Many of us are either looking to start a cyber security career, improve our knowledg...

Jaron Bradley: Securing Enterprise macOS
Click here to send us your ideas and feedback on Blueprint!
In this episode of the Blueprint Podcast, we cover monitoring and securing macOS in...

Alexia Crumpton: MITRE ATT&CK for Defenders
Click here to send us your ideas and feedback on Blueprint!
One of the best frameworks that showed up within the last 5 or so years is undoubted...

Cat Self: macOS and Linux Security
Click here to send us your ideas and feedback on Blueprint!
Ever wonder why there’s so little information regarding macOS and Linux-oriented att...

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging
Click here to send us your ideas and feedback on Blueprint!
Nearly every organization is using Microsoft Azure AD services in some respect, but...

Tony Turner: Securing the Cyber Supply Chain
Click here to send us your ideas and feedback on Blueprint!
John and Fortress Vice President of Research and Development Tony Turner share their...

Mark Orlando: Building a Stronger Blue Team
Click here to send us your ideas and feedback on Blueprint!
There are many technical factors that contribute to the success of a security operat...

Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin
Click here to send us your ideas and feedback on Blueprint!
Host John Hubbard, Blueprint host and SANS Cyber Defense Curriculum Lead, moderated...

David Hoelzer: Threat Detection with Machine Learning and AI
Click here to send us your ideas and feedback on Blueprint!
Many of us with the typical IT and security backgrounds might not have the slightest...

James Rowley: Creating and Running an Insider Threat Program
Click here to send us your ideas and feedback on Blueprint!
While malicious insiders are a threat that most of us would like to imagine we might...

Dean Parsons: Cyber Security for OT and ICS
Click here to send us your ideas and feedback on Blueprint!
With ransomware and other highly disruptive attacks on the rise, there are few syste...

John Hubbard: Your Top Cyber Defense Questions Answered from Seasons 1 + 2
Click here to send us your ideas and feedback on Blueprint!
It's a special mailbag episode from John Hubbard! After two seasons, John asked the...

John Hubbard: Key lessons and takeaways from Blueprint Season 2 + A Special Announcement!
Click here to send us your ideas and feedback on Blueprint!
In this solo episode to wrap up season 2, John discusses some of the key takeaways f...

Mark Morowczynski & Thomas Detzner: Microsoft Incident Response Playbooks
Click here to send us your ideas and feedback on Blueprint!
We all need solid, well though-out playbooks to help standardize our respons to comm...