Episodes

  • Educating the Future: Aaron Tng's Cybersecurity Blueprint
    May 29 2024

    Aaron Tng, a Microsoft Student Ambassador and BlueHat Conference Speaker, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Aaron shares how his curiosity during the pandemic in 2020, sparked by the surge in cyber-attacks, propelled him into the world of cybersecurity. Through dedicated self-learning and leveraging resources like the Microsoft Learn website, Aaron achieved multiple certifications, laying the foundation for his expertise in cybersecurity. Aaron is also passionate about the impact of Cybersecurity on society and actively promoting K-12 Cybersecurity Awareness and Education. He unveils his comprehensive four-point plan, which encompasses fundamental courses, advanced studies, educator training, and real-life internship opportunities. Aaron emphasizes the importance of moving beyond surface-level internet safety education, advocating for a deeper understanding of secure coding and threat modeling.

    In This Episode You Will Learn:

    • The different resources utilized for Aaron’s cybersecurity education
    • Aspirations for the future of cybersecurity education
    • How Aaron founded a student-led nonprofit called Cyber Secure it

    Some Questions We Ask:

    • What challenges did you face presenting to the Washington State Board of Education?
    • How did you earn multiple cybersecurity certifications while still in high school?
    • Why do you believe it's crucial to move beyond surface-level internet safety?

    Resources:

    View Aaron Tng on LinkedIn

    View Wendy Zenone on LinkedIn

    View Nic Fillingham on LinkedIn

    Related Microsoft Podcasts:

    • Microsoft Threat Intelligence Podcast
    • Afternoon Cyber Tea with Ann Johnson
    • Uncovering Hidden Risks

    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    33 mins
  • From Specs to Security
    May 15 2024

    Dor Dali, Head of Security Research at Cyolo, joins Nic Fillingham on this week's episode of The BlueHat Podcast. They delve into Dor's journey into cybersecurity, from pranking friends as a teenager to his professional roles, including his involvement in the Blue Hat conference through GE, where he helped create the Capture The Flag (CTF) challenge. Dor details the vulnerabilities in the RDP protocol by closely following the protocol specifications and identifying discrepancies that led to security flaws. They detail a vulnerability related to RDP Gateway's UDP cookie authentication process, the implications of Dor's research for other security researchers and hackers and the importance of leveraging available resources, such as protocol specifications and open-source implementations, to understand closed-source systems better and potentially uncover vulnerabilities.

    In This Episode You Will Learn:

    • The unique perspective Dor has with RDP security research
    • How to approach security research when following the protocol specifications
    • The importance of clear documentation in preventing security vulnerabilities

    Some Questions We Ask:

    • How did you design and build the Capture the Flag event?
    • Did you face any unexpected hurdles while researching the RDP protocol's security?
    • Have you found other security vulnerabilities by closely adhering to protocol specifications?

    Resources:

    View Dor Dali on LinkedIn

    View Wendy Zenone on LinkedIn

    View Nic Fillingham on LinkedIn

    Related Microsoft Podcasts:

    • Microsoft Threat Intelligence Podcast
    • Afternoon Cyber Tea with Ann Johnson
    • Uncovering Hidden Risks

    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    34 mins
  • Beyond the Code: Ethics and AI with Katie Paxton-Fear
    May 1 2024

    Cyber Security Content Creator, Speaker & Ethical Hacker, Katie Paxton-Fear, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Katie holds a PhD in defense and security AI plus cybersecurity and works as an academic, teaching undergraduate students cybersecurity topics. She also runs a popular YouTube channel focused on bug bounty hunting, hacking, and pen testing. Katie shares her journey into cybersecurity, reflects on her initial interest in undeciphered languages and how it parallels her approach to cybersecurity, both involving a fascination with solving mysteries and uncovering hidden meanings.


    In This Episode You Will Learn:

    • Approaching AI systems with caution when translating less-documented languages
    • Concerns surrounding the use of copyrighted training data in AI systems
    • Recognizing and addressing AI system limitations and biases in real-world deployments.

    Some Questions We Ask:

    • Can fine-tuning AI models prevent degradation and improve performance?
    • What are the ethical implications of putting sensitive information into AI systems
    • How does relying on niche or obscure training data impact AI models?

    Resources:

    View Katie Paxton-Fear on LinkedIn

    View Wendy Zenone on LinkedIn

    View Nic Fillingham on LinkedIn

    Related Microsoft Podcasts:

    • Microsoft Threat Intelligence Podcast
    • Afternoon Cyber Tea with Ann Johnson
    • Uncovering Hidden Risks

    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    44 mins
  • SaaS Exposed: Unmasking Cyber Risks in Cloud Integrations
    Apr 17 2024

    Luke Jennings, VP of Research & Development at Push Security joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Luke explains his recent presentation on a new SaaS cyber kill chain, exploring how attackers might target modern organizations heavily reliant on cloud and SaaS services, even when traditional infrastructure is minimal. The latest kill chain involves developing attack techniques specific to this environment, covering topics like lateral movement without conventional network infrastructure and adapting known techniques such as password guessing attacks to the SaaS landscape. Luke, Wendy, and Nic discuss the complexities of SaaS security, the intricacies of evil twin integrations, detection challenges, mitigation strategies, and the overall impact of these security issues on organizations.

    In This Episode You Will Learn:

    • Identifying malicious activities and understanding normal application behavior
    • The importance of having structured methodologies for approving SaaS app usage
    • Challenges organizations face in detecting and preventing SaaS application threats

    Some Questions We Ask:

    • How can an organization create alerts for new, unknown SaaS app integrations?
    • What happens when a SaaS app integration is duplicated by an attacker?
    • Would having a structured methodology for SaaS app usage help minimize risk?

    Resources:

    View Luke Jennings on LinkedIn

    View Wendy Zenone on LinkedIn

    View Nic Fillingham on LinkedIn

    Related Microsoft Podcasts:

    • Microsoft Threat Intelligence Podcast
    • Afternoon Cyber Tea with Ann Johnson
    • Uncovering Hidden Risks

    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    39 mins
  • Decoding Conference Proposals with Lea Snyder
    Apr 3 2024

    Lea Snyder, Principal Security Engineer at Microsoft joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Lea is a security leader focused on security strategy and helping organizations mature their security posture and security programs, focusing on areas including IAM, product security, and risk management. Lea explains her unique role as a security architect, highlighting problem-solving across various domains within Microsoft. She shares her unconventional path to cybersecurity, starting with a background in economics and an MBA, and how she transitioned from IT roles to security. Lea, Wendy, and Nic discuss the importance of diverse backgrounds in the industry and offer advice on entering the cybersecurity field. Lea also discusses her involvement in community-driven conferences, particularly B-sides, highlighting their diverse and unique content.

    In This Episode You Will Learn:

    • Tips for submitting conference proposals
    • Challenges when balancing anonymity during a submission
    • The importance of a supportive approach in the conference submission process

    Some Questions We Ask:

    • Is there a typical anonymization process to ensure fairness and inclusivity?
    • What are some challenges when selecting talks that resonate with an audience?
    • Can you elaborate on the value behind B-sides conferences and the unique atmosphere?


    Resources:

    View Lea Snyder on LinkedIn

    View Wendy Zenone on LinkedIn

    View Nic Fillingham on LinkedIn

    Related Microsoft Podcasts:

    • Microsoft Threat Intelligence Podcast
    • Afternoon Cyber Tea with Ann Johnson
    • Uncovering Hidden Risks

    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    48 mins
  • Securing the Past with Dustin Heywood
    Mar 20 2024

    Dustin Heywood, Hacker, Researcher, and Senior Leader at IBM, joins Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. Dustin provided a live demonstration of cracking NTLM version 1 during his BlueHat presentation, showcasing the process of responding to challenges, using coercion techniques, and ultimately extracting and cracking the NTLM hash. Dustin, Nic, and Wendy discuss checking group policies, auditing every object, ensuring relevant systems, and managing IT assets effectively. They emphasize the importance of IT asset management and recommend quarantining legacy systems with restricted access.

    In This Episode You Will Learn:

    • Why security professionals need business skills for effective communication
    • Advice for auditing legacy systems with vulnerable protocols
    • Extracting DPAPI keys and decrypting browser session history

    Some Questions We Ask:

    • How do you manage risk for legacy systems deemed necessary for business?
    • Can you discuss some of the outdated protocols in current IT environments?
    • What guidance would you offer to IT professionals looking to audit their systems?


    Resources:

    View Dustin Heywood on LinkedIn

    View Wendy Zenone on LinkedIn

    View Nic Fillingham on LinkedIn

    Related Microsoft Podcasts:

    • Microsoft Threat Intelligence Podcast
    • Afternoon Cyber Tea with Ann Johnson
    • Uncovering Hidden Risks


    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    42 mins
  • Breaking Bias: Tera Joyce and Tina Zhang-Powell on Celebrating Women in Cybersecurity
    Mar 8 2024

    Microsoft Principal Security Engineering, Tera Joyce and Senior Security Program Manager at Microsoft, Tina Zhang-Powell join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. As we celebrate International Women's Day and Women's History Month, Tina and Tera join the show to discuss the importance of allies in promoting inclusivity and diversity within the industry. They both provide valuable perspectives on assumptions made about women in cybersecurity and offer guidance on fostering an inclusive environment. They highlight the importance of leaders being aware of representation and ensuring diverse perspectives are considered in the decision-making processes and share internal resources like mentoring programs and external opportunities such as conferences to support women in the field. Tina and Tera also offer advice to allies, encouraging them to actively include diverse voices and how they can contribute to creating a more inclusive cybersecurity community.

    In This Episode You Will Learn:

    • The significance of allies in promoting diversity and inclusivity
    • How we can address small instances of unconscious bias
    • The importance of discovering one's calling within the security field

    Some Questions We Ask:

    • Can you share any resources or ways to support women in cybersecurity?
    • How can allies better support women in the cybersecurity industry?
    • Any advice for women or individuals interested in entering the tech and cybersecurity field?

    Resources:

    View Tera Joyce on LinkedIn

    View Tina Zhang-Powell on LinkedIn

    View Wendy Zenone on LinkedIn

    View Nic Fillingham on LinkedIn

    Related Microsoft Podcasts:

    • Microsoft Threat Intelligence Podcast
    • Afternoon Cyber Tea with Ann Johnson
    • Uncovering Hidden Risks

    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    51 mins
  • Black Voices Matter: The Role of Allyship in Cybersecurity with Devin Price and Derrick Love
    Feb 21 2024

    Microsoft Security Technical Program Manager Devin Price and Sr. Program Manager Derrick Love join Wendy Zenone and Nic Fillingham on this week's episode of The BlueHat Podcast. The discussion delves into the experience of being Black in the cybersecurity field. Derrick and Devin share their thoughts on the representation of Black individuals in tech, noting the underrepresentation in the field. The significance of representation and allyship is also discussed while emphasizing the importance of paying it forward, mentoring others, and highlighting the responsibility to support those coming up in the field. Devin and Derrick share the importance of involvement with events that promote the black community, black businesses, and black-led nonprofits. These events aim to create a supportive network within the community, particularly for those working in the technology sector. It underlines the significance of adopting a growth mindset, fostering a sense of community, and actively contributing to the empowerment of individuals within the cybersecurity landscape.  

       

    In This Episode You Will Learn:    

     

    • How mentorship can help the growth of underrepresented individuals in security 
    • Actionable advice for fostering diversity in the industry 
    • Why representation and allyship is so vital for Cybersecurity 

     

    Some Questions We Ask:     

     

    • What challenges and rewards come with working in cybersecurity? 
    • How can we positively affect and support the Black community in tech? 
    • Can you share actionable advice for fostering diversity in the industry? 

     

    Resources:  

    View Devin Price on LinkedIn  

    View Derrick Love on LinkedIn  

    View Wendy Zenone on LinkedIn 

    View Nic Fillingham on LinkedIn 


    Beam Foundation  

    Sync Seattle  

     

    The Talking Tech Podcast  

    BAM Scholarship 

     

    Related Microsoft Podcasts:  

     

    • Microsoft Threat Intelligence Podcast  
    • Afternoon Cyber Tea with Ann Johnson  
    • Uncovering Hidden Risks  

      

    Discover and follow other Microsoft podcasts at microsoft.com/podcasts


    Hosted on Acast. See acast.com/privacy for more information.

    Show More Show Less
    58 mins