Artwork

المحتوى المقدم من Cyber Crime Junkies. Host David Mauro.. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Cyber Crime Junkies. Host David Mauro. أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.
Player FM - تطبيق بودكاست
انتقل إلى وضع عدم الاتصال باستخدام تطبيق Player FM !

Evolution of the Hacker Mindset. Lessons from 2011 SONY Breach and Beyond

58:10
 
مشاركة
 

Manage episode 432199827 series 3370503
المحتوى المقدم من Cyber Crime Junkies. Host David Mauro.. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Cyber Crime Junkies. Host David Mauro. أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Join us as Cody Kretsinger shares his journey from the blind arrogance of youth and dark side of hacking to his evolution into the brilliant, community thought leader and leading-edge cybersecurity provider. It’s a unique perspective on protecting against cybercrime and understanding Modus operandi.
Chapters
00:00 Introduction to Cybercrime and Hacking
07:00 The Thrill of Finding Vulnerabilities
13:40 The Role of the NSA in Cybersecurity
18:24 The Sony Pictures Hack: Exposing Laughable Security
26:05 The Consequences of the Sony Pictures Hack
27:31 Introduction and LulzSec's Actions
29:48 The Raid and Destruction of Evidence
30:17 The Hacker Mindset and Facing Consequences
34:57 The FBI Raid and Arrest
43:47 Transitioning to Cybersecurity and Red Teaming
49:03 Importance of Security Culture and Compliance
Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

فصول

1. Introduction to Cybercrime and Hacking (00:00:00)

2. The Thrill of Finding Vulnerabilities (00:07:32)

3. The Role of the NSA in Cybersecurity (00:14:36)

4. The Sony Pictures Hack: Exposing Laughable Security (00:20:22)

5. The Consequences of the Sony Pictures Hack (00:27:28)

6. Introduction and LulzSec's Actions (00:29:25)

7. The Raid and Destruction of Evidence (00:30:58)

8. The Hacker Mindset and Facing Consequences (00:32:18)

9. The FBI Raid and Arrest (00:37:15)

10. Transitioning to Cybersecurity and Red Teaming (00:46:18)

11. Importance of Security Culture and Compliance (00:51:18)

222 حلقات

Artwork
iconمشاركة
 
Manage episode 432199827 series 3370503
المحتوى المقدم من Cyber Crime Junkies. Host David Mauro.. يتم تحميل جميع محتويات البودكاست بما في ذلك الحلقات والرسومات وأوصاف البودكاست وتقديمها مباشرة بواسطة Cyber Crime Junkies. Host David Mauro. أو شريك منصة البودكاست الخاص بهم. إذا كنت تعتقد أن شخصًا ما يستخدم عملك المحمي بحقوق الطبع والنشر دون إذنك، فيمكنك اتباع العملية الموضحة هنا https://ar.player.fm/legal.

Join us as Cody Kretsinger shares his journey from the blind arrogance of youth and dark side of hacking to his evolution into the brilliant, community thought leader and leading-edge cybersecurity provider. It’s a unique perspective on protecting against cybercrime and understanding Modus operandi.
Chapters
00:00 Introduction to Cybercrime and Hacking
07:00 The Thrill of Finding Vulnerabilities
13:40 The Role of the NSA in Cybersecurity
18:24 The Sony Pictures Hack: Exposing Laughable Security
26:05 The Consequences of the Sony Pictures Hack
27:31 Introduction and LulzSec's Actions
29:48 The Raid and Destruction of Evidence
30:17 The Hacker Mindset and Facing Consequences
34:57 The FBI Raid and Arrest
43:47 Transitioning to Cybersecurity and Red Teaming
49:03 Importance of Security Culture and Compliance
Send us a text

Get peace of mind. Get Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com
Imagine setting yourself apart from the competition because your organization is always secure, always available, and always ahead of the curve. That’s NetGain Technologies – your total one source for cybersecurity, IT support, and technology planning.

Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-4466.

A word from our Sponsor-Kiteworks. Accelerate your CMMC 2.0 compliance and address federal zero-trust requirements with Kiteworks' universal, secure file sharing platform made for every organization, and helpful to defense contractors.
Visit kiteworks.com to get started.

🎧 Subscribe now http://www.youtube.com/@cybercrimejunkiespodcast and never miss an episode!
Follow Us:
🔗 Website: https://cybercrimejunkies.com
📱 X/Twitter: https://x.com/CybercrimeJunky
📸 Instagram: https://www.instagram.com/cybercrimejunkies/
Want to help us out? Leave us a 5-Star review on Apple Podcast Reviews.
Listen to Our Podcast:
🎙️ Apple Podcasts: https://podcasts.apple.com/us/podcast/cyber-crime-junkies/id1633932941
🎙️ Spotify: https://open.spotify.com/show/5y4U2v51gztlenr8TJ2LJs?si=537680ec262545b3
🎙️ Google Podcasts: http://www.youtube.com/@cybercrimejunkiespodcast
Join the Conversation: 💬 Leave your comments and questions. TEXT THE LINK ABOVE . We'd love to hear your thoughts and suggestions for future episodes!

  continue reading

فصول

1. Introduction to Cybercrime and Hacking (00:00:00)

2. The Thrill of Finding Vulnerabilities (00:07:32)

3. The Role of the NSA in Cybersecurity (00:14:36)

4. The Sony Pictures Hack: Exposing Laughable Security (00:20:22)

5. The Consequences of the Sony Pictures Hack (00:27:28)

6. Introduction and LulzSec's Actions (00:29:25)

7. The Raid and Destruction of Evidence (00:30:58)

8. The Hacker Mindset and Facing Consequences (00:32:18)

9. The FBI Raid and Arrest (00:37:15)

10. Transitioning to Cybersecurity and Red Teaming (00:46:18)

11. Importance of Security Culture and Compliance (00:51:18)

222 حلقات

كل الحلقات

×
 
Loading …

مرحبًا بك في مشغل أف ام!

يقوم برنامج مشغل أف أم بمسح الويب للحصول على بودكاست عالية الجودة لتستمتع بها الآن. إنه أفضل تطبيق بودكاست ويعمل على أجهزة اندرويد والأيفون والويب. قم بالتسجيل لمزامنة الاشتراكات عبر الأجهزة.

 

دليل مرجعي سريع