Exploring Information Security - Timothy De Block-logo

Exploring Information Security - Timothy De Block

Technology Podcasts >

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
More Information

Location:

United States

Description:

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

Language:

English


Episodes

The Final Episode

3/6/2019
More
In this final edition of the Exploring Information Security podcast, I talk about my reasons for stopping production on episodes. This isn’t the easiest thing to do. Now that I’m writing the podcast post after recording and editing the podcast, I have a sense of relief. For the last month plus, I’ve tried to decide whether or not to shut down the podcast. The fact that it took this long to record a final episode tells me that it was time. I wrote about my reasoning in a blog post on the...

Duration:00:15:42

What is Emotet?

1/13/2019
More
In this inagural stream of the Exploring Information Security podcast, Daniel Ebbutt and Kyle Andrus join me to talk about Emotet. Daniel (@notdanielebbutt) and Kyle (@chaoticflaws) are the two guys I go to for clicking on suspicious links. Recently, I’ve been seeing more Emotet. So, I wanted to have the guys on to talk about the malware that is making a comeback. The CFP is open for Converge Conference. The conference is May 16 and 17. They’ll have one day for blue team topics and one day...

Duration:00:39:25

State of the podcast for 2018

1/3/2019
More
In this end of the year podcast, I discuss the state of the podcast for 2018 and what’s ahead for 2019. 2018 was a good year. I made some format changes that I’m really happy with. I picked up some new audio equipment. I resolved my recording process (I think). I’m not a big statistics guy. I don’t really care if two people or 200 people listen. I’m just happy to have some really great conversations with people and contribute back to the community. 2018 Statistics Here’s a really...

Duration:00:29:21

What's happening at DerbyCon 2018 - Part 2

11/25/2018
More
In this Hyatt recorded edition of the Exploring Information Security podcast, Micah Hoffman, Josh Huff, and Justin Nordine. Micah (@WebBreacher), Josh (@baywolf88), and Justin (@jnordine) join me to go over a variety of topics at DerbyCon 2018. The Hyatt was kind enough to provide space near the bar (shout to the amazing Lauren). In this episode we discuss: Why other industries don’t use OSINT Where to find your niche What are some frustrations of mentorship How apps are impacting our...

Duration:00:41:35

What's happening at DerbyCon 2018 - Part 1

11/18/2018
More
In this Hyatt recorded edition of the Exploring Information Security podcast, Micah Hoffman, Josh Huff, and Justin Nordine join me at DerbyCon 2018. Micah (@WebBreacher), Josh (@baywolf88), and Justin (@jnordine) join me to go over a variety of topics at DerbyCon 2018. The Hyatt was kind enough to provide space near the bar (shout to the amazing Lauren). In this episode we discuss: What OSINT classes and projects everyone is working on Why contributing is important What value...

Duration:01:01:34

What is advanced OSINT?

11/7/2018
More
In this whiskey fueled edition of the Exploring Information Security podcast, Ryan MacDougall and Colin Hadnagy of Social Engineer join me to discuss advanced OSINT. This past DerbyCon, I had the opportunity to take the Advanced OSINT with Ryan (@joemontmania) and Colin (@UnmaskedSE). The course was great! It was different from some of the other OSINT courses I’ve taken. They covered very specific techniques and tools. After presenting on those techniques and tools we were given the...

Duration:00:54:43

When will passwords go away?

10/30/2018
More
In this authenticated edition of the Exploring Information Security podcast, I talk about when passwords will finally die! This is a solo episode. I had the idea after sitting in a vendor pitch today (and because I’m slacking on my editing) where one of the sales guy mentioned that passwords WILL die. I disagree. I think passwords have been around for a long time and will continue to be around. They’re easily replaceable and is stored in the most secure location. Unless there are mind...

Duration:00:08:17

What we can learn from unusual journeys into infosec - Part 2

10/21/2018
More
In this expeditious edition of the Exploring Information Security podcast, Stuart Peck Director of Cyber Security Strategy at ZeroDayLab (@ZeroDayLab) joins me to discuss unusual journeys into infosec. Stu (@cybersecstu) is a Co-Founder of The Many Hats Club, which is a massive Discord community and podcast. Earlier this year, Stu started sharing Unusual Journeys. I love this series because it highlights that there is no true path into infosec. He’s had 18 series so far and each story is...

Duration:00:23:31

What we can learn from unusual journeys into infosec - Part 1

10/14/2018
More
In this expeditious edition of the Exploring Information Security podcast, Stuart Peck Director of Cyber Security Strategy at ZeroDayLab (@ZeroDayLab) joins me to discuss unusual journeys into infosec. Stu (@cybersecstu) is a Co-Founder of The Many Hats Club, which is a massive Discord community and podcast. Earlier this year, Stu started sharing Unusual Journeys. I love this series because it highlights that there is no true path into infosec. He’s had 18 series so far and each story is...

Duration:00:21:57

Why communication in infosec is important - Part 2

10/7/2018
More
In this communicative episode of the Exploring Information Security podcast, Claire Tills joins me to discuss information security communication. Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team. It’s a fascinating roll and something that gives her a lot of insight into multiple parts of the business. What works and what doesn’t work in communicating security to the different areas. Check her blog out. In this episode...

Duration:00:27:42

Why communication in infosec is important - Part 1

9/30/2018
More
In this communicative episode of the Exploring Information Security podcast, Claire Tills joins me to discuss information security communication. Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team at Tenable. It’s a fascinating roll and something that gives her a lot of insight into multiple parts of the business. What works and what doesn’t work in communicating security to the different areas. Check her blog out. In...

Duration:00:22:01

A conversation with Justin Seitz

9/23/2018
More
In this brand new edition of the Exploring Information Security podcast, I have a conversation with Justin Seitz (@jms_dot_py). When I have guests hop on the podcast, I usually try to break the ice a little and get them warmed up for the episode. Often times these can turn into some really good conversation about the infosec field. I'd like to start capturing those conversation and release them (with the person's permission), because there are some really great insights. I've released this...

Duration:00:29:35

Why container security is important - Part 2

9/16/2018
More
In this shipped edition of the Exploring Information Security podcast, Wes Widner joins me to discuss container security. Wes (@kai5263499) is not a security person. He is a developer. A developer that understands security and why it's important. He deals a lot with automation and working with container technology. In this episode we discuss: More Resources: Awesome Container SecurityCilium [RSS Feed] [iTunes]

Duration:00:19:55

Why container security is important - Part 1

9/9/2018
More
In this shipped edition of the Exploring Information Security podcast, Wes Widner joins me to discuss container security. Wes (@kai5263499) is not a security person. He is a developer. A developer that understands security and why it's important. He deals a lot with automation and working with container technology. In this episode we discuss: More Resources: Awesome Container SecurityCilium [RSS Feed] [iTunes] Subscribe Sign up with your email address to receive news and updates. Sign...

Duration:00:19:59

What is Hunchly?

9/5/2018
More
In this screenshot edition of the Exploring Information Security podcast, Justin Seitz joins me to discuss Hunchly. Justin (@jms_dot_py) is the creator of Hunchly. I got to know Hunchly at SANS SEC487 OSINT training earlier this year. It's a fantastic tool that takes screenshot as the web is browsed. This is very useful for investigations involving OSINT. I'm also finding it useful for incident response, particularly for clicking on phishing pages. I sometimes forget to take screenshots as...

Duration:00:29:35

How to make a Burp extension

8/26/2018
More
In this crafting episode of the Exploring Information Security podcast, Paul Johnston Customer Champion at Portswigger joins me to discuss how to make a Burp extension. Paul (@paulpaj) wrote a blog post on how to make a successful burp extension and get it published in the Burp Store. A lot of the recommendations in the article are from Paul's experience handling extension submissions for the Burp Store. In this episode we discuss: [RSS Feed] [iTunes] Subscribe Sign up with your email...

Duration:00:22:51

How to handle CFP rejection(s)

8/19/2018
More
In this refused episode of the Exploring Information Security podcast, Michael Kavka joins me to discuss how to handle call for presentation rejections. Michael (@SiliconShecky) wrote a blog post on his site at the beginning of the year titled, It is CFP season... So what. In the article he hit on rejections and I thought it'd make for a great podcast topic. More recently, he wrote a blog post on the, Anatomy of a Rejected CFP. The article walks through his rejected CFP for DerbyCon. In...

Duration:00:29:27

How to create a phishing email - Part 2

8/12/2018
More
In this expedition edition of the Exploring Information Security podcast, Chris Maddalena a senior security consultant joins me to discuss how to create a phishing email. Chris (@cmaddalena) joins me to discuss crafting a phishing email. This is something I've recently explored at work. Having little to no experience actually crafting a phish, I decided I'd go to someone who does this on a regular basis. Check out Chris' ODIN tool for automating intelligence gathering, asset discovery, and...

Duration:00:23:18

How to create a phishing email - Part 1

8/5/2018
More
In this expedition edition of the Exploring Information Security podcast, Chris Maddalena a senior security consultant joins me to discuss how to create a phishing email. Chris (@cmaddalena) joins me to discuss crafting a phishing email. This is something I've recently explored at work. Having little to no experience actually crafting a phish, I decided I'd go to someone who does this on a regular basis. Check out Chris' ODIN tool for automating intelligence gathering, asset discovery, and...

Duration:00:36:03

What is OSINT ORCS YOGA?

7/30/2018
More
In this battlefield edition of the Exploring Information Security podcast, Micah Hoffman joins me to discuss OSINT ORCS YOGA. Micah (@WebBreacher), is a SANS Instructor and author of the SEC487 OSINT course. He recently had his second class in Denver, Colorado (more dates here). During that class he found people asking about how to navigate the waters of OSINT resources. His solution was to start the OSINT Resource Classification System (ORCS). It's a call for the OSINT community to...

Duration:00:36:48