Getting Out Of Walled Gardens By Running Your Own Email - Michael HarrisonMackenzie Jackson & Dwayne McDaniel
Securing Flight Simulators And Other Operational Technology - Coburn SlayMackenzie Jackson & Dwayne McDaniel
The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh SeeparsanMackenzie Jackson & Dwayne McDaniel
The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie HonoreMackenzie Jackson & Dwayne McDaniel
Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh LeeMackenzie Jackson & Dwayne McDaniel
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie BurgettMackenzie Jackson & Dwayne McDaniel
Understanding Security Champions and Making Human Connections - Dustin LehrMackenzie Jackson & Dwayne McDaniel
What Does It Mean To Be A Security Lead - A Conversion With Kayssar DaherMackenzie Jackson & Dwayne McDaniel
Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John PoulinMackenzie Jackson & Dwayne McDaniel
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna JonssenMackenzie Jackson & Dwayne McDaniel
Secrets Management With The OpenPao Project And Open Source Security - Alex ScheelMackenzie Jackson & Dwayne McDaniel
The State And Future Of Cybersecurity Training and AIShaping The Role - Zach HillMackenzie Jackson & Dwayne McDaniel
Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh KuntzMackenzie Jackson & Dwayne McDaniel
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard JohansenMackenzie Jackson & Dwayne McDaniel
Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie JacksonMackenzie Jackson & Dwayne McDaniel
Quarantine Policies and Cloud Security Strategies for AWS – Bleon ProkoMackenzie Jackson & Dwayne McDaniel
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris KulakowskiMackenzie Jackson & Dwayne McDaniel
Building Human-Centric Security and Hacker Communities in Argentina - Ailin CastellucciMackenzie Jackson & Dwayne McDaniel
Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria KhodakMackenzie Jackson & Dwayne McDaniel
Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas JostMackenzie Jackson & Dwayne McDaniel
Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah SkeeteMackenzie Jackson & Dwayne McDaniel
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy DennisMackenzie Jackson & Dwayne McDaniel
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor SomasundharamMackenzie Jackson & Dwayne McDaniel
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj ViswanathanMackenzie Jackson & Dwayne McDaniel
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt GlamanMackenzie Jackson & Dwayne McDaniel
From Car Culture to Cybersecurity: Building Community and Skills with Christian PinkstonMackenzie Jackson & Dwayne McDaniel
Inside BurbSec: From Suburban InfoSec Beers to Global Discord Community – Johnny XmasMackenzie Jackson & Dwayne McDaniel
From Code to Crypto: How Learning Fundamentals Empowers Security Pros – Matt OlmstedMackenzie Jackson & Dwayne McDaniel
Security Onion - From Classroom To SOC, Open Source and Education - Matt GracieMackenzie Jackson & Dwayne McDaniel
Tackling Deepfakes - Battling Ai-Generated Faces, Scams, Detection, And Security – Sankalp KumarMackenzie Jackson & Dwayne McDaniel
From Risk Acceptance to Community Building: Inside Security With Sean JurovieskyMackenzie Jackson & Dwayne McDaniel
Threat Modeling OpenSSL, Lessons from a Data Breach, and Volunteering with Narayan Ram NarayananMackenzie Jackson & Dwayne McDaniel
Teaching AppSec With Scratchers: Gamified Learning For Real-World Impact - Jenn GileMackenzie Jackson & Dwayne McDaniel
Rebuilding OWASP St. Louis & Strengthening Security Growing The Community – Andre Van KlaverenMackenzie Jackson & Dwayne McDaniel
Misconfigurations, Legacy Landmines, and Tier Zero Truths – Jake Hildreth on Active DirectoryMackenzie Jackson & Dwayne McDaniel
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDearMackenzie Jackson & Dwayne McDaniel
Dev Engagement in Security: From Content Strategy to Community Strategy with Alyssa MilesMackenzie Jackson & Dwayne McDaniel
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt TorbinMackenzie Jackson & Dwayne McDaniel
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan GuptaMackenzie Jackson & Dwayne McDaniel
Supply Chain Warfare: CI/CD Threats and Open Source Security with François ProulxMackenzie Jackson & Dwayne McDaniel
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín VillalbaMackenzie Jackson & Dwayne McDaniel
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren DesmondMackenzie Jackson & Dwayne McDaniel
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy DevineMackenzie Jackson & Dwayne McDaniel
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading SecurityMackenzie Jackson & Dwayne McDaniel
Decoding Threat Actor Names: Marketing, Confusion & the MITRE Solution – Jeffrey BellMackenzie Jackson & Dwayne McDaniel
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi PressMackenzie Jackson & Dwayne McDaniel
Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscapeMackenzie Jackson & Dwayne McDaniel