
Cybersecurity Mentors Podcast
Business og økonomiFaktaTeknologiIn this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
Siste episoder av Cybersecurity Mentors Podcast podcast
- Inside Mandiant: Charles Carmakal on the Front Lines of Global Cyber Warfare (00:46:04)
In this episode of the Cybersecurity Mentors Podcast, Charles Carmakal, CTO at Mandiant, discusses the current state of cybersecurity, the evolving threat landscape, and the importance of resilience in organizations. He emphasizes the ongoing arms race between cyber attackers and defenders, the rise of ransomware and extortion tactics, and the critical traits needed for aspiring cybersecurity analysts. Charles also shares insights into the day-to-day life at Mandiant and the transformative ro...
- Lessons Learned From the Australian National University Breach with Suthagar Seevaratnam - Part 2 (00:52:02)
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
- Lessons Learned From the Australian National University Breach with Suthagar Seevaratnam - Part 1 (00:47:31)
In this episode of the Cybersecurity Mentors Podcast, Suthagar Seevaratnam, a former CISO at the Australian National University, shares his journey into cybersecurity and the challenges faced during a significant data breach. He discusses the importance of addressing organizational trauma, effective leadership during crises, and the human element in cybersecurity. The conversation delves into the details of the breach, including the attack vector, the role of phishing, and the impact of legac...
- Job Offer, Raise, or Promotion? Here’s How to Negotiate All Three (01:02:12)
In this episode of the Cybersecurity Mentors Podcast, we break down how to negotiate with confidence — whether you’re reviewing a job offer, asking for a raise, or chasing that next promotion. Drawing from years of leadership experience, they share real-world stories about what hiring managers actually think during negotiations, how to spot red flags in a job offer, and how to build leverage the right way. You’ll learn: The three things to evaluate before accepting any offer — fit, growth, an...
- Turning Sheep Into Wolves: Brian Brushwood’s Plan to Defend Against the Scampocalypse (00:50:50)
Magician, podcaster, and World’s Greatest Con creator Brian Brushwood joins us to talk about the coming Scampocalypse, where AI-powered deception meets human vulnerability. We dive into how magic, psychology, and “deceptive role play” can transform security awareness from boring quizzes into hands-on human defense training. Learn why Brian says it’s time to stop training “sheep” and start raising “wolves.” Topics include: • Why traditional phishing tests fail • How AI is powering the next g...
- Ask Us Anything: Cybersecurity Career Q&A — Season 4 Finale (01:00:53)
In the Season 4 finale of The Cybersecurity Mentors Podcast, Steve and John wrap up an incredible season with a special listener-driven Q&A. The episode opens with a recap of Episodes 1–7, revisiting key lessons on soft skills, leadership, resume pitfalls, networking strategies, and inspiring career journeys. From there, they dive into your most pressing questions about breaking into cybersecurity — from whether college or certifications matter most, to the projects that truly prove you’r...
- The Networking Do’s and Don’ts in Cybersecurity (00:49:47)
In this episode of The Cybersecurity Mentors Podcast, Steve and John explore one of the most powerful career accelerators in cybersecurity: networking. While a strong resume might get you noticed, it’s meaningful relationships that truly open doors. Together, we unpack the key do’s — being genuine, consistent, and adding value — and highlight the common mistakes to avoid, like spamming, ghosting, or only showing up when you need something. You’ll also hear real-world examples and actionable t...
- Land the Job: The 10 Resume Mistakes Holding You Back in Cybersecurity (00:49:54)
Are you applying for cybersecurity jobs but not getting interviews? The problem might be your resume. In this episode of The Cybersecurity Mentors Podcast, we break down the Top 10 Resume Mistakes holding you back from landing your first cybersecurity role—and show you exactly how to fix them. From weak objectives to cluttered skills sections, irrelevant job history, and missing proof of hands-on experience, we’ll cover the resume traps that stop recruiters in their tracks. Whether you’...
- Interview with Grant Adams: How Picking Locks Opened the Door to a Cybersecurity Career (00:35:38)
In this episode of the Cybersecurity Mentors Podcast, Grant Adams returns to share his journey over the past year, focusing on his job search experience, the importance of networking, and insights from his interview process. One highlight of his story is how a conversation at a lock-picking table during an in-person conference led directly to his current role. Grant also discusses the skills he developed, how AI is being integrated into cybersecurity practices, and personal updates such...
- Interview with Dr. TJ O'Connor: Enthusiasm is common, endurance is rare. (01:05:51)
In this episode of the Cybersecurity Mentors Podcast, Dr. TJ O'Connor shares his journey from West Point to a retired U.S. Army Lieutenant Colonel and cybersecurity educator. He discusses his experiences at West Point, his military career, and the importance of hands-on learning in cybersecurity. Dr. O'Connor emphasizes the value of competitions in fostering growth and resilience, and he offers advice for aspiring cybersecurity professionals, highlighting the significance of endurance and con...
- Interview with Evan Reiser: Founder & CEO of Abnormal AI (00:50:59)
In this episode of the Cybersecurity Mentors Podcast, John, Steve, and Evan Reiser, Founder & CEO of Abnormal AI, discuss Evan's journey from a gaming enthusiast to a leader in cybersecurity. We explore the evolution of email security, the impact of AI on the industry, and the importance of mentorship and continuous learning. Evan shares valuable lessons from his early startups, the significance of asking questions, and how to prepare for an AI-driven future in cybersecurity. The conversa...
- Leadership Principles for Cybersecurity (00:56:17)
In this episode of the Cybersecurity Mentors Podcast, we discuss the critical role of leadership in cybersecurity, emphasizing the principles of Extreme Ownership as outlined in Jocko Willink's book. We explore how effective leadership goes beyond technical skills, focusing on communication, team dynamics, and the importance of humility. The conversation highlights the need for cybersecurity professionals to develop leadership skills, build relationships across teams, and prioritize tasks eff...
- Unlocking the Power of Soft Skills in Cybersecurity (01:02:26)
In this episode of the Cyber Security Mentors Podcast, we discuss the critical role of soft skills in the cybersecurity field. We emphasize that while technical skills are essential, soft skills such as communication, empathy, adaptability, critical thinking, and teamwork are equally important for career growth and success. We provide insights on how to improve these skills and their relevance in various cybersecurity roles. We also introduce a new networking course aimed at helping individua...
- Can a Mentor or Coach Really Help You Succeed in Cybersecurity? (01:00:47)
Can a cybersecurity mentor or coach really help you break into or grow your career? In this episode, we break down the difference between mentorship and coaching, why investing in guidance matters, and what a structured 6-month mentorship journey looks like. We also share real success stories from our mentees—and why going it alone might be slowing you down. Plus, we’re running a limited-time offer: Get our coaching Plus Plan ($119/month) for the price of the Starter Plan ($69/month) fo...
- Mastering Cybersecurity: Part 3 - Hack to Defend: Why Offensive Knowledge Matters (00:34:33)
In Part 3 of our Mastering Cybersecurity series, we explore why learning how to hack isn’t just for red teamers — it’s a critical skill for defenders, too. Understanding offensive tactics can sharpen your defensive abilities, improve threat detection, and help you shift from reactive to proactive security. Plus, having both offensive and defensive skills makes you more marketable in today’s cybersecurity job market, especially for roles that value versatility and hands-on experience. We’ll al...
- A Day in the Life of a Penetration Tester with Carson Sallis (00:46:54)
In this episode, we chat with Carson Sallis, Senior Offensive Security Engineer and Vulnerability Researcher at NVIDIA. Carson walks us through a day in the life of a pentester and shares actionable advice for anyone looking to break into offensive security. He also gives a live demo of fuzzing with AFL (American Fuzzy Lop) and explains how tools like this are used in real-world vulnerability research. Whether you're just starting out or looking to sharpen your red team skills, this episode i...
- Mastering Cybersecurity: Part 2 – Securing Systems and Environments (00:40:33)
In this episode, Steve and John dive into why securing systems is a must-know skill in cybersecurity. Learn the basics of system hardening, access control, and logging, plus practical tools and labs to get hands-on. They also explore how AI can boost your defense game — and why thinking like both an attacker and defender will set you apart. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Episode Resources: Hands-On Labs & Platforms TryHackMe Labs: Intro to Wi...
- Craig Sheffield's Unconventional Journey Into Cybersecurity (01:01:54)
Craig Sheffield shares his unconventional journey transitioning from teaching English in Taiwan to pursuing a cybersecurity career, highlighting how his background in music and audio engineering provided unexpected transferable skills. He also shares his candid experiences with the TryHackMe Security Analyst Level 1 certification. Episode Resources: Craig’s LinkedIn page - https://www.linkedin.com/in/sheffieldcraig/Craig’s Github page with his project breakdown - https://github.com/id...
- Mastering Cybersecurity: Part 1 - Why learning how to "Build" is Essential (00:36:50)
In this episode, we delve into the often-overlooked yet fundamental importance of learning how to "build" systems, networks, and applications for cybersecurity professionals. Coining the philosophy "Build, Secure, Hack," we explore why hands-on experience in building provides an essential foundation for effectively securing and ultimately understanding how to hack those environments. We discuss the pitfalls of skipping these foundational IT skills, highlight the immense value of setting up a ...
- Peeling Back the Network Layers with Doug Burks (01:05:10)
In this episode, we talk with Doug Burks, founder and CEO of Security Onion Solutions. He shares his journey from computer enthusiast to cybersecurity company founder and how he's helping defenders catch bad guys through accessible network security monitoring tools. We also discuss how important setting up your home lab is as a crucial learning environment for security professionals at all levels. Security Onion Solutions https://securityonionsolutions.com/ Doug Burks – Link...
- Mastering the Art of Deception in Cybersecurity (00:47:26)
In this episode, we dive deep into the world of cyber deception—from classic honeypots to canary tokens and more. Learn how deception isn't just a defense tactic, but a skill every aspiring cybersecurity analyst should master. We'll explore real-world stories, ethical considerations, and how strategic deception can give you the upper hand against attackers. Episode Resources: Offensive Countermeasures BookCanary TokensHoneyport - Powershell ScriptCheck out our new merch shop! https://t...
- Navigating today's job market with Kelly Belding (00:56:29)
This episode delves into the current state of the cybersecurity job market and offers essential strategies for breaking into the industry. Kelly Belding, an experienced IT recruiter, discusses hiring trends, the importance of relevant skills and certifications, and the significant role of networking for career advancement. • Overview of the changing IT job market dynamics • Discussion on entry-level versus mid-senior level positions • Importance of skill sets and certifications i...
- Zero to Hero with Daniel De Leon (01:00:08)
In this episode we chat with Daniel, who is just starting on his journey in cybersecurity. We work to give him guidance, direction, and a roadmap for landing his first job. • What sparked Daniel's interest in cybersecurity • Current job enhances troubleshooting skills and problem-solving mindset • Pursuing cybersecurity certifications one step at a time • Importance of framing experiences effectively on resumes • Networking and social media presence as tools for...
- Tools and Skills to Master as a Security Analyst - Part 2 (00:52:37)
This episode focuses on essential skills and tools for aspiring cybersecurity analysts, including network monitoring, incident response, and phishing defense. The conversation emphasizes the importance of practical experience and understanding the fundamentals to successfully navigate careers in cybersecurity. • Importance of network monitoring in identifying suspicious activities • Understanding networking fundamentals for cybersecurity roles • Tools for capturing and analyzing ...
- Tools and Skills to Master as a Security Analyst - Part 1 (00:55:05)
This episode is part one of two that focuses on essential tools and skills for aspiring security analysts. In this episode we discuss SIEM tools, vulnerability management, and endpoint protection. Check out the link for the resources. • Importance of SIEM tools for analyzing log data • Vulnerability management as a critical cybersecurity hygiene practice • Regular vulnerability scans and prioritizing remediation efforts • The evolution of endpoint protection and curren...