30 Minutes with a Hacker Podcast Archive



30 Minutes with a Hacker Is This Thing On? Verifying Defensive Tools Are WorkingEpisode: Is This Thing On? Verifying Defensive Tools Are Working

You’ve just deployed the new state of the art security tool. It appears to be working, but are you confident that it is performing as advertised? Newly deployed tools may slow hackers down, but they know the odds are in their favor that you missed something. They also know that they have a better chance at long-term success if they can beat your defensive tools. In this episode, our speakers address why it’s important to validate your security tools and how to do it.
Guest Appearance: Lewis Needham, ATEC Group
πŸ”ˆ Click here to listen.



30 Minutes with a Hacker The Business of MalwareEpisode: The Business of Malware: The rise of Malware-as-a-Service (MaaS) continues.

The special knowledge of how to hack and breach is something that only a small select group of people know. You may not have the ability or knowledge to hack or cause any damage with cyber attacks. But as a result of the growth of MaaS, skilled hackers have created marketplaces where they happily sell their malware services to you to help customers attack their desired targets. Tune in for a discussion on the business of malware, its staggering growth and how we must evolve our cyber skills to stay ahead of these nefarious cybercriminals.

πŸ”ˆ Click here to listen.


30 Minutes with a Hacker The Importance of Cyber Exercises
Episode: The Importance of Cyber Exercises

Discover the importance of cyber exercises for your business and how these trainings can help enhance or grow a company’s security infrastructure. These cyber exercises, offered at the Tech Data Cyber Range can be sold by our partners and provide tremendous value to end-user customers.

πŸ”ˆ Click here to listen to The Importance of Cyber Exercises.





30 Minutes with a Hacker Privacy and the Impact to Your Business
Episode: Privacy and the Impact to Your Business

Tune in to hear about the impact of privacy, one of the crucial components of cybersecurity, and discuss the impact to your business.

πŸ”ˆ Click here to listen to Privacy and the Impact to Your Business.






Supply Chain Hacking and How it Impacts MSPs and MSSPsg
Episode: Supply Chain Hacking and How it Impacts MSPs and MSSPs

One of the common ways into an organization as a hacker is not to attack the company directly at all. Hacking a company in the supply chain, who hasn’t secured their own infrastructure, is often a much easier way in when the end-target seems to have put stronger security measures in place. Listen in as we dive into the topic deeper with our team of ethical hackers and learn how to mitigate against this type of a breach.

πŸ”ˆ Click here to listen to Supply Chain Hacking and How it Impacts MSPs and MSSPs.


AI, Machine Learning, Deep Learning
Episode: AI, Machine Learning, Deep Learning

Join us as we chat with Brett Scott and Josh Harp, two notable ethical hackers, about Deep Learning and how it relates to or is different from Artificial Intelligence and Machine Learning, technologies that are becoming increasingly more prevalent in both the offensive and defensive sides of cybersecurity.

πŸ”ˆ Click here to listen to AI, Machine Learning, Deep Learning.




GDPR, PIPEDA, CCPA
Episode: GDPR, PIPEDA, CCPA

Join us as we chat with Brett Scott and Josh Harp about privacy regulations currently in place, ones that are in the works and the impact on businesses today.

πŸ”ˆ Click here to listen to GDPR, PIPEDA, CCPA.






End-point Attack Vector
Episode: End-point Attack Vector

Join us as we chat with Brett Scott and Josh Harp about how hackers are getting in through our endpoint devices and how we can guard against it.

πŸ”ˆ Click here to listen to End-Point Attack Vector.







Phishing Schemes
Episode: Phishing Schemes

Now more than ever the most common method hackers use to break in to a network is through phishing schemes. Join us as we discuss cyberattacks and how hackers are implementing sophisticated phishing schemes to access your system.

πŸ”ˆ Click here to listen to Phishing Schemes.







IoT Devices and Other Ways Hackers Are Getting In
Episode: IoT Devices and Other Ways Hackers Are Getting In

One of the ways hackers break into networks is through IoT Devices. Join us as we pick the brains of Brett Scott and Josh Harp, two notable ethical hackers who will share their insights into how hackers are leveraging these devices and other entrance points and how they are able to pivot within your network once they get in.

πŸ”ˆ Click here to listen to IoT Devices and Other Ways Hackers Get In.