Welcome to the Blueprint Podcast!

Season 3

Sept. 13, 2022

Brandon Evans: Cloud Security - Threats and Opportunities

Click here to send us your ideas and feedback on Blueprint! Ever wonder how a cloud and application security expert views risks of cloud workloads? Well, wonder no more because on this episode we have Brandon Evans - SANS Certified Instructor and lead author of SEC510: Public Cloud Security. We cov…

Listen to the Episode
Sept. 6, 2022

Joe Lykowski: Building a Transparent, Data-Driven SOC

Click here to send us your ideas and feedback on Blueprint! In this episode we speak with Joe Lykowski - Cyber Defense Lead at a major manufacturing company on what it takes to build a mature, transparent, and effective SOC. Joe brings years of experience to the table in running a large organizatio…

Listen to the Episode
Aug. 30, 2022

Rob Lee: Training and Reskilling in Cyber Security

Click here to send us your ideas and feedback on Blueprint! Many of us are either looking to start a cyber security career, improve our knowledge and skills to further our career, or hire a team that has the most skilled and promising candidates. In this special episode with Rob Lee, Chief Curricul…

Listen to the Episode
Aug. 23, 2022

Jaron Bradley: Securing Enterprise macOS

Click here to send us your ideas and feedback on Blueprint! In this episode of the Blueprint Podcast, we cover monitoring and securing macOS in an enterprise environment at scale with Jaron Bradley, Threat Detection lead at Jamf. We discuss the ups and downs of Apple's approach to macOS data collec…

Listen to the Episode
Aug. 16, 2022

Alexia Crumpton: MITRE ATT&CK for Defenders

Click here to send us your ideas and feedback on Blueprint! One of the best frameworks that showed up within the last 5 or so years is undoubtedly the MITRE ATT&CK® framework. Many of us may know about it in passing and even reference from time to time, but very few people seem to know the true…

Listen to the Episode
Aug. 9, 2022

Cat Self: macOS and Linux Security

Click here to send us your ideas and feedback on Blueprint! Ever wonder why there’s so little information regarding macOS and Linux-oriented attacks? In this episode, we get the answer from the multi-talented Cat Self - an Adversary Emulation Engineer at MITRE, Cyber Threat Intelligence Team Leader…

Listen to the Episode
Aug. 2, 2022

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and…

Click here to send us your ideas and feedback on Blueprint! Nearly every organization is using Microsoft Azure AD services in some respect, but monitoring Azure AD for threats is a significantly different skill that traditional Windows logging. In this episode we have 2 experts from Microsoft, Cori…

Listen to the Episode
July 26, 2022

Tony Turner: Securing the Cyber Supply Chain

Click here to send us your ideas and feedback on Blueprint! John and Fortress Vice President of Research and Development Tony Turner share their wisdom on trends they are seeing in the cyber industry and offer advice as to how we should be looking at the Cyber Supply Chain in 2022 and beyond. Follo…

Listen to the Episode
July 19, 2022

Mark Orlando: Building a Stronger Blue Team

Click here to send us your ideas and feedback on Blueprint! There are many technical factors that contribute to the success of a security operations team, but you need more than just tech skills for mounting a solid defense. In this episode of Blueprint we bring back previous guest Mark Orlando to …

Listen to the Episode
July 14, 2022

Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie …

Click here to send us your ideas and feedback on Blueprint! Host John Hubbard, Blueprint host and SANS Cyber Defense Curriculum Lead, moderated a panel of cyber security experts including Heather Mahalik, Katie Nickels and Jeff McJunkin for this powerful discussion. John and guests share their wisd…

Listen to the Episode
July 12, 2022

David Hoelzer: Threat Detection with Machine Learning and AI

Click here to send us your ideas and feedback on Blueprint! Many of us with the typical IT and security backgrounds might not have the slightest idea what to expect when we hear the terms “this product uses advanced machine learning…”, but that claim certainly conjures up a lot of skepticism due to…

Listen to the Episode
July 12, 2022

James Rowley: Creating and Running an Insider Threat Program

Click here to send us your ideas and feedback on Blueprint! While malicious insiders are a threat that most of us would like to imagine we might never have to deal with, it’s still one of the cyber threats you must realistically consider and plan for. But how do you identify malicious intent and po…

Listen to the Episode
July 12, 2022

Dean Parsons: Cyber Security for OT and ICS

Click here to send us your ideas and feedback on Blueprint! With ransomware and other highly disruptive attacks on the rise, there are few systems more important to defend than our critical infrastructure and ICS equipment. How should we think about defending these systems vs our typical IT network…

Listen to the Episode