BarCode

Chris Glanden

Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who will greet and walk us through making an exceptional yet easy-to-make beverage right from the comfort of your own home. It's Cybersecurity straight up, no chaser.Winner of a 2021 People's Choice Podcast Award (Technology Category).

  • 1 hour 14 minutes
    Panda

    In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.

    A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.

    Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It’s also a story of identity—of finding a place where personal expression and professional skill finally intersected.

    This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.


    CHAPTERS

    00:00 - Introduction to Barcode Podcast

    00:24 - Meet Panda: Cybersecurity Icon

    01:47 - Panda's Journey into Cybersecurity

    10:12 - Creating Interactive Challenges for Conferences

    22:11 - Badge Building: The Art and Science

    28:00 - Lessons from Offensive Security for Defenders

    30:11 - Winning the TeleChallenge: A Team Effort

    35:10 - Nostalgia in Gaming: The Phone Verse Experience

    37:30 - Understanding LoRa and Mesh Networking

    43:20 - Real-World Applications of MeshTastic Technology

    49:14 - The Intersection of Furry Culture and Cybersecurity

    56:54 - Community Building and Future Aspirations in Tech


    LINKS

    TelePhreakhttps://telephreak.org An informatione trading post for the computer enthusiast (the hacker), telephony technophiles (the phreak), radio junkies (the HAM).

    DEF CON https://defcon.org/ The world’s largest hacker conference and the backdrop for many of Panda’s stories, competitions, and breakthroughs.

    RedSeer Securityhttps://redseersecurity.com The security practice Panda supports on the defensive and strategic side.

    Assura, Inc.https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.

    MeshTastichttps://meshtastic.org Open-source long-range mesh communication project central to Panda’s community work.

    Comms For Allhttps://commsforall.com Panda’s initiative focused on mesh networking, LoRa radios, and community education.

    B-Sides Jaxhttps://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.

    HackSpaceConhttps://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.

    JLCPCBhttps://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.

    EasyEDAhttps://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.

    Vectorizer.AIhttps://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.

    KiCadhttps://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.

    Adtranhttps://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.

    QueerConhttps://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.

    National Cyber Games (NCA Cyber Games)https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.

    UNF Osprey Securityhttps://www.unf.edu University of North Florida’s student security group that runs CTFs and collaborated locally with Panda.

    HackRedConhttps://hackredcon.com Security conference where Panda volunteers and participates in community events.

    Jax2600https://2600.com Local chapter of the classic 2600 hacker community, part of Panda’s long-term involvement in grassroots infosec groups.

    Backdoors & Breacheshttps://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.

    21 November 2025, 1:10 pm
  • 34 minutes 32 seconds
    Kinosa

    Enter the mind of Amar Sonik - a DevOps engineer, community builder, and lifelong technologist whose journey spans from the help desk to the heart of cybersecurity. Known for shaping BSides Singapore and now lending his voice to The Borg Radio Hour, Sonic reveals how curiosity fueled his evolution, how mentorship from Len Noe helped him command the stage, and why community, creativity, and calm remain the true superpowers in tech. From meditation to zero days, from tabla rhythms to threat research - this conversation reminds us that behind every exploit, every innovation, and every line of code, lies a deeply human story.00:00 Introduction and Background

    01:43 The Journey into Public Speaking

    03:58 Experiences at CyberSecCon

    06:26 The Impact of the Documentary 'I Am Machine'

    08:58 The Role of Community in Technology

    10:04 The Importance of Informal Networks

    12:36 The Launch of Borg Radio Hour

    14:55 Personal Connections and Daily Affirmations

    19:23 Daily Affirmations and Positive Mindset

    23:21 Journey into Cybersecurity

    31:03 The Intersection of Music and Technology

    33:18 Creating a Cybersecurity Coffee Shop

    SYMLINKS

    [CyberSecCon]CyberSecCon | Bringing Business & Tech Together A cybersecurity conference referenced as a major event in the guest’s professional community. The guest helped organize this event, and it serves as a hub for security professionals to collaborate and share insights.

    [B-Sides Singapore]https://bsidessg.org/ A community-driven cybersecurity conference organized by the guest (“Sonic aka Kenosa”) for the past six years. B-Sides events are known globally for offering inclusive, grassroots spaces for learning and networking in information security.

    [I Am Machine Documentary]https://i-am-machine.com/ A cybersecurity-themed documentary filmed in Las Vegas and released in August. It features interviews with industry professionals and was picked up by two film festivals, highlighting stories of technology, identity, and resilience in cybersecurity.

    [The Borg Radio Hour]https://www.youtube.com/@TheBorgRadioHour An online radio program the guest is now an associate of. It appears to be connected to the cybersecurity or hacker community, serving as a creative platform for tech discussions or related storytelling.

    12 November 2025, 2:23 pm
  • 25 minutes 31 seconds
    YachtCast v3

    Summary:
    Live from the BarCode YachtCast 2025, host Chris Glanden sits down with Krista Arndt, Associate CISO at St. Luke’s University Health Network and author of “Permission to Be Real.” In this raw and authentic conversation recorded aboard the SS McMenamin, Krista shares her journey from aspiring nurse to cybersecurity leader, the parallels between drag racing and infosec, and the art of blending authenticity with corporate leadership.

    This episode dives deep into risk, resilience, leadership, and the psychology of authenticity — while celebrating the Philly tech community, Titan 100 leaders, and the human side of cybersecurity.

    00:00 – Opening freestyle & Philly Tech Council shout-out
    02:28 – Welcome aboard the BarCode YachtCast 2025
    03:13 – Introducing Krista Arndt, “Awesome Sauce CISO”
    05:00 – Life in healthcare security: high stakes & human impact
    06:10 – From surviving to leading: Krista’s unconventional path
    07:36 – Drag racing & cybersecurity: managing risk in high-speed chaos
    09:55 – The psychology behind leadership under pressure
    10:49 – Being real: authenticity in corporate culture
    12:44 – Finding balance between personality and professionalism
    13:09 – About the book “Permission to Be Real”
    15:00 – The importance of culture fit and personal growth
    16:06 – Recognizing leadership beyond accolades
    18:30 – What Titan 100 really means for Philly tech leaders
    21:28 – “The language of the business” — redefined
    23:25 – Q&A, laughs, and book giveaways
    24:22 – Closing credits


    BarCode Podcast: https://barcodesecurity.com/podcastKrista Arndt – “Permission to Be Real” on Amazon: https://www.amazon.com/Permission-Be-RealConnect with Krista on LinkedIn: https://www.linkedin.com/in/kearndtPhilly Tech Council: https://phillytechcouncil.orgTitan 100 Philadelphia: https://www.titan100.biz/philadelphiaBarCode Events & Live Shows: https://barcodesecurity.com/events


    Subscribe to the BarCode Podcast for real conversations with the people shaping the future of cybersecurity, tech, and human resilience.

    28 October 2025, 12:18 pm
  • 35 minutes 41 seconds
    HOU.SEC.CON

    This week, Barcode hits the floor at HOU.SEC.CON2025, one of the most anticipated cybersecurity gatherings in Texas, to capture real conversations with the people driving the industry forward. The energy was high, the community was buzzing, and the insights were overflowingas host Chris Glandon connected with innovators, educators, founders, and practitioners who are redefining what it means to build and protect intoday’s digital landscape.

    From AI ethics and automation fears to hands-onmentorship and community leadership, this episode dives deep into the evolving culture of cybersecurity — not just the tools and tech, but the humans behind it all. Whether it’s Dope Security shaking up the web gateway market, Fulcrum fostering collaboration through engineering excellence, or CyberSec Community empowering the next generation through YouthSecCon, every voice in this episode reflects a shared purpose: to make cybersecurity smarter, moreconnected, and more human.

    Recorded live amid the pulse of HOU.SEC.CON 2025, thisspecial on-site feature showcases the passion, collaboration, and innovation that keep the infosec world thriving — one conversation (and one cocktail) at a time.


    00:00 – Intro01:00 – Dope Security with George Georgopoulos05:25 – Sonic on AI, Fear, and the Future of Work11:40 – Philip Wiley: Mentorship, YouthSecCon, and CyberHackCon18:06 – Jacob & John from Fulcrum Technology Solutions24:45 – Eseeri’s First-Time Experience at HOU.SEC.CON27:00 – Michael Farnum: 15 Years of Building a Cyber Community35:20 – Closing


    SYMLINKS

    [BarcodeSecurity.com] - https://barcodesecurity.com/The official home of the Barcode Podcast, featuring all episodes, cybersecurity insights, and event updates.

    [Dope Security] - https://dope.security/
    A next-gen Secure Web Gateway platform simplifying secure connectivity with a “fly direct” approach — eliminating stopover delays and enhancing user experience.

    [CyberSec Community] - https://www.cybrseccon.com/
    The organization behind HOU.SEC.CON, YouthSecCon, and CyberSecCon — building bridges between professionals, educators, and aspiring cybersecurity talent.

    [The Hacker Maker – Philip Wiley] -https://thehackermaker.com/
    Official site of Philip Wiley — author, mentor, and conference speaker dedicated to educating the next generation of ethical hackers and pen testers.

    [Fulcrum Technology Solutions] - https://ftsc.com/
    A Houston-based cybersecurity and IT solutions firm focused on managed services, consulting, and community-driven events like F-CON.

    [Prophit (Chris Glanden) ] - https://pr0ph-1t.com/
    The host’s personal website and cybersecurity brand hub, featuring thought leadership content, event appearances, and contact info.

    [Michael Farnum on LinkedIn] - https://www.linkedin.com/in/mfarnum
    Follow the co-founder of HOU.SEC.CON and CEO of CyberSec Community for updates on events, education, and community growth.

    20 October 2025, 2:00 pm
  • 17 minutes 8 seconds
    Flow State

    “Flow State” isn’t just a nod to the psychological zone of peak focus — it reflects Yuriy Sibere’s entire approach to life and work. From tinkering with a ZX Spectrum in Ukraine to managing cross-functional security products at ThreatLocker, Yuriy embodies adaptability, alignment, and precision amid complexity.
    He thrives where vision meets implementation — translating abstract strategy into tangible, human-centric security products. Calm under shifting priorities, relentlessly curious, and articulate in execution, Yuriy represents the discipline behind today’s most effective cybersecurity innovation.


    In this conversation, host Chris sits down with Yuriy to trace his path from IT operations to product leadership in cybersecurity. They explore how early curiosity shaped his mindset, how communication builds trust across teams, and how to balance security with usability under real-world pressures. Tune in to discover how clarity, collaboration, and human-centered design fuel success in modern security product management.


    00:00 Yuriy's Journey into Cybersecurity

    04:52 Effective Product Management in Cybersecurity

    09:05 Overcoming Collaboration Challenges

    11:04 Managing Technical Debt

    13:21 User Experience in Security Products

    15:39 Communication in Global Teams

    16:01 Closing Thoughts and Future Connections

     

    SYMLINKS

    [ThreatLocker] - https://www.threatlocker.com
    ThreatLocker is a cybersecurity company specializing in endpoint security and zero trust solutions. In the episode, Yuriy Tsibere shares his experience as a Product Manager at ThreatLocker and discusses how the company buildsuser-focused security products.

    [LinkedIn – Yuriy Tsibere] - https://www.linkedin.com/in/yuriytsibere
    Yuriy’s professional profile where listeners can learn more about his background, connect with him, and follow his work in cybersecurity and productmanagement.

    [LinkedIn – ThreatLocker] - https://www.linkedin.com/company/threatlocker
    The official LinkedIn page for ThreatLocker, offering updates, company insights, and product news related to cybersecurity innovation.

    [Zero Trust World Conference] -https://zerotrustworld.com
    An annual event hosted by ThreatLocker that brings together IT professionals, cybersecurity experts, and technology leaders to discuss advancements in zerotrust security.

    9 October 2025, 2:00 pm
  • 50 minutes
    Revelation

    "Revelation" is about exposing what’s hidden: Vulnerabilities, Truths, and the role of hackers in revealing them.In this conversation, Casey John Ellis, founder of Bugcrowd, shares his journey from a curious child fascinated by technology to a pioneer in crowdsourced security. He discusses the evolution of bug bounty programs, the importance of community in cybersecurity, and the challenges of scaling a startup. Casey also emphasizes the need for good faith hackers, the role of AI in security, and the importance of mentorship in entrepreneurship. He reflects on the changing landscape of cybersecurity and the necessity for collaboration between generations in the field.

    00:00 - Introduction and Technical Challenges

    02:02 - Casey Ellis: A Journey into Hacking

    04:50 - Pioneering Crowdsourced Security with Bug Crowd

    07:36 - Building a Community of Hackers

    10:36 - Scaling Bug Crowd: Achievements and Growth

    13:35 - Unexpected Bug Bounty Submissions

    16:32 - Testing Infrastructure: Virtualization and Real-World Applications

    19:14 - Advocating for Good Faith Cybersecurity Research

    22:11 - Government Engagement and Cyber Policy

    25:03 - Adapting to the Current Threat Landscape

    26:41 - The Evolving Landscape of Cybersecurity

    29:58 - AI and Human Collaboration in Security

    34:22 - The Gray Areas of Cyber Ethics

    39:50 - Lessons in Entrepreneurship and Leadership

    44:17 - Generational Shifts in Cybersecurity Media

    46:40 - Finding Balance: Hobbies and Downtime

    48:24 - Imagining a Cybersecurity-Themed Bar


    SYMLINKS[ Casey John Ellis Blog - https://cje.io ]The personal website of Casey John Ellis, featuring his writings and insights on cybersecurity, hacker rights, and vulnerability research.

    [ LinkedIn - https://www.linkedin.com/in/caseyjohnellis ]Casey’s professional profile where he shares career updates and connects with the cybersecurity community.

    [ Bluesky - https://caseyjohnellis.bsky.social ]Casey’s Bluesky account for sharing thoughts and engaging with the infosec community.

    [ Mastodon - https://infosec.exchange/@caseyjohnellis ]Casey’s Mastodon profile on Infosec Exchange, where he posts updates and insights for the federated social community.

    [ X/Twitter - https://x.com/caseyjohnellis ]Casey’s main microblogging profile where he actively shares cybersecurity insights and hacker advocacy.

    [ Linktree - https://linktr.ee/caseyjohnellis ]A hub linking to all of Casey’s active social profiles and resources.

    [ BugCrowd - https://www.bugcrowd.com ]A leading crowdsourced security platform that connects organizations with a global hacker community to find and fix vulnerabilities.

    [ Disclose.io - https://disclose.io ]An open-source project standardizing best practices for vulnerability disclosure programs, enabling safe collaboration between researchers and organizations.

    10 September 2025, 12:41 pm
  • 39 minutes 40 seconds
    Inner Hacker

    Ted Harrington explains the power of the hacker mindset and its impact far beyond cybersecurity. He unpacks how curiosity, creativity, and the drive to challenge assumptions can unlock new ways of thinking and problem-solving across all areas of life. Ted offers practical exercises to develop this mindset, shares strategies to overcome imposter syndrome, and highlights the importance of leaning into positive feedback. He also previews the energy and innovation surrounding the upcoming Hacker Summer Camp and the thriving community that powers it.00:00 Introduction to the Hacker Mindset

    04:50 The Attributes of a Hacker

    10:04 Challenging Assumptions in Life

    14:37 Exercises to Cultivate a Hacker Mindset

    19:31 Upcoming Book Release and Conclusion

    19:51 The Journey of Writing: From First to Second Book

    24:17 Overcoming Imposter Syndrome: Strategies and Insights

    34:29 Hacker Summer Camp: Celebrating a Decade of IoT Village

    36:55 Creative Concepts: Cybersecurity-Themed Bar Ideas


    SYMLINKS

    [Ted Harrington’s Website] – Ted Harrington’s official website where you can find his blog, professional background, talks, research, and links to his books, podcast, and events. A central hub for his work in cybersecurity and ethical hacking.

    [Ted Harrington’s Podcast – “Tech Done Different”] – Ted's podcast explores how to think differently about technology, security, and leadership. He interviews top minds in security, engineering, and beyond.

    [Ted Harrington’s Books] – A showcase of Ted’s published works, including Hackable and the upcoming Inner Hacker, both of which explore ethical hacking, secure software development, and mindset transformation.

    [Ted Harrington’s TED Talk – “Why You Need to Think Like a Hacker”] – In this TEDx talk, Ted explains how the hacker mindset—curiosity, nonconformity, commitment, and creativity—can be a superpower in solving complex problems in both cybersecurity and everyday life.

    [Ted Harrington on LinkedIn] – Ted’s professional LinkedIn profile, where he regularly shares insights on ethical hacking, leadership, and secure software. He’s active and encourages messages from those looking to learn or collaborate.

    [IoT Village Website] – A hacking village founded by Ted Harrington that focuses on IoT security. Hosted at major security conferences like DEF CON, it offers hands-on labs, expert talks, and a collaborative space for learning how to ethically hack IoT devices.

    4 August 2025, 1:19 pm
  • 47 minutes 55 seconds
    Flight Path

    In this conversation, Chris Glandon interviews Josh Mason, a Solutions Architect at CINAC and founder of Newb Village. They discuss Josh's journey from being a U.S. Air Force pilot to entering the cybersecurity field, his motivation behind creating Newb Village to support newcomers in the industry, and his new book 'Speak Security with a Business Accent'. They also explore the role of SYNAC in cybersecurity and share insights on creating a welcoming environment for new professionals in the field. The conversation wraps up with a light-hearted discussion about unique bars and venues in the cybersecurity community.00:00 Josh Mason's Journey into Cybersecurity08:38 The Birth of Noob Village20:02 Speak Security with a Business Accent26:59 Transforming Technical Language for Business Impact30:01 Understanding Metrics for Different Audiences33:15 Aligning Business Goals with Security Metrics36:49 Insights into SYNAC and Its Offerings47:22 Exploring Unique Bars and Venues48:37 Imagining a Cybersecurity-Themed BarSYMLINK[Noob Village] - An inclusive space at DEF CON is designed to welcome and guide newcomers in the cybersecurity community. It offers resources like pamphlets, volunteers (“buddies”), and a booth called “No Stupid Questions” to support first-time attendees.Noob Village LinkedIn Page –A LinkedIn organization page with updates about volunteer calls, community news, and DEF CON involvement .[Joshua C. Mason – LinkedIn] - A cybersecurity leader and vCISO profile with extensive experience, offering insights on Noob Village, initiatives for veterans, and IT-to-security career development. Frequently shares event involvement (like DEF CON), mentorship tips, and professional updates.[Joshua C. Mason – Website] – Josh’s professional website for Mason Security Consulting (Mason SC), where he offers vCISO services, cybersecurity consultancy, and insights from his military and IT background.[Mason SC Book Page] - Josh Mason's personal site, where signed copies of his book are available. The book includes cybersecurity leadership insights drawn from his experiences in the Air Force and IT.[Onward to Opportunity – A career training program for veterans, offering free training and certification opportunities in areas like project management and IT, including PMP and CISSP prep.[Synack] - A cybersecurity company offering “pen test as a service.” It connects clients with vetted ethical hackers using a managed platform to identify exploitable vulnerabilities efficiently.

    18 July 2025, 2:00 pm
  • 53 minutes 26 seconds
    The Force

    In this engaging conversation, Chris Glanden interviews Kevin Johnson, a seasoned expert in IT and cybersecurity. Kevin shares his extensive journey from system administration to becoming a leader in penetration testing and ethical hacking. He emphasizes the importance of hands-on learning, the evolution of penetration testing standards, and the role of open source in the industry. The discussion also touches on the significance of community, acknowledgment, and charity work in cybersecurity, along with personal anecdotes and insights into the future of the field.00:00 Introduction to Kevin Johnson03:39 Kevin's Journey in IT and Security06:29 The Evolution of Penetration Testing09:35 Transitioning from IT to Security12:30 The Importance of Hands-On Learning15:28 Involvement in Open Source Projects18:38 The Role of Mentorship in Career Development21:14 Ethical Hacking and Its Misconceptions24:23 The Future of Cybersecurity27:27 Understanding Risk in Cybersecurity29:14 The Evolution of Penetration Testing Standards31:00 The Human Element in Penetration Testing32:46 The Challenges of Automated Pen Testing35:26 Transparency and Knowledge Sharing in Cybersecurity39:36 Standing on the Shoulders of Giants44:41 The Importance of Acknowledgment and Gratitude48:26 The 501st Legion: Charity Through Cosplay53:08 Creating a Cybersecurity-Themed BarSYMLINKS[Secure Ideas Website] Kevin Johnson’s cybersecurity consulting and training firm, offering penetration testing, security assessments, and educational resources. It also hosts blog posts and tools created by the Secure Ideas team.[Kevin Johnson on LinkedIn] Kevin’s professional LinkedIn profile, where he shares insights on cybersecurity, career development, and industry leadership.[@secureideas on Twitter (X)] – Kevin’s Twitter/X account, where he frequently shares thoughts on InfoSec, pen testing practices, open-source contributions, and industry transparency.[Samurai WTF (Web Testing Framework)] – An open-source Linux distribution for web application penetration testing. Co-created and taught by Kevin, this toolkit helped train thousands of security professionals in hands-on ethical hacking.[BASE (Basic Analysis and Security Engine)] – A fork of the discontinued ACID project for Snort, created by Kevin to continue development and improve IDS event analysis. This project marked a pivotal moment in his open-source journey.[SANS Institute] – A premier cybersecurity training organization where Kevin became a senior instructor, authored multiple courses, and earned the GCIA, GCIH, and GCFA certifications that shaped his professional trajectory.[Penetration Testing Execution Standard (PTES)] – http://www.pentest-standard.orgAn industry-defined standard for performing thorough and ethical penetration tests. Kevin is actively involved in modernizing this standard to reflect current tools, risks, and methodologies.[OWASP (Open Worldwide Application Security Project)] – A nonprofit organization focused on improving software security. Kevin previously served on the global board and has long supported OWASP's community-driven tools and educational efforts.

    27 June 2025, 12:04 pm
  • 54 minutes 54 seconds
    InfoSec Pat

    In this engaging conversation, Chris Glanden speaks with Pat Gorman AKA InfoSec Pat, a cybersecurity professional with over 12 years of experience. Pat shares his unique journey into the cybersecurity field, discussing his early life, career transitions, and the importance of certifications. He emphasizes the need for practical skills and the value of community engagement in the cybersecurity space. The discussion also touches on the challenges faced by newcomers in the industry and the significance of clear, accessible content for learning. Pat's candid insights and personal anecdotes provide a relatable perspective on navigating the cybersecurity landscape.


    00:00 Introduction to Barcode Podcast

    01:02 InfoSec Pat's Journey into Cybersecurity

    04:42 Transitioning from IT to Cybersecurity

    10:24 The Importance of Hands-On Learning

    16:50 Demystifying Cybersecurity for Newcomers

    21:18 Exploring Career Paths in Cybersecurity

    27:45 Lessons Learned from Certification Experiences

    30:54 The Journey to Certification

    34:44 The Fallout with Offensive Security

    36:40 Navigating the Certification Landscape

    38:00 The Importance of Practical Skills

    41:45 Essential Soft Skills for Pen Testing

    45:20 Building a Personal Brand and Community Engagement

    48:10 Overcoming Adversity and Personal Growth

    52:05 Unique Experiences and Future Aspirations


    SYMLINKS[InfoSec Pat - YouTube Channel] - Pat Gorman’s YouTube channel where he publishes tutorials, walkthroughs, and educational videos on cybersecurity, penetration testing, and lab setups.

    [InfoSec Pat - Linktree] - Central hub for all of Pat Gorman’s social platforms, courses, YouTube channel, and other professional links.

    [InfoSec Pat - Official Website] - Pat Gorman’s official website featuring cybersecurity tutorials, online courses, certifications, and resources for professionals looking to enter or grow in the cybersecurity field.

    [InfoSec Pat - Merchandise Store] - Official online merchandise store offering InfoSec Pat branded apparel and accessories, designed for fans and members of the cybersecurity community.

    [InfoSec Pat - Facebook Group: Learn Together with InfoSec Pat] - A public Facebook group led by InfoSec Pat, created for cybersecurity learners and professionals to network, share knowledge, and grow their skills together through community support.

    20 June 2025, 11:10 am
  • 54 minutes 38 seconds
    The Chosen One

    In this conversation, FIlipi Pires shares his journey into cybersecurity, reflecting on his experiences at HackSpaceCon and discussing the importance of community and continuous learning. He emphasizes the critical issue of misconfigurations in identity management and the need for organizations to understand their vulnerabilities, particularly with legacy systems. Felipe also highlights the evolving nature of threats and the importance of being proactive in security measures. He provides insights into the future of red teaming and offers guidance for aspiring professionals in the field. In this conversation, Filipi Pires discusses the journey of growth in the cybersecurity field, emphasizing the importance of patience and continuous learning. He shares insights about his role at Segura, a company focused on identity solutions, and highlights the significance of community engagement. The discussion also touches on cultural aspects, including Brazilian cuisine and personal preferences, showcasing Filipi's vibrant personality and passion for his work.00:00 Introduction to Filipi Pires02:09 Reflections on HackSpaceCon05:03 Felipe's Journey into Cybersecurity11:01 Learning and Skill Development in Cybersecurity17:02 Current Trends and Misconfigurations in Cybersecurity19:38 Staying Current in Cybersecurity22:52 Understanding Threats and Attack Vectors28:46 The Future of Red Teaming32:46 Guidance for Aspiring Red Teamers36:44 The Journey in Cybersecurity43:59 Understanding Segura and Its Mission45:12 Connecting with the Community50:07 Cultural Insights and Personal Preferences

    SYMLINKS

    [Filipi Pires - Official Website] - https://filipipires.comFilipi Pires’ personal website, showcasing his professional background, speaking engagements, research, and cybersecurity insights. It serves as a central hub for his content, blog posts, and community contributions.

    [Filipi Pires on GitHub] - https://github.com/philip86Filipi Pires’ GitHub profile where he shares open-source tools, projects, and potentially his upcoming event schedule. It's a place to follow his latest contributions to the cybersecurity community.

    [Filipi Pires on LinkedIn] - https://www.linkedin.com/in/filipipiresFilipi’s professional profile for connecting with him and following his cybersecurity insights, talks, and global engagements.

    [Filipi Pires on YouTube] - https://www.youtube.com/@filipi-piresFilipi’s YouTube channel featuring his recorded conference talks and cybersecurity presentations in Portuguese, Spanish, and English.

    [Burp Suite Academy] - https://portswigger.net/web-securityA free, hands-on learning platform created by PortSwigger that teaches web application security using the Burp Suite tool. Recommended by Filipi Pires as a foundational resource for aspiring red teamers and web security professionals.

    [TryHackMe] - https://tryhackme.com An interactive platform offering cybersecurity labs and learning paths focused on offensive and defensive security. Filipi recommends it for hands-on practice in red teaming and hacking fundamentals.

    [Hack The Box] - https://www.hackthebox.comA cybersecurity training platform that allows users to practice penetration testing skills in virtual environments. Mentioned as a useful resource for practical skill development in red teaming and ethical hacking.

    3 June 2025, 3:00 pm
  • More Episodes? Get the App