Blueprint: Build the Best in Cyber Defense

تفاصيل القناة

Blueprint: Build the Best in Cyber Defense

Blueprint: Build the Best in Cyber Defense

المنشئ: SANS Institute

Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews w...

EN-US 미국 التكنولوجيا

الحلقات الحديثة

64 حلقة
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle

The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle

What happens after you discover ransomware? You have to talk to the attackers. And that conversation can make or break your entire response.
In...

2026-02-09 17:00:00 2935
تحميل
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam

Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam

This episode is a big one! We kick off 2026 with a critical lessons learned on how to detect and prevent the threat of fake IT workers infiltrating yo...

2026-01-05 19:00:00 5797
تحميل
Leading by Example: Confidence and Responsibilty in Cybersecurity with Zak Stufflebeam

Leading by Example: Confidence and Responsibilty in Cybersecurity with Zak Stufflebeam

In this episode, we sit down with Zak Stufflebeam, Director of Cybersecurity at a publicly traded insurance company. Zak shares his unique journey fro...

2025-08-19 12:00:00 3983
تحميل
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard

From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard

This podcast episode is from the SANS Cyber Leaders Podcast.
The episode features Blueprint host John Hubbard, where he talks with hosts James L...

2025-06-27 12:00:00 3141
تحميل
Redefining Security Operations: Lessons in AI Integration with James Spiteri

Redefining Security Operations: Lessons in AI Integration with James Spiteri

In this episode of Blueprint, host John Hubbard sits down with James Spiteri from Elastic to explore the transformative power of AI on the SOC. They d...

2025-06-12 13:00:00 4006
تحميل
From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec

From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec

In this episode, we sit down with Rich Greene, a former United States Army Special Forces Green Beret and current SANS instructor for SEC275 and SEC30...

2025-04-09 21:00:00 2835
تحميل
SOC Dashboards Done Right with Ryan Thompson

SOC Dashboards Done Right with Ryan Thompson

In this episode, we sit down with Ryan Thompson, a seasoned expert in building dashboards that actually detect real threats—not just look pretty. With...

2025-02-18 17:00:00 3782
تحميل
Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard

Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard

Surprise!! It's a mini solo episode to kick off the new year and it's on one of the most important topics there is - how to achieve your goals in 2025...

2025-01-01 17:00:00 1798
تحميل
How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud

How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud

Mark Morowczynski returns for his 4th(!) time with his Microsoft coworker and identity and authentication expert Tarek Dawoud in this incredibly insig...

2024-12-02 10:00:00 3243
تحميل
From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin

From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin

In this episode, we take you behind the scenes of a complex gift card fraud investigation. Join host John Hubbard and guest Mark Jeanmougin as they ex...

2024-10-09 14:00:00 2173
تحميل
How GenAI is Changing Your SOC for the Better with Seth Misenar

How GenAI is Changing Your SOC for the Better with Seth Misenar

In this mega-discussion with Seth Misenar on GenAI and LLM usage for security operations we cover some very interesting questions such as: 
- Th...

2024-10-09 14:00:00 5704
تحميل
Bonus Episode: What does it take to author a cybersecurity book?

Bonus Episode: What does it take to author a cybersecurity book?

Have you ever wondered what it takes to write and publish an information security book? In this special bonus episode following season 4, John discuss...

2023-08-03 17:00:00 5466
تحميل
Strategy 11: Turn up the Volume by Expanding SOC Functionality

Strategy 11: Turn up the Volume by Expanding SOC Functionality

"This final chapter of the book is no simple closer! "Turn Up the Volume by Expanding SOC Functionality" covers testing that your SOC is functioning a...

2023-07-18 22:00:00 5198
تحميل
Strategy 10: Measure Performance to Improve Performance

Strategy 10: Measure Performance to Improve Performance

"Metrics, is there any more confusing and contentious topic in cybersecurity? In this episode the authors cover their advice and approach to measuring...

2023-07-10 16:00:00 3166
تحميل
Strategy 9: Communicate Clearly, Collaborate Often, Share Generously

Strategy 9: Communicate Clearly, Collaborate Often, Share Generously

"Research has shown that communication is one of the most important factors for success in security incident response teams. In this chapter, the auth...

2023-07-05 22:00:00 3816
تحميل
Strategy 8: Leverage Tools and Support Analyst Workflow

Strategy 8: Leverage Tools and Support Analyst Workflow

Tool choice can be a make-or-break decision for security analysts, driving whether getting work done is a struggle, or an efficient, stress-free exper...

2023-06-26 23:00:00 5138
تحميل
Blueprint Live at the SANS Blue Team Summit 2023

Blueprint Live at the SANS Blue Team Summit 2023

In this special live recording from the SANS Blue Team Summit 2023, Kathryn Knerler, Ingrid Parker, and Carson Zimmerman joined John Hubbard they shar...

2023-06-22 17:00:00 3883
تحميل
Strategy 7: Select and Collect the Right Data

Strategy 7: Select and Collect the Right Data

There's no denying that the average security team is completely overwhelmed with options for data to collect. With a deluge of endpoint, network, and...

2023-06-20 00:00:00 3796
تحميل
Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence

Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence

Every security team has limited budget and time, how do you know where to focus? Cyber Threat Intelligence provides those answers! In this episode, In...

2023-06-12 23:00:00 3465
تحميل
Strategy 5: Prioritize Incident Response

Strategy 5: Prioritize Incident Response

No security team is perfect, so in this episode, authors Carson, Ingrid, and Kathryn discuss what it takes to prepare for fast, effective incident res...

2023-06-05 17:00:00 5121
تحميل
Strategy 4: Hire AND Grow Quality Staff

Strategy 4: Hire AND Grow Quality Staff

In this episode we dive deep on the "People" factor of the SOC. Who should you hire, what skills should you hire for, what backgrounds are most likely...

2023-05-29 12:00:00 4411
تحميل
Strategy 3: Build a SOC Structure to Match Your Organizational Needs

Strategy 3: Build a SOC Structure to Match Your Organizational Needs

In this episode we discuss how to decide on the right org structure and capabilities of your SOC. This includes questions like tiered vs. tierless mod...

2023-05-22 16:00:00 4320
تحميل
Strategy 2: Give the SOC the Authority to Do Its Job

Strategy 2: Give the SOC the Authority to Do Its Job

Though a SOC is responsible for protecting your organization's assets, it is not the owner of those systems. If the SOC is not established with a clea...

2023-05-15 16:00:00 2211
تحميل
Strategy 1: Know What You Are Protecting and Why

Strategy 1: Know What You Are Protecting and Why

As the saying goes, "If you don't know where you're going, any road will take you there!" - an approach that is disastrous to a SOC. In order to succe...

2023-05-08 13:00:00 3730
تحميل
11 Strategies of a World-Class Security Operations Center: Fundamentals

11 Strategies of a World-Class Security Operations Center: Fundamentals

Welcome to a brand new season of Blueprint! In this intro episode we discuss "Fundamentals" chapter of the "11 Strategies of a World Class Cybersecuri...

2023-05-08 12:00:00 3316
تحميل
Get Ready, A Very Special Season 4 Is On the Way!

Get Ready, A Very Special Season 4 Is On the Way!

Hello Blueprint listeners! We’re excited to announce that the release of season 4 of Blueprint is just around the corner, and we’ve got something very...

2023-05-01 16:00:00 162
تحميل
Brandon Evans: Cloud Security - Threats and Opportunities

Brandon Evans: Cloud Security - Threats and Opportunities

Ever wonder how a cloud and application security expert views risks of cloud workloads? Well, wonder no more because on this episode we have Brandon E...

2022-09-13 16:00:00 2975
تحميل
Joe Lykowski: Building a Transparent, Data-Driven SOC

Joe Lykowski: Building a Transparent, Data-Driven SOC

In this episode we speak with Joe Lykowski - Cyber Defense Lead at a major manufacturing company on what it takes to build a mature, transparent, and...

2022-09-06 17:00:00 3306
تحميل
Rob Lee: Training and Reskilling in Cyber Security

Rob Lee: Training and Reskilling in Cyber Security

Many of us are either looking to start a cyber security career, improve our knowledge and skills to further our career, or hire a team that has the mo...

2022-08-30 16:00:00 3043
تحميل
Jaron Bradley: Securing Enterprise macOS

Jaron Bradley: Securing Enterprise macOS

In this episode of the Blueprint Podcast, we cover monitoring and securing macOS in an enterprise environment at scale with Jaron Bradley, Threat Dete...

2022-08-23 16:00:00 3516
تحميل
Alexia Crumpton: MITRE ATT&CK for Defenders

Alexia Crumpton: MITRE ATT&CK for Defenders

One of the best frameworks that showed up within the last 5 or so years is undoubtedly the MITRE ATT&CK® framework. Many of us may know about it in pa...

2022-08-16 16:00:00 2546
تحميل
Cat Self: macOS and Linux Security

Cat Self: macOS and Linux Security

Ever wonder why there’s so little information regarding macOS and Linux-oriented attacks? In this episode, we get the answer from  the multi-talented...

2022-08-09 14:00:00 3391
تحميل
Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Corissa Koopmans and Mark Morowczynski: Azure AD Threat Detection and Logging

Nearly every organization is using Microsoft Azure AD services in some respect, but monitoring Azure AD for threats is a significantly different skill...

2022-08-02 12:00:00 2844
تحميل
Tony Turner: Securing the Cyber Supply Chain

Tony Turner: Securing the Cyber Supply Chain

John and Fortress Vice President of Research and Development Tony Turner share their wisdom on trends they are seeing in the cyber industry and offer...

2022-07-26 14:00:00 2823
تحميل
Mark Orlando: Building a Stronger Blue Team

Mark Orlando: Building a Stronger Blue Team

There are many technical factors that contribute to the success of a security operations team, but you need more than just tech skills for mounting a...

2022-07-19 12:00:00 2959
تحميل
Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin

Blueprint Live at SANSFIRE 2022: A panel with Heather Mahalik, Katie Nickels and Jeff McJunkin

Host John Hubbard, Blueprint host and SANS Cyber Defense Curriculum Lead, moderated a panel of cyber security experts including Heather Mahalik, Katie...

2022-07-14 17:00:00 3523
تحميل
David Hoelzer: Threat Detection with Machine Learning and AI

David Hoelzer: Threat Detection with Machine Learning and AI

Many of us with the typical IT and security backgrounds might not have the slightest idea what to expect when we hear the terms “this product uses adv...

2022-07-12 13:00:00 2982
تحميل
James Rowley: Creating and Running an Insider Threat Program

James Rowley: Creating and Running an Insider Threat Program

While malicious insiders are a threat that most of us would like to imagine we might never have to deal with, it’s still one of the cyber threats you...

2022-07-12 11:00:00 3580
تحميل
Dean Parsons: Cyber Security for OT and ICS

Dean Parsons: Cyber Security for OT and ICS

With ransomware and other highly disruptive attacks on the rise, there are few systems more important to defend than our critical infrastructure and I...

2022-07-12 10:00:00 3388
تحميل
John Hubbard: Your Top Cyber Defense Questions Answered from Seasons 1 + 2

John Hubbard: Your Top Cyber Defense Questions Answered from Seasons 1 + 2

It's a special mailbag episode from John Hubbard! After two seasons, John asked the listeners what questions they had for him.  He touched on the curr...

2022-07-01 09:00:00 1208
تحميل
0:00
0:00
Episode
home.no_title_available
home.no_channel_info