
From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin
10/09/24 • 37 min
Click here to send us your ideas and feedback on Blueprint!
In this episode, we take you behind the scenes of a complex gift card fraud investigation. Join host John Hubbard and guest Mark Jeanmougin as they explore the intricate details of uncovering and combating a clever case of cyber fraud. In this episode Mark discusses how the incident was identified, investigated, contained, and what lessons were learned along the way.
Episode Links:
- Mark's LinkedIn Profile: https://www.linkedin.com/in/markjx/
- Mark's Teaching Schedule: https://www.sans.org/profiles/mark-jeanmougin/
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
Click here to send us your ideas and feedback on Blueprint!
In this episode, we take you behind the scenes of a complex gift card fraud investigation. Join host John Hubbard and guest Mark Jeanmougin as they explore the intricate details of uncovering and combating a clever case of cyber fraud. In this episode Mark discusses how the incident was identified, investigated, contained, and what lessons were learned along the way.
Episode Links:
- Mark's LinkedIn Profile: https://www.linkedin.com/in/markjx/
- Mark's Teaching Schedule: https://www.sans.org/profiles/mark-jeanmougin/
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
Previous Episode

Bonus Episode: What does it take to author a cybersecurity book?
Click here to send us your ideas and feedback on Blueprint!
Have you ever wondered what it takes to write and publish an information security book? In this special bonus episode following season 4, John discusses with Kathryn, Ingrid, and Carson the challenges and rewards of self-publishing, and the kind of effort that goes into producing a book like "11 Strategies of a World-Class Cybersecurity Operations Center".
This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber Security Operations Center. Each episode John will break down a chapter of the book with the book’s authors Kathryn Knerler, Ingrid Parker, and Carson Zimmerman.
-----------
Support for the Blueprint podcast comes from the SANS Institute.
If you like the topics covered in this podcast and would like to learn more about blue team fundamentals such as host and network data collection, threat detection, alert triage, incident management, threat intelligence, and more, check out my new course SEC450: Blue Team Fundamentals.
This course is designed to bring attendees the information that every SOC analyst and blue team member needs to know to hit the ground running, including 15 labs that get you hands on with tools for threat intel, SIEM, incident management, automation and much more, this course has everything you need to launch your blue team career.
Check out the details at sansurl.com/450 Hope to see you in class!
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
Next Episode

How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud
Click here to send us your ideas and feedback on Blueprint!
Mark Morowczynski returns for his 4th(!) time with his Microsoft coworker and identity and authentication expert Tarek Dawoud in this incredibly insightful conversation on the what, why, and how of phishing resistant credentials that YOU can implement right now!
This conversation covers:
- What makes MFA phishable?
- What phishing resistant credentials are and how they work
- The history and modern methods for phishing resistant credentials
- What attacks will be used once we move to phishing resistant credentials, and how to prevent and detect it
- How verified digital identities and corporate identification can help further reduce risk of help desk based attacks
- Shifting the culture to adopt a passwordless login
- Key logs to detect identity attacks
- Resources for learning KQL
Episode Links:
- Tarek Explains Phishing Resistant Authentication: https://www.youtube.com/watch?v=3wtwUh6iyxY
- Microsoft Digital Defense Report: https://www.microsoft.com/en-us/security/security-insider/intelligence-reports/microsoft-digital-defense-report-2024
- Nuance: https://www.nuance.com/index.html
- Book - The Definitive Guide to KQL: https://www.microsoftpressstore.com/store/definitive-guide-to-kql-using-kusto-query-language-9780138293383
- KQL Github Repo: github.com/kqlmspress
- Kusto Detective Agency: https://detective.kusto.io/
Check out John's SOC Training Courses for SOC Analysts and Leaders:
- SEC450: Blue Team Fundamentals - Security Operations and Analysis
- LDR551: Building and Leader Security Operations Centers
Follow and Connect with John: LinkedIn
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/blueprint-build-the-best-in-cyber-defense-234200/from-clues-to-containment-unraveling-a-gift-card-fraud-scheme-with-mar-75914461"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to from clues to containment - unraveling a gift card fraud scheme with mark jeanmougin on goodpods" style="width: 225px" /> </a>
Copy