
Hackers to Founders
Chris Magistrado
All episodes
Best episodes
Top 10 Hackers to Founders Episodes
Goodpods has curated a list of the 10 best Hackers to Founders episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Hackers to Founders for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Hackers to Founders episode by adding your comments to the episode page.

Ep. 17 - How AI is Changing OSINT, Dark Web Investigations, and Fraud Detection w/ Zara Perumal
Hackers to Founders
02/21/25 • 76 min
What if AI could predict and prevent cyber fraud before it happens? Meet the founder making it possible " On this episode of Hackers to Founders, we feature Zara Perumal, the CTO and co-founder of Overwatch Data. The episode explores Zara’s journey from an early fascination with computer science, influenced by her software developer father, to her evolution into a cybersecurity and AI entrepreneur. Zara recounts her first steps into coding, beginning with HTML at age 11 and later developing iOS apps, which sparked her passion for building technology. She reflects on her experiences at MIT, where she explored bioinformatics, machine learning, and eventually cybersecurity, which became a turning point in her career. Her work at Google’s Threat Analysis Group further deepened her understanding of digital threats, leading her to the realization that she wanted to create a company addressing cybersecurity challenges at scale.
The episode then shifts focus to Overwatch Data, where Zara details the company's mission to harness AI to process OSINT (open-source intelligence) and provide actionable insights for businesses. She describes the challenges of collecting and analyzing data from the dark web and fraudulent networks, explaining how Overwatch leverages automation and investigative techniques to detect threats and fraud. She also discusses the business side of the startup, from finding the right market fit to the importance of customer feedback in shaping their solutions. Throughout the conversation, Zara and host Chris Magistrado delve into the complexities of cybercrime, the evolving threat landscape, and the role of AI in modern threat intelligence, offering listeners a fascinating look into the intersection of security, AI, and entrepreneurship.
People
- Zara Perumal – CTO and Co-founder of Overwatch Data, specializing in AI-driven cybersecurity.
- Chris Magistrado – Host of Hackers to Founders, interviewing tech and security entrepreneurs.
- Arjun Bisen – CEO and Co-founder of Overwatch Data who initially had the idea for the company.
- Ron Rivest – Renowned cryptographer and MIT professor who influenced Zara’s interest in cybersecurity.
- Michael (YC Advisor) – Advisor at Y Combinator who guided Overwatch Data through its early stages.
Companies & Organizations
- Overwatch Data – A cybersecurity startup leveraging AI to process OSINT and detect fraud.
- MIT CSAIL – MIT’s Computer Science and Artificial Intelligence Laboratory where Zara conducted research.
- Harvard Belfer Center – A research institute focused on security, where Zara contributed to digital democracy defense.
- Akamai – A cloud and cybersecurity company where Zara gained experience in software and data analytics.
- NASDAQ – A major stock exchange where Zara worked in technology roles.
- Apple – Technology company where Zara developed software.
- Y Combinator – Startup accelerator that backed Overwatch Data.
- Corellium – A company providing a virtualization platform for mobile security research.
Technologies & Tools
- Objective-C – Programming language used for iOS app development before Swift.
- Swift – Modern programming language for Apple’s ecosystem.
- React Native – A framework for building cross-platform mobile applications.
- Flutter – Google’s UI toolkit for natively compiled mobile apps.
- JADX – A tool for reverse-engineering Android applications.
- Telegram – Messaging platform heavily used by cybercriminals for fraud and illicit activities.
- GPT (ChatGPT) – AI tool used for scripting and automating analysis tasks.
- DeepSeek – An AI tool discussed for its open-source implications.
- Magic Eye – A bot used for detecting duplicate images on Reddit.
- Corellium – A mobile security research platform used for analyzing malware.
<...

Ep. 18 - Eliminating Human Errors w/ Patrick Thomas
Hackers to Founders
03/21/25 • 73 min
What if AI-powered security could eliminate human errors in cybersecurity? Meet the founder making it happen.
In this episode of Hackers to Founders, I sit down with Patrick Ben Thomas, the founder of NullZec and its advanced malware development division, Shadow Mask. Patrick shares his journey from early cybersecurity research to building a solution designed to eliminate human errors and prevent malware from spreading. We discuss how his team integrates sandboxing, zero-trust architecture, and in-house malware analysis to isolate and detect threats before they reach end users. He also dives into the offensive research behind Shadow Mask, where they develop real-world exploits to strengthen defenses. Tune in to learn how Patrick is blending adversary simulation with next-gen defense strategies to reshape cybersecurity.
People
- Patrick Ben Thomas (Guest, Founder of NullZec & Shadow Mask)
- Kevin Mitnick (Famous hacker, cybersecurity expert)
Companies & Organizations
- NullZec (Parent company founded by Patrick Ben Thomas)
- Shadow Mask (Malware development & adversary simulation division under NullSec)
Products & Technologies
- HackRF (Software-defined radio device used for security research)
- BladeRF (Full-duplex SDR used for radio frequency security research)
- Proxmark 3 (RFID/NFC security tool for cloning and emulation)
- Flipper Zero (Multi-tool for hardware and RF hacking)
- NFC Kill (Device used to destroy NFC-enabled cards by electromagnetic pulse)
Cybersecurity Events & Conferences
- DEFCON (Hacker conference)
- Black Hat (Cybersecurity conference)
- BSides (Security conference, mentioned as besides)
- RSA Conference (Cybersecurity event)
Cybersecurity Services & Platforms
- VirusTotal (Malware analysis service, mentioned as insufficient for zero-day threats)

Ep.8 - Marcus Sailler, Global Director of Red Team at MUFG
Hackers to Founders
11/27/24 • 133 min
In this episode of Hackers to Founders, Chris Magistrado interviews Marcus Sailler, a seasoned expert in cybersecurity with over 25 years of experience. They discuss Marcus's journey from the military to leading red teams, the importance of understanding business impact in cybersecurity, and the nuances of interviewing in the field. Marcus shares insights on building effective red teams, the significance of program development, and how aspiring professionals can transition from pen testing to red teaming. The conversation emphasizes the need for intellectual curiosity, practical experience, and the ability to communicate effectively within organizations. In this conversation, Chris and Marcus delve into the dynamics between red and blue teams, discussing the transition of professionals between these roles and the importance of understanding various vulnerabilities. They explore the relevance of legacy vulnerabilities in modern cybersecurity, the challenges faced in building effective red team programs, and the ethical considerations surrounding the use of zero-day vulnerabilities. Additionally, they highlight the significance of industry breaches in validating security programs and the value of certifications and training for aspiring red teamers. In this conversation, Chris and Marcus delve into various aspects of cybersecurity, focusing on the importance of critical thinking in exams, the transition from on-premises to cloud environments, and the necessity of understanding cloud infrastructure for red teaming. They also explore social engineering techniques, particularly vishing, and discuss the #WeHackHealth movement, which combines fitness and cybersecurity. Additionally, they touch on the discovery of CVEs and the challenges of vulnerability management in software. In this conversation, Chris REal0day and Marcus Sailler discuss various aspects of the cybersecurity industry, including investment opportunities, content creation strategies, the importance of networking, and career transitions. They explore the challenges of building relationships in a corporate environment, the significance of soft skills, and the complexities of navigating global cybersecurity issues. The discussion also touches on the differences between vulnerability research and red teaming, highlighting the unique challenges and rewards of each career path. In this conversation, Marcus Sailler and Chris REal0day delve into various aspects of cybersecurity, leadership dynamics, cultural insights, and personal growth. They discuss the challenges of reporting vulnerabilities without rewards, the complexities of different leadership styles, and the importance of understanding interpersonal relationships through concepts like love languages. The conversation also touches on the significance of cultural adaptation in language learning, the tools essential for cybersecurity professionals, and the value of continuous training and development in red teaming. Additionally, they share insightful book recommendations that emphasize resilience and self-awareness in both personal and professional contexts.
Takeaways
- Red teamers must understand the business impact of their findings.
- Interviews should be interactive and allow for discussion.
- Early career experiences can be valuable in cybersecurity.
- Joining the military can provide a strong foundation for IT careers.
- Building a red team requires maturity in the organization's security posture.
- Learning from experts and networking is crucial for career development.
- Program development is essential for legitimizing red team efforts.
- Demonstrating curiosity and initiative can help in career transitions.
- Creating internal communities can foster talent and interest in cybersecurity.
- Understanding operating systems is key for effective red teaming. Red teamers often transition from blue team roles due to frustration with unaddressed issues.
- Understanding foundational vulnerabilities is still valuable, even if less prevalent.
- The usefulness of vulnerabilities depends on the organization's maturity and vulnerability management program.
- Building a red team requires investment in talent development and retention.
- Using industry breaches can effectively validate the need for security programs.
- Ethical considerations arise when using zero-day vulnerabilities in demonstrations.
- Training and certifications are crucial for effective red teaming.
- Practical experience is essential for understanding red team operations.
- The urgency of red teaming requires quick execution in complex environments.
- A strong understanding of both offensive and defensive strategies is necessary for red team success. The exam structure emphasizes critical thinking and situational awareness.
- Understanding cloud infrastructure is crucial for aspiring ...

Ep.0 - Chris "REal0day" Magistrado
Hackers to Founders
10/02/24 • 65 min
Welcome to the 0 episode of "Hackers to Founders"! Join Chris Magistrado, aka REal0day, as he dives into his unique journey from gaming glitches to becoming a cybersecurity expert, business enthusiast, and podcast host. In this inaugural episode, Chris self-interviews, sharing personal stories, career advice, and essential insights for aspiring cybersecurity professionals.
Connect with Us:
Twitter - https://x.com/HackerToFounder
Instagram - https://instagram.com/hackerstofounders
TikTok -- https://www.tiktok.com/@hackerstofounders
LinkedIn - https://www.linkedin.com/showcase/105189100
Discord - https://discord.gg/2TnH6hkuTG
Website - https://HackersToFounders.com
Spotify - https://open.spotify.com/show/5BgjVtDJc7xoyiQlbhKmL6?si=af728a2b3cb74d8b
In This Episode:
Bypassing Windows Defender: Chris discusses the latest class and offers practical tips.
Career Advice: Experiment, read books, watch Defcon talks, and set up a home lab or virtual machines for hands-on learning.
Hacking: The importance of hacking in a controlled, legal environment.
Success Qualities: Resilience and networking are key in the cybersecurity community.
Networking Events: Opportunities at Defcon, Black Hat, local hacker meetups like BSides, and Europe's CCC.
Personal Journey: Chris recounts his college experience, challenges, and pivotal moments that led to his cybersecurity career.
Recruiting: Transitioning to a recruiter and operating TopCleared Recruiting, focusing on elite cybersecurity talent.
Cloud Computing Impact: How AWS and cloud services revolutionized the tech and cybersecurity landscape.
AI in Cybersecurity: The growing role of AI in identifying and exploiting vulnerabilities.
Personal Security Tips: Recommendations for antivirus software, VPN usage, and staying safe online.
Special Features: Learn how Chris established a hacking club at SF State and brought in industry professionals to inspire students.
Hear about Chris's innovative personal projects and achievements in cybersecurity.
Gain insights into what it takes to succeed in cybersecurity and the broader impact of the industry.
Get Involved: Chris invites listeners to provide feedback and share their thoughts. Subscribe, leave a comment, or message Chris directly to join the conversation and stay updated on future episodes.
Defcon Talks
Zoz’s Dc 18 - https://www.youtube.com/watch?v=OAI8S2houW4
Jayson street intro talk - https://www.youtube.com/watch?v=JsVtHqICeKE
People & Communities Mentioned
DC group Tennessee - https://x.com/defcon615
Drew Porter - https://redmesa.io/
Josh Schwartz - https://x.com/fuzzynop
Resources Mentioned:
Mobile Hacking Lab - https://www.mobilehackinglab.com/link/B1zkaV
Hack the Box Academy - https://referral.hackthebox.com/mz7QT2l
Y Combinator startup school course - https://www.startupschool.org/
DEFCON - https://defcon.org/
BSides - https://bsides.org/w/page/12194156/FrontPage
BlackHat Conference - https://www.blackhat.com/
RSA Conference - https://www.rsaconference.com/
Reverse Engineer / Offensive Security
Re-verse Con - https://re-verse.io/
Hexcon - https://www.hexacon.fr/
Tools Mentioned
Ghidra - https://ghidra-sre.org/
BinaryNinja - https://binary.ninja/
Books
@DafyddStuttard
author of WebApp Hackers Handbook and creator of PortSwigger and BurpSuite. Also author of WebApp Hackers Handbook https://www.linkedin.com/in/marcuspinto1 Authors of Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang https://www.linkedin.com/in/brucedang/ @brucedang
Elias...

Ep. 14 - From Education platform to Browser Isolation: The Birth of SquareX w/ Vivek Ramachandran
Hackers to Founders
01/14/25 • 130 min
Vivek's passion for solving nuanced, bleeding-edge problems in cybersecurity led him to found SquareX, a browser-native security product that addresses client-side web attacks. He emphasizes the importance of authenticity, community engagement, and leveraging one’s expertise to create scalable solutions. Additionally, Vivek delves into the challenges and lessons of entrepreneurship, stressing the significance of realistic goals, understanding market needs, and networking with advisors and peers to build successful ventures.
On the personal front, Vivek values balancing work with family and creative pursuits, such as writing a comic book series to inspire young minds about ethical hacking. He advises entrepreneurs to focus on solving real problems, building meaningful relationships, and continuously learning from customer feedback and market trends.
Events and Conferences
Books
Technologies and Platforms
Podcasts and Media

Ep. 10 - From Wrestling Bears to Cybersecurity: Philip Wylie, Offensive Security Expert at Horizon3.ai and Host of Phillip Wylie Show
Hackers to Founders
12/16/24 • 126 min
From wrestling bears to conquering cybersecurity, Philip Wylie shares his thrilling journey of resilience, self-learning, and mentorship, offering insights into the evolving cybersecurity landscape, podcasting, and building a personal brand.
In this conversation, Philip Wylie shares his journey from wrestling bears and pro wrestling to becoming a prominent figure in cybersecurity, emphasizing self-learning, adaptability, mentorship, community building, and the evolving landscape of cybersecurity careers while reflecting on podcasting, public speaking, and content creation as essential tools for professional growth, networking, and giving back to the community.
Books:
- The Pentester Blueprint - Co-authored by Phillip Wylie.
- Hacking Exposed - A book series popular in the late 90s and early 2000s, associated with Foundstone.
People:
- Phillip Wylie - Cybersecurity professional and pen tester.
- Chris Magistrado (Chris REal0day) - Host of the podcast.
- Alyssa Miller - Co-host of "Uncommon Journey" podcast with Phillip Wylie.
- Chloé Messdaghi - Co-host of "Uncommon Journey" podcast with Phillip Wylie.
- Don Weber - SANS instructor and ICS OT security professional.
- Jack Rhysider - Host of the "Darknet Diaries" podcast, known for cybersecurity storytelling.
- Stone Cold Steve Austin - WWE wrestler who used to train at the same gym as Phillip.
- Rick Flair - Wrestling legend associated with WCW.
- Sting - Wrestler who transitioned from UWF to WCW.
- Iceman King Parsons - Wrestler who hazed newcomers.
- Samson the Bear - The wrestling bear Phillip competed against.
- Vince McMahon - Mentioned regarding the WWF/WWE steroid scandal.
- Dwayne "The Rock" Johnson - Referenced in the context of Samoan wrestling heritage.
- American Gladiators - Referenced as a show Phillip once auditioned for.
Podcasts:
- Uncommon Journey - Phillip Wylie's first podcast, co-hosted with Alyssa Miller and Chloe Messdaghi.
- Darknet Diaries - Mentioned as an inspiration for podcast storytelling (hosted by Jack Rhysider).
- Paul’s Security Weekly - Mentioned for its multi-host format.
Events and Locations:
- DefCon Group 940 - Created by Phillip Wylie for community building.
- RSA Conference - Where Phillip met with Bugcrowd leaders.
- B-Sides San Francisco - Another event linked to Phillip’s early opportunities.
Certifications:
- CEH (Certified Ethical Hacker) - Certification Phillip pursued.
- CISSP - Certification Phillip earned to strengthen his security credentials.
Cultural References:
- Tiger King - Mentioned in the context of unusual animal practices and Oklahoma.

Ep 12 - Secrets of Darknet Diaries: Jack Rhysider's Path to Podcasting Excellence
Hackers to Founders
12/30/24 • 120 min
Interested in the Darknet and untold stories of the internet??
On this episode of Hackers to Founders, Chris and Jack Rhysider explore the art of podcasting, focusing on Jack’s journey with Darknet Diaries and his evolution as a storyteller. They discuss community building, creating superfans, and the challenges of reaching out to guests, along with the complexities of expanding into new languages. Jack shares insights on integrating AI into creative processes, crafting immersive audio, and the importance of editing and collaboration. The conversation delves into hacking culture, ethical storytelling, and Jack’s transition to full-time podcasting through various revenue models. He reflects on personal growth, networking, community engagement, and aspirations for teaching and writing to inspire others.
Guest:
Jack Rhysider, Host of Darknet Diaries
Darknet Diaries:
People
- Chris REal0day Magistrado: Hacker and Host of https://HackersToFounders.com
- Jack Rhysider: Jack Rhysider is the creator and host of Darknet Diaries.
- Pat Flynn: An entrepreneur, author, and podcaster known for Smart Passive Income.
- General Nakasone: General Paul M. Nakasone is the Commander of U.S. Cyber Command and Director of the National Security Agency (NSA), now on the board of OpenAI.
- Roman Mars: A radio producer and host of the podcast 99% Invisible.
- Blind Boy: A podcast host and Irish musician and author.
- Tim Ferriss: An author, entrepreneur, and public speaker known for "The 4-Hour Workweek."
Podcasts and Media Programs
- Darknet Diaries: A podcast exploring true stories from the dark side of the internet.
- Smart Passive Income: A resource for online business and passive income strategies.
- This American Life: A weekly public radio program and podcast.
- Radiolab: A radio program and podcast weaving stories and science into sound-rich documentaries.
- Rabbit Hole: A New York Times podcast exploring the internet's influence on society.
Books and Learning Resources
- Make Noise: A company specializing in modular synthesizers and other music equipment.
- Superfans: This term can refer to various platforms or communities.
- The 4-Hour Workweek: A book by Tim Ferriss on lifestyle design and productivity.
- Pixar in a Box: An online learning collaboration between Pixar Animation Studios and Khan Academy.
Organizations and Events
- NSA (National Security Agency): A U.S. government agency responsible for signals intelligence and information assurance.
- NPR (National Public Radio): An American nonprofit media organization.
- DEF CON: One of the world's largest hacker conventions held annually in Las Vegas.
- CCC (Chaos Computer Club): Europe's largest association of hackers.
- Toorcamp: I couldn't find a specific URL for Tor camp.
- CCCamp: The best hacker gathering in the world, held 1 hour north of Berlin, this features hackers from all over the world, very grassroots.
Technology and Platforms

Ep.3 - Alan Braithwaite, Co-Founder & CTO of RunReveal
Hackers to Founders
10/21/24 • 133 min
In this episode, Chris Real0day interviews Alan Braithwaite, Co-Founder and CTO of RunReveal. They discuss Alan's journey from hacker to entrepreneur, his literary influences, the philosophical foundations of his work in cybersecurity, and the importance of curiosity and learning in the hacker mindset. Alan shares insights from his early experiences with gaming, his education, and his career at Cloudflare and Segment, highlighting the lessons learned along the way. The conversation culminates in a discussion about building RunReveal and understanding customer needs in the cybersecurity landscape. In this conversation, Alan discusses the importance of customer feedback in product development, emphasizing the value of engaging with paying customers. He shares insights on building a user-friendly product, the significance of data management and security, and the introduction of streaming detections. Alan also outlines his vision for a flexible security pipeline and strategies for customer acquisition. The discussion touches on the challenges of on-prem solutions, the journey of founding a startup, and the role of community in innovation. Alan highlights the balance between focusing on the big picture and being present in the moment, concluding with recommendations for books and resources that have influenced his journey.

Ep. 16 - The Birth of the CVE System, created by Adam Shostack
Hackers to Founders
01/29/25 • 103 min
Who created the CVE system? That's Adam! In this insightful episode of "Hackers to Founders," host Chris REal0day Magistrado welcomes Adam Shostack, a renowned cybersecurity expert and co-creator of the Common Vulnerabilities and Exposures (CVE) system. Adam recounts his journey from a curious and geeky childhood, engaging in activities like D&D and building with Legos, to his influential career in cybersecurity. He delves into his early experiences at Brigham and Women's Hospital, where he first encountered the importance of security and privacy in medical systems. Adam shares his entrepreneurial ventures, including his pivotal roles in startups like Net Tech and Zero Knowledge Systems, highlighting the challenges and rewards of building security-focused businesses during the nascent stages of the cybersecurity industry. His passion for threat modeling is evident as he discusses his work at Microsoft, where he developed user-friendly threat modeling tools and authored influential books to make security practices more accessible.
Beyond his technical achievements, Adam emphasizes the significance of education, training, and mentorship in advancing cybersecurity. He explains his transition from product development to focusing on training and creating scalable educational programs, ensuring that essential security skills are widely disseminated. Adam also explores his collaboration with Cyber Green to establish cyber public health, aiming to apply public health methodologies to measure and mitigate cyber impacts effectively. Throughout the conversation, Adam underscores the importance of diversity in fostering innovative solutions and the need for adaptable strategies in an ever-evolving threat landscape. His dedication to making cybersecurity more inclusive and his visionary approach to integrating interdisciplinary techniques position him as a key thought leader committed to enhancing global security practices.
People
- Adam Shostack: Renowned cybersecurity expert, co-creator of the Common Vulnerabilities and Exposures (CVE) system, author of several influential books on threat modeling and security design.
- Frank Abagnale: Subject of the book "Catch Me If You Can," which influenced Adam's childhood interest in security and deception techniques.
- Leonardo DiCaprio: Actor who portrayed Frank Abagnale in the movie adaptation of "Catch Me If You Can."
- Mike Howard: Worked alongside Adam on the Secure Development Lifecycle team.
- Steve Lipner: Collaborated with Adam on threat modeling initiatives.
- Rob Kinnaki: Worked with Adam on the cyber public health project, contributing to the development of new cybersecurity disciplines.
- Tara Wheeler: Partnered with Adam in establishing cyber public health methodologies.
- Heidi Trust: Recommended by Adam as a notable figure intersecting usability and security.
- Gene Spafford: Part of Adam's professional network, contributing to cybersecurity discourse.
- Steve Belvin: Known to Adam, part of his network of cybersecurity professionals.
- Bruce Schneier: Part of Adam's extensive network within the cybersecurity community.
- Marcus Ranham: Known to Adam, contributing to his professional relationships.
- Mudge: Met by Adam during his time at BBN, part of his influential network.
- Weld Pond: Met by Adam at BBN, contributing to his professional connections.
- Prerit Garg: Contributor to threat modeling methodologies.
- Lance Cottrell: Influenced Adam's work on anonymized networks at Zero Knowledge Systems.
- Paul Syverson: Co-inventor of onion routing. His work influenced the development of anonymized network systems like Tor and Zero Knowledge Systems.
- Steve Christie: Involved in the development of the CVE system.
- Dave Mann: Collaborated with Adam on creating the CVE system.
- Andre Fresh: Worked with Adam on developing the CVE system.
- Tony Sager: Helped secure funding for the CVE system through collaboration with MITRE.
- Stephen Savage: Involved in ransomware detection research, mentioned in relation to cyber public health.
Organizations
- CVE (Common Vulnerabilities and Exposures): A standardized system for identifying and categorizing cybersecurity vulnerabilities. Co-created by Adam Shostack to provide a common reference for vulnerabilities across different platforms and organizations.
- Net Tech
- Startup focused on developing vulnera...

Ep.6 - Sumit "Sid" Siddharth, Founder of SecOps Group
Hackers to Founders
11/12/24 • 82 min
In this episode, Chris interviews Sid, a prominent figure in the cybersecurity field, discussing his journey from a small town in India to becoming a successful entrepreneur in the UK. Sid shares insights about his early education, the importance of peers in his career, and the transition from corporate life to founding his own company, NotSoSecure. He emphasizes the significance of training in scaling his business and reflects on the acquisition of his company, highlighting the challenges and rewards of entrepreneurship. In this segment of the conversation, Sid and Chris delve into the intricacies of service businesses in the VC landscape, the evolution of SecOps Group, and the innovative exam models they have developed in the cybersecurity education sector. They discuss the challenges and strategies of building a brand through exam offerings, the importance of understanding the consulting landscape, and how to navigate competition effectively. Sid emphasizes the significance of creating value through affordable and accessible exams, which has led to substantial growth in their business. In this conversation, Chris and Sid explore the intricacies of entrepreneurship, investment, and mentorship. Sid shares his experiences with certifications, the importance of understanding business dynamics, and the value of enjoying the entrepreneurial journey. They discuss the significance of identifying strengths and weaknesses in startups, the role of community in product development, and the future vision for growth in Sid's ventures. The conversation emphasizes the importance of networking, collaboration, and the mindset required for successful entrepreneurship.
Takeaways
- Sid's journey showcases the importance of curiosity and resilience.
- Early exposure to hacking sparked Sid's interest in cybersecurity.
- The role of peers is crucial in personal and professional growth.
- Transitioning from corporate to entrepreneurship requires courage and preparation.
- Training became a key revenue stream for Sid's business.
- Clear messaging is essential for standing out in a competitive market.
- Sid emphasizes the importance of creating trainers rather than just being a trainer.
- The acquisition of Not So Secure was a strategic decision for growth.
- Entrepreneurship is about building something and knowing when to let go.
- Success in business often requires recognizing one's strengths and weaknesses.
- VCs typically prefer product-based businesses over service-based ones.
- Service businesses can sell for 5x to 7x EBITDA depending on various factors.
- The principles of hacking can be applied to various aspects of life and business.
- SecOps Group aims to provide affordable and accessible cybersecurity exams.
- The exam business has seen rapid growth, with over 50,000 participants in a year.
- Building a brand through innovative exam offerings can lead to increased leads and business opportunities.
- A bottom-up approach in sales can complement traditional top-down strategies.
- The exam model is lean and allows for quick updates and changes.
- Creating value through good quality and reasonably priced exams is key to popularity.
- The exam portfolio has expanded significantly in a short time, indicating market demand.
- Certifications can be controversial; choose wisely.
- Investing is more about mentorship than just money.
- Understanding a business's needs is crucial for investment.
- Failures are part of the entrepreneurial journey.
- Enjoying the process leads to eventual success.
- Identifying strengths and weaknesses is key for startups.
- Community engagement is vital for product success.
- Market fit is essential before launching a product.
- Networking can lead to valuable collaborations.
- Continuous learning and adaptation are necessary for growth.
Guest:
Sumit Siddharth - https://www.linkedin.com/in/sumsid/
SecOps Group - https://secops.group/
Show more best episodes

Show more best episodes
FAQ
How many episodes does Hackers to Founders have?
Hackers to Founders currently has 19 episodes available.
What topics does Hackers to Founders cover?
The podcast is about Information Security, Infosec, Founder, Entrepreneur, Entrepreneurship, Investing, Startup, Hacking, Podcasts, Technology, Ceo, Cyber Security, Business, Hacker and Cybersecurity.
What is the most popular episode on Hackers to Founders?
The episode title 'Ep. 16 - The Birth of the CVE System, created by Adam Shostack' is the most popular.
What is the average episode length on Hackers to Founders?
The average episode length on Hackers to Founders is 112 minutes.
How often are episodes of Hackers to Founders released?
Episodes of Hackers to Founders are typically released every 7 days, 4 hours.
When was the first episode of Hackers to Founders?
The first episode of Hackers to Founders was released on Oct 2, 2024.
Show more FAQ

Show more FAQ