Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
WE'RE IN!

WE'RE IN!

Synack

On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
bookmark
Share icon

All episodes

Best episodes

Top 10 WE'RE IN! Episodes

Goodpods has curated a list of the 10 best WE'RE IN! episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to WE'RE IN! for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite WE'RE IN! episode by adding your comments to the episode page.

Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Task Force.

In this episode of WE’RE IN!, Michael elaborates on his "immune system" approach for the internet, a strategy where threats are quickly identified and neutralized. But this requires robust – and highly trusted – information sharing between groups.

Listen to hear more about:

  • The threat assessment for the 2024 Paris Olympics, highlighting potential threats from Russia and Azerbaijan
  • The need for more resilient software systems that can degrade gracefully rather than catastrophically fail
  • Michael’s thoughts on industry diversification and the value of different viewpoints in tackling cybersecurity challenges
bookmark
plus icon
share episode

Anand Prakash on cloud security startups and next-gen hacking

Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by SentinelOne, where he’s now a senior director of product management.

In the latest episode of WE’RE IN!, Anand touches on India's prominence in global tech – particularly in security research and bug bounty programs – and he shares his personal journey into cybersecurity, which began with a curiosity about hacking at a young age in cyber cafes.

Listen to hear more about:

  • How bug bounty programs have evolved, with companies now more open to ethical hacking due to increased awareness of data breaches
  • The viability of government efforts to reduce entire classes of vulnerabilities like SQLi
  • If AI is effective in improving red teaming and bug bounty hunting
bookmark
plus icon
share episode

Integrating security into the product development lifecycle is a tall order for any industry. It’s particularly challenging for healthcare, with its wide range of critical needs from HVAC systems to medical devices. Kevin Tambascio, director of cybersecurity data and application protection at Cleveland Clinic, juggles the need for constant vigilance and staying updated on fast-moving threats to hospitals.

In the latest episode of WE’RE IN!, Kevin discusses the importance of compliance and risk assessment, noting that while compliance with rules like HIPAA is crucial, it's equally important to pressure test controls against real-world threats. Ransomware targeting hospital data is the primary threat, while phishing and potential abuse of generative AI also pose significant risks.

Listen to hear more about:

  • The benefits of forming an AI task force to enact safe and responsible procedures while enabling clinicians and researchers to explore AI’s potential
  • Effectively communicating cyber threats to non-technical staff by relating them to potential impacts on patient safety and business operations
  • Application security in healthcare; applications often have access to sensitive patient health information and can be potential entry points for cyber threats
bookmark
plus icon
share episode

Dennis Fisher, editor-in-chief at Decipher, reflects on his journalism career covering cybersecurity for more than two decades in the latest episode of the WE’RE IN! cybersecurity podcast. He began in 2000, covering email before transitioning to security. Soon his focus shifted to vulnerability reporting, including blockbuster bugs in Windows and Internet Explorer. This led to Microsoft's trustworthy computing memo and significant changes in the software industry.

Dennis also discusses the challenges of cybersecurity journalism and the importance of democratizing information.

Listen to hear more about:

  • The overlap between cybercrime and traditional organized crime and the impact of cryptocurrency
  • Dennis’s interest in crime novels and the challenges of incorporating his background into his own books
  • The surprising topic Dennis would cover if he wasn’t focused on security
bookmark
plus icon
share episode

Sara Mosley, technical director for the Bureau of Diplomatic Security's Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She recommends balancing security measures with mission needs to prevent users from circumventing security protocols.

In this episode of WE’RE IN!, Sara underlines the importance of collaboration between IT and security teams to adequately protect data and address relevant threats in anticipation of the September deadline for federal Zero Trust compliance.

Listen to hear more about:

  • The role of the private sector in adopting Zero Trust frameworks and providing security tools
  • Preparing for emerging technologies like quantum computing and their accelerated development due to AI advancements
  • Why Sara believes hackers will initially benefit more from AI advancements than defenders
bookmark
plus icon
share episode

Jen, a former military professional turned hacker, shares her journey into cybersecurity and her experiences with the Synack Red Team in the latest episode of WE’RE IN! She transitioned from fixing security issues to actively seeking vulnerabilities, inspired by her brother and motivated by her experiences at the storied hacker conference, DEF CON. Jen emphasizes the importance of skill development and preparation for women entering the male-dominated cybersecurity field, and discusses her preferred hacking tools and techniques.

In this episode of WE’RE IN!, Jennifer gives her take on AI in penetration testing, suggesting it should be used as a tool for initial reconnaissance but not for exploiting vulnerabilities.

Listen to hear more about:

  • Why all of Jennifer’s smart home devices’ warranties are voided
  • How anyone can be a hacker by following the Open Source Intelligence methodology to find vulnerabilities
  • The importance of producing high-quality work and going above and beyond to gain trust in the pentesting industry
bookmark
plus icon
share episode

Bill Dunnion, chief information security officer at global telecommunications company Mitel, is well-versed in the critical nature of telecom infrastructure and the devices that support it. He’s also keenly aware of how his role as CISO is under increasing scrutiny from regulators around the world and in Canada, where Mitel is based.

In this episode of WE’RE IN!, Bill expresses skepticism about AI, preferring the term "machine learning" for most current applications, but he acknowledges its potential benefits, such as improving threat detection.

Listen to hear more about:

  • How Bill's diverse background in telecom, IT, and security has provided him with a well-rounded perspective to approach his CISO role
  • Why the integration of voice, data, and collaboration tools in enterprise communications presents new cybersecurity challenges
  • Why security awareness is crucial for both professional and personal life
bookmark
plus icon
share episode

Hear from this season’s guests for their thoughts and predictions on AI and cybersecurity. We took sound bites from a range of WE’RE IN! interviewees, whose opinions on AI vary from thinking it’s overblown to being cautiously curious. Tune into this episode to better understand AI’s seismic effects on the infosec industry.

bookmark
plus icon
share episode

Application security maven Tanya Janca – AKA SheHacksPurple – is an accomplished author, pentester and onetime music festival organizer. But she’s perhaps best known as the founder of We Hack Purple, a community of security professionals dedicated to sharing useful cyber information including coding trainings and coursework. (Dynamic application security testing Bright Security acquired We Hack Purple earlier this year, bringing its own approach to the “shift left” dilemma of moving cybersecurity earlier in the software development cycle.)

Tanya has spent much of her career in cybersecurity and IT empowering others to strengthen their own skills. With We Hack Purple, she built a community from the ground up, and she’s organized plenty of security talks and capture-the-flag tournaments along the way. Computer science can be a nebulous, wide-ranging field – Tanya has further helped people zero in on what they should focus on learning in the wide world of cybersecurity.

-------

Tune into the episode to hear more on:
* The story behind Tanya’s bestselling book, “Alice and Bob Learn Application Security”

The qualities that make a good pentester: “You have to be very determined and detail oriented,” as Tanya put it

#cybermentoringmonday and the value of professional mentorship

-------

Links:

* https://wehackpurple.com/

https://brightsec.com/

https://www.synack.com/

https://readme.security/

bookmark
plus icon
share episode
WE'RE IN! - Season 3 Trailer
play

12/14/23 • 2 min

Ready to hear from top cybersecurity newsmakers, executives and storytellers? Eager for advice on how to launch a successful cyber career? Curious about hacking threats that seem to grow more menacing by the day? Get ready for Season 3 of WE'RE IN!

Hosted by Synack's Head of Communications and longtime cybersecurity journalist Blake Thompson Heuer (Sobczak), WE'RE IN! takes you inside the brightest minds in cybersecurity for unique insights and colorful stories from the front lines of our digital transformation. Don't miss the latest season of this breakout podcast, sponsored by Synack!

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does WE'RE IN! have?

WE'RE IN! currently has 61 episodes available.

What topics does WE'RE IN! cover?

The podcast is about Information Security, Security, Tech, Management, Hacking, Podcasts, Technology, Information, Digital, Cyber, Business, Hacker and Cybersecurity.

What is the most popular episode on WE'RE IN!?

The episode title 'Anand Prakash on cloud security startups and next-gen hacking' is the most popular.

What is the average episode length on WE'RE IN!?

The average episode length on WE'RE IN! is 37 minutes.

How often are episodes of WE'RE IN! released?

Episodes of WE'RE IN! are typically released every 16 days.

When was the first episode of WE'RE IN!?

The first episode of WE'RE IN! was released on Jul 12, 2021.

Show more FAQ

Toggle view more icon

Comments