Épisodes

  • Ep 13 - Finding Your Passion in Cybersecurity with Dave Chronister
    Jan 7 2025

    From crimping cables to advising the French Minister of Defense—Dave Chronister’s journey is unreal!

    Step into the world of cybersecurity with Dave Chronister, a trailblazer whose career spans decades of groundbreaking achievements. As the founder of Parameter Security, Dave has helped organizations across heavily regulated industries protect their technology, data, and reputation through cutting-edge strategies. He also launched ShowMeCon, a premier InfoSec conference known for its hands-on training and top-tier speakers. From building one of the largest exchange server deployments to advising global leaders, Dave has been featured on CNN and CNBC for his expertise. Join us as he shares his journey from a small-town IT tech to a global cybersecurity icon, blending technical mastery with insights on business, AI, and creating impactful conferences. You won’t want to miss this!

    1. People and Speakers

    • Dave Chronister: Cybersecurity expert, founder of Parameter Security, creator of ShowMeCon.
    • Chris REal0day: Co-interviewer or participant in the conversation with Dave Chronister.
    • French Minister of Defense - Mentioned as a speaker at a conference where Dave Chronister was a keynote speaker.

    2. Companies and Organizations

    • Parameter Security: Cybersecurity firm founded by Dave Chronister.
    • ECCouncil: Organization offering certifications like CEH and facilitating cybersecurity training.
    • EuroPol: European Union's law enforcement agency, involved in cybersecurity collaborations.
    • FBI: U.S. federal law enforcement agency, referenced in cybersecurity operations.
    • Fortinet: Cybersecurity company mentioned in the context of speaker quality.

    3. Conferences

    • ShowMeCon: InfoSec conference organized by Dave Chronister.
    • Def Camp: Cybersecurity conference held in Bucharest, Romania.
    • Positive Hack Days (PHDays): Cybersecurity conference held in Moscow, Russia.
    • Black Hat: Leading business-focused cybersecurity conference.
    • DEF CON: Grassroots hacking conference focused on InfoSec enthusiasts.
    • RSA Conference: Government-focused cybersecurity conference.

    4. Certifications and Courses

    • CISSP: Certified Information Systems Security Professional, taught by Dave Chronister.
    • CEH: Certified Ethical Hacker certification, taught by Dave Chronister.
    • Security Plus: Foundational cybersecurity certification taught by Dave.

    5. Pop Culture References

    • Animal House: Mentioned as the basis for Mizzou's party reputation.

    6. Books

    • Find Your Why by Simon Sinek - A book that helps individuals and organizations discover their purpose and align their actions accordingly​
    • Traction by Gino Wickman - Focused on the Entrepreneurial Operating System (EOS) framework, helping businesses gain clarity and improve execution​
    • Rocket Fuel by Gino Wickman and Mark C. Winters - Explores the relationship between visionaries and integrators in business, emphasizing the need for complementary roles to drive success​
    • Value-Based Fees by Alan Weiss - A guide for service-based businesses on pricing based on value delivered rather than hours worked​
    • Vivid Vision by Cameron Herold - A book on creating a clear and compelling vision for businesses and teams to rally around​
    • Who Not How by Dan Sullivan - A book on delegating effectively and focusing on what you do best by surrounding yourself with the right people​
    • Living the Best Year Ever - A book with worksheets and tools for setting and achieving personal and professional goals
    • The Home MBA - A curated list of books for learning business fundamentals
    Voir plus Voir moins
    2 h et 27 min
  • Ep 12 - Secrets of Darknet Diaries: Jack Rhysider's Path to Podcasting Excellence
    Dec 30 2024
    Interested in the Darknet and untold stories of the internet??On this episode of Hackers to Founders, Chris and Jack Rhysider explore the art of podcasting, focusing on Jack’s journey with Darknet Diaries and his evolution as a storyteller. They discuss community building, creating superfans, and the challenges of reaching out to guests, along with the complexities of expanding into new languages. Jack shares insights on integrating AI into creative processes, crafting immersive audio, and the importance of editing and collaboration. The conversation delves into hacking culture, ethical storytelling, and Jack’s transition to full-time podcasting through various revenue models. He reflects on personal growth, networking, community engagement, and aspirations for teaching and writing to inspire others.Guest:Jack Rhysider, Host of Darknet DiariesDarknet Diaries:Clothing ShopPatreonPeopleChris REal0day Magistrado: Hacker and Host of https://HackersToFounders.comJack Rhysider: Jack Rhysider is the creator and host of Darknet Diaries.Pat Flynn: An entrepreneur, author, and podcaster known for Smart Passive Income.General Nakasone: General Paul M. Nakasone is the Commander of U.S. Cyber Command and Director of the National Security Agency (NSA), now on the board of OpenAI.Roman Mars: A radio producer and host of the podcast 99% Invisible.Blind Boy: A podcast host and Irish musician and author.Tim Ferriss: An author, entrepreneur, and public speaker known for "The 4-Hour Workweek."Podcasts and Media ProgramsDarknet Diaries: A podcast exploring true stories from the dark side of the internet.Smart Passive Income: A resource for online business and passive income strategies.This American Life: A weekly public radio program and podcast.Radiolab: A radio program and podcast weaving stories and science into sound-rich documentaries.Rabbit Hole: A New York Times podcast exploring the internet's influence on society.Books and Learning ResourcesMake Noise: A company specializing in modular synthesizers and other music equipment.Superfans: This term can refer to various platforms or communities.The 4-Hour Workweek: A book by Tim Ferriss on lifestyle design and productivity.Pixar in a Box: An online learning collaboration between Pixar Animation Studios and Khan Academy.Organizations and EventsNSA (National Security Agency): A U.S. government agency responsible for signals intelligence and information assurance.NPR (National Public Radio): An American nonprofit media organization.DEF CON: One of the world's largest hacker conventions held annually in Las Vegas.CCC (Chaos Computer Club): Europe's largest association of hackers.Toorcamp: I couldn't find a specific URL for Tor camp.CCCamp: The best hacker gathering in the world, held 1 hour north of Berlin, this features hackers from all over the world, very grassroots.Technology and PlatformsChatGPT: An AI language model developed by OpenAI.Minecraft: A sandbox video game developed by Mojang Studios.Roblox: An online platform and game creation system.IRC (Internet Relay Chat): A protocol for real-time text communication.Anonymous: A decentralized international activist and hacktivist collective.4chan: An anonymous English-language imageboard website.Cultural and Physical LandmarksElden Ring: An action role-playing game developed by FromSoftware.Eiffel Tower: A wrought-iron lattice tower in Paris, France.CreatorsMr. Beast: A popular YouTuber known for his elaborate challenges and philanthropy.CORPSE: Artist and Creator w/ a very unique voice.
    Voir plus Voir moins
    2 h
  • Ep. 11 - How to Start a Successful Pentesting Company: Pujan Shah and Daniel Amidon Co-Founders of ApolloGuard
    Dec 23 2024

    Want to start your own pentesting consultancy/business? Listen how ApolloGuard created their own pentesting company, offering high-value services in a competitive market.

    The podcast explores the journey of Daniel Amidon and Pujan Shah, co-founders of ApolloGuard, a cybersecurity company specializing in offensive security. Daniel shares his transition from being a self-taught hacker mentored in vulnerability research to becoming a cybersecurity entrepreneur. Pujan highlights his path from studying computer science and working in various industries like healthcare and venture capital to co-founding ApolloGuard. Their partnership is built on complementary skills: Daniel’s technical expertise and Pujan’s operational and strategic vision. Together, they emphasize the importance of proactive security measures and building trust with clients.

    The discussion also dives into how ApolloGuard operates, blending technical depth with business agility. They share insights on starting a pen-testing firm, from leveraging existing networks for early clients to addressing the gap between compliance-driven testing and meaningful security solutions. The founders stress the value of persistence, innovation, and relationships in growing a security company while staying true to their mission of providing high-quality, actionable insights to clients.

    Guests
    Pujan Shah - Co-Founder & CEO
    Daniel Amidon - Co-Founder & CTO

    Company
    ApolloGuard Website
    Hackers to Founders Website - https://HackersToFounders.com

    Books Mentioned

    1. Your Next Five Moves - Patrick Bet-David
    2. The Subtle Art of Not Giving a F*ck - Mark Manson
    3. The 7 Habits of Highly Effective People - Stephen Covey
    4. The Four Hour Work Week - Tim Ferriss
    5. The Obstacle Is the Way - Ryan Holiday
    6. Outliers - Malcolm Gladwell

    Businesses Mentioned

    1. DEFCON - Hacker & InfoSec Conference
    2. StockX - Website to buy rare shoes
    Voir plus Voir moins
    1 h et 23 min
  • Ep. 10 - From Wrestling Bears to Cybersecurity: Philip Wylie, Offensive Security Expert at Horizon3.ai and Host of Phillip Wylie Show
    Dec 16 2024

    From wrestling bears to conquering cybersecurity, Philip Wylie shares his thrilling journey of resilience, self-learning, and mentorship, offering insights into the evolving cybersecurity landscape, podcasting, and building a personal brand.


    In this conversation, Philip Wylie shares his journey from wrestling bears and pro wrestling to becoming a prominent figure in cybersecurity, emphasizing self-learning, adaptability, mentorship, community building, and the evolving landscape of cybersecurity careers while reflecting on podcasting, public speaking, and content creation as essential tools for professional growth, networking, and giving back to the community.


    Books:

    1. The Pentester Blueprint - Co-authored by Phillip Wylie.
    2. Hacking Exposed - A book series popular in the late 90s and early 2000s, associated with Foundstone.

    People:

    1. Phillip Wylie - Cybersecurity professional and pen tester.
    2. Chris Magistrado (Chris REal0day) - Host of the podcast.
    3. Alyssa Miller - Co-host of "Uncommon Journey" podcast with Phillip Wylie.
    4. Chloé Messdaghi - Co-host of "Uncommon Journey" podcast with Phillip Wylie.
    5. Don Weber - SANS instructor and ICS OT security professional.
    6. Jack Rhysider - Host of the "Darknet Diaries" podcast, known for cybersecurity storytelling.
    7. Stone Cold Steve Austin - WWE wrestler who used to train at the same gym as Phillip.
    8. Rick Flair - Wrestling legend associated with WCW.
    9. Sting - Wrestler who transitioned from UWF to WCW.
    10. Iceman King Parsons - Wrestler who hazed newcomers.
    11. Samson the Bear - The wrestling bear Phillip competed against.
    12. Vince McMahon - Mentioned regarding the WWF/WWE steroid scandal.
    13. Dwayne "The Rock" Johnson - Referenced in the context of Samoan wrestling heritage.
    14. American Gladiators - Referenced as a show Phillip once auditioned for.

    Podcasts:

    1. Uncommon Journey - Phillip Wylie's first podcast, co-hosted with Alyssa Miller and Chloe Messdaghi.
    2. Darknet Diaries - Mentioned as an inspiration for podcast storytelling (hosted by Jack Rhysider).
    3. Paul’s Security Weekly - Mentioned for its multi-host format.


    Events and Locations:

    1. DefCon Group 940 - Created by Phillip Wylie for community building.
    2. RSA Conference - Where Phillip met with Bugcrowd leaders.
    3. B-Sides San Francisco - Another event linked to Phillip’s early opportunities.

    Certifications:

    1. CEH (Certified Ethical Hacker) - Certification Phillip pursued.
    2. CISSP - Certification Phillip earned to strengthen his security credentials.

    Cultural References:

    1. Tiger King - Mentioned in the context of unusual animal practices and Oklahoma.
    Voir plus Voir moins
    2 h et 7 min
  • Ep.9 - Maxie Reynolds, Founder of Subsea Cloud
    Dec 4 2024
    Join our Discord! https://discord.gg/NWN3ehgmwPIn this episode of the Hackers to Founder podcast, host Chris REal0day interviews Maxie Reynolds, a pioneer in sustainable technology and cybersecurity. Maxie shares her unique journey from working offshore as a ROV pilot to founding Subsea Cloud, a company focused on underwater data centers. She discusses overcoming family expectations, her experiences in the offshore industry, and her transition into cybersecurity. The conversation also touches on cultural differences experienced while living in Alabama and Australia, her philosophy on life choices, and her brief foray into the entertainment industry as a stuntwoman and actress. In this conversation, Maxie shares his experiences ranging from cultural misunderstandings to the challenges faced during red team engagements in cybersecurity. He discusses his transition from working at PWC to starting his own firm, emphasizing the importance of networking and building a client base. Maxie also highlights the significance of continuous learning through reading and debates the effectiveness of carbon capture and other environmental solutions. Finally, he introduces his company, Subsea Cloud, which focuses on innovative data center efficiency. In this conversation, Maxie discusses the intricacies of subsea operations, emphasizing the cost efficiency and energy dynamics involved. He shares insights on the challenges faced by startups, particularly in navigating the enabler's dilemma and the impact of antitrust regulations. The discussion also covers client acquisition strategies, the exploration of GPU trials, and the landscape of crypto mining. Maxie highlights the importance of networking and building authentic connections, while also touching on the art of social engineering and perceptions in networking. In this engaging conversation, Chris and Maxie delve into the intricacies of red teaming, the importance of social engineering, and the profound impact of literature on personal and professional development. They discuss their dream team for red team engagements, share insights on various influential books, and reflect on the writing process and its challenges. The dialogue highlights the significance of knowledge sharing and the role of imagination in problem-solving, culminating in a thoughtful exploration of happiness and lifestyle choices.TakeawaysMaxie Reynolds is a trailblazer in sustainable technology and cybersecurity.She overcame family expectations to pursue a career offshore.Maxie's journey includes working as a ROV pilot and in underwater robotics.She transitioned into cybersecurity and founded her own company.Cultural experiences in Alabama and Australia shaped her perspective.Maxie emphasizes the importance of taking opportunities in life.She believes parenting is a challenging and thankless task.Maxie's philosophy is to live an interesting life without regrets.She has a unique background in stunt work and acting.Maxie's experiences highlight the intersection of technology and personal growth. Cultural identity can lead to misunderstandings in professional settings.Red team engagements can present unexpected challenges.Transitioning to entrepreneurship often involves risk and uncertainty.Networking is crucial for building a client base.Continuous learning through reading is essential for personal growth.Carbon capture technology faces significant challenges and skepticism.Data centers can be made more efficient through innovative cooling solutions.Being likeable, driven, and smart are key traits for success.Understanding the technical aspects of environmental issues is vital.Networking can lead to unexpected opportunities. Water has a high specific heat, affecting ocean warming.Subsea operations can be significantly cheaper than traditional methods.Startups often face challenges due to the enabler's dilemma.Antitrust movements can benefit startups by reducing acquisitions.Determination and synthesis of information are key to startup success.Client trials are a common strategy for acquiring larger companies.The crypto mining market presents unique opportunities and challenges.Targeting large companies is a primary focus for growth.Funding strategies are crucial for operational success.Networking authentically can lead to valuable connections. Max shares his ideal red team members, emphasizing their unique skills.Social engineering is a crucial aspect of red team engagements.Books like 'The Artist's Direction' and 'Atomic Habits' are influential.Maxie prefers actionable, research-based books over self-help.The conversation touches on the importance of understanding human behavior.Maxie discusses the impact of books like 'Outlaw Ocean' on awareness of global issues.Freakonomics provides interesting insights into societal behaviors.The writing process requires discipline and sacrifice, especially during tight deadlines.Maxie believes in the importance of imagination in problem-solving.Lifestyle ...
    Voir plus Voir moins
    1 h et 41 min
  • Ep.8 - Marcus Sailler, Global Director of Red Team at MUFG
    Nov 27 2024
    In this episode of Hackers to Founders, Chris Magistrado interviews Marcus Sailler, a seasoned expert in cybersecurity with over 25 years of experience. They discuss Marcus's journey from the military to leading red teams, the importance of understanding business impact in cybersecurity, and the nuances of interviewing in the field. Marcus shares insights on building effective red teams, the significance of program development, and how aspiring professionals can transition from pen testing to red teaming. The conversation emphasizes the need for intellectual curiosity, practical experience, and the ability to communicate effectively within organizations. In this conversation, Chris and Marcus delve into the dynamics between red and blue teams, discussing the transition of professionals between these roles and the importance of understanding various vulnerabilities. They explore the relevance of legacy vulnerabilities in modern cybersecurity, the challenges faced in building effective red team programs, and the ethical considerations surrounding the use of zero-day vulnerabilities. Additionally, they highlight the significance of industry breaches in validating security programs and the value of certifications and training for aspiring red teamers. In this conversation, Chris and Marcus delve into various aspects of cybersecurity, focusing on the importance of critical thinking in exams, the transition from on-premises to cloud environments, and the necessity of understanding cloud infrastructure for red teaming. They also explore social engineering techniques, particularly vishing, and discuss the #WeHackHealth movement, which combines fitness and cybersecurity. Additionally, they touch on the discovery of CVEs and the challenges of vulnerability management in software. In this conversation, Chris REal0day and Marcus Sailler discuss various aspects of the cybersecurity industry, including investment opportunities, content creation strategies, the importance of networking, and career transitions. They explore the challenges of building relationships in a corporate environment, the significance of soft skills, and the complexities of navigating global cybersecurity issues. The discussion also touches on the differences between vulnerability research and red teaming, highlighting the unique challenges and rewards of each career path. In this conversation, Marcus Sailler and Chris REal0day delve into various aspects of cybersecurity, leadership dynamics, cultural insights, and personal growth. They discuss the challenges of reporting vulnerabilities without rewards, the complexities of different leadership styles, and the importance of understanding interpersonal relationships through concepts like love languages. The conversation also touches on the significance of cultural adaptation in language learning, the tools essential for cybersecurity professionals, and the value of continuous training and development in red teaming. Additionally, they share insightful book recommendations that emphasize resilience and self-awareness in both personal and professional contexts.TakeawaysRed teamers must understand the business impact of their findings.Interviews should be interactive and allow for discussion.Early career experiences can be valuable in cybersecurity.Joining the military can provide a strong foundation for IT careers.Building a red team requires maturity in the organization's security posture.Learning from experts and networking is crucial for career development.Program development is essential for legitimizing red team efforts.Demonstrating curiosity and initiative can help in career transitions.Creating internal communities can foster talent and interest in cybersecurity.Understanding operating systems is key for effective red teaming. Red teamers often transition from blue team roles due to frustration with unaddressed issues.Understanding foundational vulnerabilities is still valuable, even if less prevalent.The usefulness of vulnerabilities depends on the organization's maturity and vulnerability management program.Building a red team requires investment in talent development and retention.Using industry breaches can effectively validate the need for security programs.Ethical considerations arise when using zero-day vulnerabilities in demonstrations.Training and certifications are crucial for effective red teaming.Practical experience is essential for understanding red team operations.The urgency of red teaming requires quick execution in complex environments.A strong understanding of both offensive and defensive strategies is necessary for red team success. The exam structure emphasizes critical thinking and situational awareness.Understanding cloud infrastructure is crucial for aspiring red teamers.Vishing is an effective social engineering technique that uses phone calls.The #WeHackHealth movement promotes fitness within the cybersecurity community.Vulnerability management requires ...
    Voir plus Voir moins
    2 h et 14 min
  • Ep.7 - Lauro Perez, Host of Exploit Brokers
    Nov 19 2024

    Chris REal0day interviews Lauro Perez, a seasoned software engineer and cybersecurity enthusiast, exploring his journey from a young computer enthusiast to a professional in the field. Lauro shares pivotal career moments, including a life-changing scholarship, navigating job offers, overcoming imposter syndrome, and the importance of mentorship. The conversation highlights AI’s role in learning, the evolution of cybersecurity, and challenges like ransomware-as-a-service and bug bounty programs. Lauro emphasizes soft skills, networking, and balancing work with personal growth while reflecting on ethical considerations in tech. They also discuss content creation in cybersecurity, hands-on learning, unscripted podcasting, and future aspirations. Touching on AI, true crime, and gaming, the dialogue offers insights into the evolving tech landscape and personal growth.

    Key Takeaways

    • Lauro's passion for computers began at age 10, with perseverance shaping his career.
    • A scholarship was pivotal, and networking led to multiple job offers.
    • Soft skills, confidence, and concrete achievements are crucial in interviews.
    • Mentorship and self-study greatly impact career growth.
    • AI tools aid in learning, cybersecurity, and content creation.
    • Balancing work, family, and personal projects is essential.
    • Imposter syndrome is common but manageable with self-belief.
    • Challenges in cybersecurity include AI's role, unfair bug bounty rewards, and ransomware-as-a-service.
    • Sharing knowledge empowers others and reinforces personal learning.
    • Trends like AI and diverse representation are reshaping cybersecurity.
    • Hands-on learning is critical, as computer science education often lacks depth.
    • Authentic, unscripted content fosters engaging discussions.
    • Collaboration and personal experiences inspire innovation in tech, health, and gaming.


    Lauro Perez
    LinkedIn - https://www.linkedin.com/in/lauroperezjr/

    Exploit Brokers
    Website - https://exploitbrokers.com/
    YouTube - https://www.youtube.com/@exploitbrokers
    Spotify - https://open.spotify.com/show/3YRafqb2OGxfXgoIPfRbe2?si=40e21cd5ac0b45c0
    Rumble - https://rumble.com/user/ExploitBrokers


    Visit our website: https://HackersToFounders.com

    Voir plus Voir moins
    2 h et 22 min
  • Ep.6 - Sumit "Sid" Siddharth, Founder of SecOps Group
    Nov 12 2024

    In this episode, Chris interviews Sid, a prominent figure in the cybersecurity field, discussing his journey from a small town in India to becoming a successful entrepreneur in the UK. Sid shares insights about his early education, the importance of peers in his career, and the transition from corporate life to founding his own company, NotSoSecure. He emphasizes the significance of training in scaling his business and reflects on the acquisition of his company, highlighting the challenges and rewards of entrepreneurship. In this segment of the conversation, Sid and Chris delve into the intricacies of service businesses in the VC landscape, the evolution of SecOps Group, and the innovative exam models they have developed in the cybersecurity education sector. They discuss the challenges and strategies of building a brand through exam offerings, the importance of understanding the consulting landscape, and how to navigate competition effectively. Sid emphasizes the significance of creating value through affordable and accessible exams, which has led to substantial growth in their business. In this conversation, Chris and Sid explore the intricacies of entrepreneurship, investment, and mentorship. Sid shares his experiences with certifications, the importance of understanding business dynamics, and the value of enjoying the entrepreneurial journey. They discuss the significance of identifying strengths and weaknesses in startups, the role of community in product development, and the future vision for growth in Sid's ventures. The conversation emphasizes the importance of networking, collaboration, and the mindset required for successful entrepreneurship.


    Takeaways

    • Sid's journey showcases the importance of curiosity and resilience.
    • Early exposure to hacking sparked Sid's interest in cybersecurity.
    • The role of peers is crucial in personal and professional growth.
    • Transitioning from corporate to entrepreneurship requires courage and preparation.
    • Training became a key revenue stream for Sid's business.
    • Clear messaging is essential for standing out in a competitive market.
    • Sid emphasizes the importance of creating trainers rather than just being a trainer.
    • The acquisition of Not So Secure was a strategic decision for growth.
    • Entrepreneurship is about building something and knowing when to let go.
    • Success in business often requires recognizing one's strengths and weaknesses.
    • VCs typically prefer product-based businesses over service-based ones.
    • Service businesses can sell for 5x to 7x EBITDA depending on various factors.
    • The principles of hacking can be applied to various aspects of life and business.
    • SecOps Group aims to provide affordable and accessible cybersecurity exams.
    • The exam business has seen rapid growth, with over 50,000 participants in a year.
    • Building a brand through innovative exam offerings can lead to increased leads and business opportunities.
    • A bottom-up approach in sales can complement traditional top-down strategies.
    • The exam model is lean and allows for quick updates and changes.
    • Creating value through good quality and reasonably priced exams is key to popularity.
    • The exam portfolio has expanded significantly in a short time, indicating market demand.
    • Certifications can be controversial; choose wisely.
    • Investing is more about mentorship than just money.
    • Understanding a business's needs is crucial for investment.
    • Failures are part of the entrepreneurial journey.
    • Enjoying the process leads to eventual success.
    • Identifying strengths and weaknesses is key for startups.
    • Community engagement is vital for product success.
    • Market fit is essential before launching a product.
    • Networking can lead to valuable collaborations.
    • Continuous learning and adaptation are necessary for growth.

    Guest:
    Sumit Siddharth - https://www.linkedin.com/in/sumsid/
    SecOps Group - https://secops.group/


    Visit our website: https://HackersToFounders.com

    Voir plus Voir moins
    1 h et 23 min