Ethical Baby Thief | A Conversation With Andrew Lemon | Tech Done Different Podcast

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=V5TcOJJjMxY



Category:
Show
Duration: 21:57
6 views
0


Guest: Andrew Lemon, CEO / Principal Security Engineer at Red Threat

On LinkedIn | https://www.linkedin.com/in/lemonitup/

On Twitter | https://twitter.com/Lemonitup

On YouTube | https://www.youtube.com/@redthreatsec

________________________________

Host: Ben Schmerler

On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ben-schmerler

________________________________This Episode’s Sponsors



Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

________________________________

Episode Description

This week's episode of Tech Done Different features Ben interviewing Andrew Lemon, Principal Security Engineer at Red Threat. They talk about what it means to be a "good hacker."

You’ll learn:

Why "cut and paste" penetration tests miss the point
The mindset of learning to become an ethical hacker
What can make a security assessment fun and exciting
Why "stealing a baby" can actually be a good goal for a security professional
The role of specialization and generalization in security management

________________________________For more podcast stories from Tech Done Different With Ted Harrington and Ben Schmerler: https://www.itspmagazine.com/tech-done-different-podcast

Watch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwi




Other Videos By ITSPmagazine


2023-04-02Unleashing Inner Peace: Exploring Meditation and Consciousness in a Chaotic World | With Shai Tubali
2023-04-01Soaring Into the Cosmos Unraveling the Future of Space Exploration With Astronaut Eileen Collins
2023-03-29Unveiling Tomorrow's Cybersecurity Game-Changers | A Conversation with Cecilia Murtagh Marinier
2023-03-28How to avoid the use of Toxic Chemicals in our Waterways? Shortcuts are not always the best paths.
2023-03-28Who are Kayla and Taylor? | Meet your Hosts of the New Locked Down Show!
2023-03-28Safeguarding the C-Suite | Pioneering the Future of the Executive Digital Protection Revolution
2023-03-27Come Fly with us to the Aerospace Village | ITSPmagazine Event Coverage: RSAC 2023 San Francisco USA
2023-03-26Understanding What a Research Culture Is with Dr. Stephen J. Scotti and NASA's Return-to-Flight
2023-03-23Taking Application Security To The Next Level | A Checkmarx Story With Renny Shen And Bryant Schuck
2023-03-23Lean Into Your Digital Senses | A Conversation With Debasish Biswas | Tech Done Different Podcast
2023-03-23Ethical Baby Thief | A Conversation With Andrew Lemon | Tech Done Different Podcast
2023-03-23Please don’t stop the music. Web3, crypto, and NFTs take center stage with Charles Ellingsen
2023-03-22How to Reduce the Revolving Door on Security Teams with Phillip Wylie
2023-03-22Chat GPT Conversations Series | Unleashing AI: Privacy, Possibilities, and Perils
2023-03-21What to Expect At RSA Conference USA 2023 | A Conversation with Linda Gray Martin and Britta Glade
2023-03-21A Conversation About Podcasting with The Shared Security Show Podcast Host Tom Eston
2023-03-17Cloud Security for the Next Generation of Companies | A Conversation w/Taylor Hersom & Ashish Rajan
2023-03-15Book | Through the Glass Ceiling to the Stars | Guest: NASA Astronaut and Colonel USAF (Retired).
2023-03-15Unleashing the Power of Innovation: Inside the Mentor Project's Innovation Lab | Podcast E. 3
2023-03-15Owning your Place in a Foreign Land | A Conversation with CMU Graduate, Harini Ramprasad
2023-03-11Book Happy Money Author Ken Honda



Tags:
technology
tech
startup
business
tech business
cybersecurity
infosec
hacking
hackers