Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=T0coxnnBvKo



Category:
Show
Duration: 31:11
53 views
0


Guest: Ethan Dietrich, Founder and CEO of SIXGEN [@SixGenInc]

On LinkedIn | https://www.linkedin.com/in/ethan-dietrich-86343b30/

On YouTube | https://www.youtube.com/channel/UC-aLxtVynWxNWwfyKzK42VA

________________________________

Hosts:

Ben Schmerler

On ITSPmagazine šŸ‘‰ https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ben-schmerler

Ted Harrington

On ITSPmagazine šŸ‘‰ https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington

________________________________This Episode’s Sponsors



Are you interested in sponsoring an ITSPmagazine Channel?šŸ‘‰ https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

________________________________

Episode Description

This week’s guest is Ethan Dietrich, SIXGEN’s CEO. He joins TDD to discuss what security looks like from an attacker's point of view and how his team uses the information to level the playing field.

You’ll Learn:

- What a day looks like when thinking and acting like the bad guy

- How attackers stay anonymous

- How can we level the playing field

- What's the mindset companies need to have to protect themselves

- How AI could change the cyber security industry

________________________________For more podcast stories from Tech Done Different With Ted Harrington and Ben Schmerler: https://www.itspmagazine.com/tech-done-different-podcast

Watch the webcast version on-demand on YouTube:

šŸ“ŗ https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwi

ITSPMagazine YouTube Channel:

šŸ“ŗĀ https://www.youtube.com/@itspmagazine

Be sure to share and subscribe!




Other Videos By ITSPmagazine


2023-08-02Cookie Crumbles: Unveiling Web Session Integrity Vulnerabilities with Pedro Adão and Marco Squarcina
2023-08-01BOOK | All Pride, No Ego: A Queer Executive’s Journey to Living and Leading Authentically
2023-08-01Aerospace Village: Build—Inspire—Promote | A Hacker Summer Camp 2023 Event Coverage Conversation
2023-08-01Houston, We Have a Problem: Analyzing the Security of Low Earth Orbit Satellites w/Johannes Willbold
2023-08-01Why be a Mentor | A Conversation With David Tyler | Tech Done Different Podcast
2023-08-01Unleashing End-User Productivity Through Secure Browsing: What is the Enterprise Browser?
2023-08-01How to Navigate Compliance vs. Security Conundrum with Ian Hill | Secure Your Strategy Podcast
2023-07-31Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models with Fredrik Heiding
2023-07-27Embracing Diversity in Cybersecurity SquadCon Las Vegas '23 Redefines Inclusion in Infosec Industry
2023-07-26The Art of Building Security Products: Balancing Innovation and User-Friendly Design
2023-07-25Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast
2023-07-22To the Stars, the Algorithms, and Beyond A Human Journey of Self Discovery through Technology
2023-07-21How Artificial Intelligence is revolutionizing search engines & reshaping our access to information
2023-07-21Understand, Manage, Measure Cyber Risk: Practical Solutions for Creating a Sustainable Cyber Program
2023-07-19A Carbon, a Silicon, and a Cell, walk into a bar... | A Redefining Society Podcast Series
2023-07-19Who are Nation-State Threats | A Conversation With Brian Contos | Tech Done Different Podcast
2023-07-19How to Lead Security in the AI/ML Era with Paul Watts | Secure Your Strategy Podcast
2023-07-19The Art of Networking, Digital Junk & Avoiding The Motivational Trap | Conversation w/ Daniel Okoro
2023-07-18AI, Cyber Warfare, and Beyond: Understanding Cybersecurity's Future | Conversation With Steve Wylie
2023-07-15A day in the life of a Script Supervisor. What is it, what it does, and why it's so important
2023-07-13The Critical Role of Hypersonics for the Future Security of the United States