Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.
All content for Infosecurity Magazine Podcast is the property of Infosecurity Magazine and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.
AI Safety for Cybersecurity Professionals: Understanding the Risks and Implications
Infosecurity Magazine Podcast
48 minutes 40 seconds
2 years ago
AI Safety for Cybersecurity Professionals: Understanding the Risks and Implications
In November the UK hosted its first ever AI Safety Summit, less than one year after OpenAI released ChatGPT, its revolutionary generative AI-powered chatbot.
In this episode, we delve into the rapidly evolving world of artificial intelligence, exploring the implications of recent developments and announcements from governments, tech companies, and industry bodies around the globe.
Join us as we dissect the key takeaways from the AI Safety Summit and examine how these advancements impact the cybersecurity landscape. Whether you're a cybersecurity professional or simply curious about the future of AI, this episode provides valuable insights into the intersection of AI and cybersecurity.
You’ll hear from:
- Matt Roach, Head of i-4 Cyber Security Leaders Community, KPMG UK (11.45)
- Rob van der Veer, Senior Director, Software Improvement Group (SIG) & Founder, OWASP AI Exchange (30.01)
Infosecurity Magazine Podcast
Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.
We sat down with Matthew Maynard (3.42), a cybersecurity pro by day and a real-life cyber ghostbuster by night, who doesn’t just hunt vulnerabilities, but haunts the hackers themselves.
While most bug bounty programs reward researchers for finding flaws, Matthew’s work is far more chilling (and thrilling). As part of threat intelligence programs like Halcyon’s Threat Research Intelligence Program (TRIP), he infiltrates ransomware gangs, extracts their secrets and helps shut down their operations before they strike.
For CISOs and executives, Matthew’s experience offers a rare and critical perspective on how to shift from reactive fire-drills to proactive threat hunting. By leveraging dark web intelligence, undercover engagements, and threat actor profiling, security leaders can anticipate attacks, disrupt criminal operations, and even recover stolen data before it’s too late.