<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Cyber Stories Podcast]]></title><description><![CDATA[Conversations with Tech & Cybersecurity Professionals from diverse backgrounds, experiences, and points of view on building a successful career.]]></description><link>https://www.cyberstoriespodcast.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Y3kp!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F00a8c60c-50a7-4a5b-a9fb-49554d9197e8_1280x1280.png</url><title>Cyber Stories Podcast</title><link>https://www.cyberstoriespodcast.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 12 Apr 2026 10:56:27 GMT</lastBuildDate><atom:link href="https://www.cyberstoriespodcast.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Day Johnson]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[cyberstoriespodcast@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[cyberstoriespodcast@substack.com]]></itunes:email><itunes:name><![CDATA[Day Johnson]]></itunes:name></itunes:owner><itunes:author><![CDATA[Day Johnson]]></itunes:author><googleplay:owner><![CDATA[cyberstoriespodcast@substack.com]]></googleplay:owner><googleplay:email><![CDATA[cyberstoriespodcast@substack.com]]></googleplay:email><googleplay:author><![CDATA[Day Johnson]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Cyber Threat Intelligence with Nigel Boston | EP. 26]]></title><description><![CDATA[Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional.]]></description><link>https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-with-nigel-33f</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-with-nigel-33f</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 04 Jul 2025 16:34:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/167957780/9a0721acafd4a1f027b4874301242bd0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Chatting with Nigel Boston, who is a Senior Cyber Threat Intelligence Professional. Nigel has built and led threat intelligence programs that reduce incident response times, operationalize threat intelligence, and automate workflows to help teams focus on what really matters: staying ahead of the threat curve.</p><p>In this episode, we discuss how Nigel discovered cyber threat intelligence and carved a path into the field, what core security skills make a difference in Cyber Threat Intelligence, and how threat intelligence intersects with detection engineering, cloud security, and even AI.</p><p>We also dive into the future of threat intelligence, the rise of actionable intelligence, and his new course, Cyber Threat Intelligence Fundamentals, with Ellington Cyber Academy (ECA), which is a game-changer for anyone looking to break into the space.</p><p>We&#8217;ve also had Kenneth, the founder of ECA, in EP 10, so definitely be sure to check that out.</p><p>Whether you're new to cybersecurity or aiming to level up your threat intel game, this conversation is packed with clarity, strategy, and real-world wisdom.</p><p>Quick side note: This episode was filmed in November 2024, so you can expect to see me with shorter hair.</p><p>&#128276; Don&#8217;t forget to like, comment, and follow!</p><p>&#8594; <a href="https://www.linkedin.com/in/nigelbboston/">Nigel's LinkedIn</a></p><p>&#8594; Nigel's Course</p><p>&#8594; <a href="https://www.ellingtoncyberacademy.com/">ECA</a></p><p>_____________</p><p>RELATED EPISODES/VIDEOS</p><p>&#127897;&#65039;<a href="https://youtu.be/yaNajKjjENA">Episode with Kenneth Ellignton on SIEM &amp; SOAR</a></p><p>_____________</p><p>SPONSORS</p><p>&#128104;&#127998;&#8205;&#128187; <a href="https://app.codecrafters.io/join?via=daycyberwox">&#8288;&#8288;Enhance your coding skills for cybersecurity with Code Crafters&#8288;&#8288;</a></p><p>&#129470; <a href="http://ultrahuman.com/DayCyberwox">&#8288;&#8288;Enhance your health to manage your challenging cybersecurity career with Ultrahuman&#8288;&#8288;</a></p><p>_____________</p><p>&#9889;&#65039;<a href="https://discord.gg/cyberwoxacademy">&#8288;&#8288;JOIN 6,000+ CWX MEMBERS ON DISCORD&#8288;&#8288;</a></p><p>&#128240; S<a href="https://cyberwoxunplugged.com">&#8288;&#8288;UBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER&#8288;&#8288;</a></p><p>&#129398; <a href="https://store.cyberwox.com">&#8288;&#8288;WINTER MERCH&#8288;&#8288;</a></p><p>_____________</p><p>&#129516; CYBERWOX RESOURCES</p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">&#8288;&#8288; Cyberwox Cybersecurity Notion Templates for planning your career&#8288;&#8288;</a></p><p>&#128313; <a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">&#8288;&#8288;Cyberwox Best Entry-Level Cybersecurity Resume Template&#8288;&#8288;</a></p><p>&#128313; <a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">&#8288;&#8288;Learn AWS Threat Detection with my LinkedIn Learning Course&#8288;&#8288;</a></p><p>_____________</p><p>&#128241; LET'S CONNECT</p><p>&#8594; <a href="https://www.instagram.com/daycyberwox&#8203;">&#8288;&#8288;IG&#8288;&#8288;</a></p><p>&#8594; <a href="https://www.threads.net/@daycyberwox">&#8288;&#8288;Threads&#8288;&#8288;</a></p><p>&#8594; <a href="https://substack.com/@cyberwox">&#8288;&#8288;Substack&#8288;&#8288;</a></p><p>&#8594; <a href="https://twitter.com/DayCyberwox&#8203;">&#8288;&#8288;Twitter&#8288;&#8288;</a></p><p>&#8594; <a href="https://www.linkedin.com/in/dayspringjohnson/">&#8288;&#8288;Linkedin&#8288;&#8288;</a></p><p>&#8594; <a href="https://www.tiktok.com/@cyberwox">&#8288;&#8288;Tiktok&#8288;&#8288;</a></p><p>Email: day@cyberwox.com</p><p>_____________</p><p>#&#65039;&#8419; Relevant Hashtags#cybersecurity #hacking #bootcamp #threatdetection #cloudcomputing #cloudsecurity #technology #tech #dallas #texas #cloud</p><p>_____________</p><p>&#9888;&#65039;DISCLAIMER</p><p>This description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!</p><p>_____________</p><p>&#9200;TIMESTAMPS</p><p>00:00 Intro</p>]]></content:encoded></item><item><title><![CDATA[Community College to Microsoft Cybersecurity Internship with Carl David]]></title><description><![CDATA[A conversation with Carl David, a rising cybersecurity professional who started as an Incident Response Intern with Microsoft&#8217;s world-renowned DART team.]]></description><link>https://www.cyberstoriespodcast.com/p/community-college-to-microsoft-cybersecurity-245</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/community-college-to-microsoft-cybersecurity-245</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Fri, 18 Apr 2025 14:14:16 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/161610923/69aa7b4c084ae1dd79dadb8e9292c468.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>A conversation with Carl David, a rising cybersecurity professional who started as an Incident Response Intern with Microsoft&#8217;s world-renowned DART team.</p><p>Carl, originally from Rwanda, shares how he broke into the field after studying at Collin College, where I also began my journey.</p><p>He&#8217;s now making waves as an Intelligence Analyst Intern at Semperis and will be joining USAA as a Cybersecurity Intern in Summer 2025.</p><p>We explore Carl's journey of landing his first internship at Microsoft, which subsequently opened doors to two more offers, various certifications, clear college pathways, and career insights.</p><p>We also discuss the significance of deliberate networking and developing cybersecurity projects. Additionally, we address the hardships that come with immigration and the obstacles faced by international students, along with strategies for overcoming them.</p><p>Carl&#8217;s journey serves as a blueprint for aspiring cyber professionals, particularly those starting from humble beginnings.</p><p>&#128276; Don&#8217;t forget to like, comment, and follow!</p><p>&#8594; <a href="https://www.linkedin.com/in/carl-david-n/">Carl's LinkedIn</a></p><p>&#8594; <a href="https://medium.com/@carltiya7KC7">Carl's Blog</a></p><p>_____________</p><p>RELATED EPISODES/VIDEOS</p><p>&#127897;&#65039;<a href="https://youtu.be/zbSlKmivbvk">For further insights on Cybersecurity Internships, watch this video</a></p><p>&#127897;&#65039;<a href="https://open.spotify.com/episode/1pUYl110QyCO7cglBzhoZ2?si=HTLCM1mgRKird1mQOTq7CQ">Episode with Simeon Kakpovi on KC7</a></p><p>&#127897;&#65039;<a href="https://open.spotify.com/episode/2QkrE9wNoXYnj71zKfalPN?si=huo0O92uQ52mDJEkYtAOAw">Episode with Ifeanyi Otuonye on Cloud &amp; DevOps Engineering</a></p><p>_____________</p><p>SPONSORS</p><p>&#128104;&#127998;&#8205;&#128187; <a href="https://app.codecrafters.io/join?via=daycyberwox">&#8288;Enhance your coding skills for cybersecurity with Code Crafters&#8288;</a></p><p>&#129470; <a href="http://ultrahuman.com/DayCyberwox">&#8288;Enhance your health to manage your challenging cybersecurity career with Ultrahuman&#8288;</a></p><p>_____________</p><p>&#9889;&#65039;<a href="https://discord.gg/cyberwoxacademy">&#8288;JOIN 6,000+ CWX MEMBERS ON DISCORD&#8288;</a></p><p>&#128240; S<a href="https://cyberwoxunplugged.com">&#8288;UBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER&#8288;</a></p><p>&#129398; <a href="https://store.cyberwox.com">&#8288;WINTER MERCH&#8288;</a></p><p>_____________</p><p>&#129516; CYBERWOX RESOURCES</p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">&#8288; Cyberwox Cybersecurity Notion Templates for planning your career&#8288;</a></p><p>&#128313; <a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">&#8288;Cyberwox Best Entry-Level Cybersecurity Resume Template&#8288;</a></p><p>&#128313; <a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">&#8288;Learn AWS Threat Detection with my LinkedIn Learning Course&#8288;</a></p><p>_____________</p><p>&#128241; LET'S CONNECT</p><p>&#8594; <a href="https://www.instagram.com/daycyberwox&#8203;">&#8288;IG&#8288;</a></p><p>&#8594; <a href="https://www.threads.net/@daycyberwox">&#8288;Threads&#8288;</a></p><p>&#8594; <a href="https://substack.com/@cyberwox">&#8288;Substack&#8288;</a></p><p>&#8594; <a href="https://twitter.com/DayCyberwox&#8203;">&#8288;Twitter&#8288;</a></p><p>&#8594; <a href="https://www.linkedin.com/in/dayspringjohnson/">&#8288;Linkedin&#8288;</a></p><p>&#8594; <a href="https://www.tiktok.com/@cyberwox">&#8288;Tiktok&#8288;</a></p><p>Email: day@cyberwox.com</p><p>_____________</p><p>#&#65039;&#8419; Relevant Hashtags#cybersecurity #hacking #bootcamp #threatdetection #cloudcomputing #cloudsecurity #technology #tech #dallas #texas #cloud</p><p>_____________</p><p>&#9888;&#65039;DISCLAIMER</p><p>This description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!</p><p>_____________</p><p>&#9200;TIMESTAMPS</p><p>00:00 Intro</p><p>01:33 About Carl</p><p>03:36 Carl's Journey</p><p>14:07 Ultrahuman</p><p>16:42 Failed College Role (International Student)</p><p>17:48 Microsoft DART Internship</p><p>23:50 KC7</p><p>27:35 Semperis Support Role</p><p>29:43 Code Crafters</p><p>30:20 Building Cybersecurity Projects</p><p>31:26 Semperis Cybersecurity Internship</p><p>32:15 USAA Internship</p><p>34:14 Takeaways</p><p>39:33 Cyberwox</p><p>41:32 Cybersecurity Certifications &amp; Projects</p><p>44:32 College &amp; Experimentation</p><p>52:45 Getting a Cybersecurity Internship in 2025</p><p>59:10 Final Thoughts</p><p>01:00:00 Outro</p>]]></content:encoded></item><item><title><![CDATA[Governance, Risk & Compliance (GRC) Engineering with Ayoub Fandi]]></title><description><![CDATA[A conversation with Ayoub Fandi, a Staff Security Assurance Engineer at Gitlab and host of the GRC Engineering Podcast, as we discuss transforming GRC from a cost center into a strategic product through automation and engineering.]]></description><link>https://www.cyberstoriespodcast.com/p/governance-risk-and-compliance-grc-3bd</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/governance-risk-and-compliance-grc-3bd</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Thu, 20 Mar 2025 12:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/159477334/1ae7663a58948500f42a27227a080a49.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>A conversation with Ayoub Fandi, a Staff Security Assurance Engineer at Gitlab and host of the GRC Engineering Podcast, as we discuss transforming GRC from a cost center into a strategic product through automation and engineering. Ayoub shares his journey from aspiring economist to successful cybersecurity professional. We explore whether GRC is technical and introduce GRC engineering, which uses engineering practices to enhance governance, risk, and compliance. We highlight the shift in GRC professionals' backgrounds and how technical skills improve GRC workflows. We also emphasize the importance of cybersecurity knowledge in GRC roles and what it means to operate at the staff level. This conversation offers invaluable insights for aspiring staff engineers, including advice on getting into GRC and building a career in GRC Engineering. &#8594; <a href="https://www.linkedin.com/in/ayoubfandi/">Ayoub's LinkedIn</a></p><p>&#8594; <a href="https://www.linkedin.com/learning/governance-risk-and-compliance-grc-for-the-cloud-native-revolution/a-cloud-native-ready-grc-program">Governance, Risk, and Compliance (GRC) for the Cloud-Native Revolution Course</a></p><p>&#8594; &nbsp;<a href="https://www.youtube.com/@GRCEngineeringPodcast">GRCEngineeringPodcast</a>&nbsp;</p><p>&#8594; <a href="https://grcengineer.com/">GRC Engineering Newsletter</a>_____________</p><p>RELATED EPISODES</p><p>&#127897;&#65039; For further insights on GRC, <a href="https://youtu.be/63nFUz0lx6Y">watch</a> or <a href="https://creators.spotify.com/pod/show/cyberstoriespodcast/episodes/Scaling-Governance--Risk--Compliance-GRC-with-Izzy-Vixsama-e2nvbdp/a-abgrdod">listen</a> to Episode 12 with Izzy Vixsama from Datadog_____________</p><p>SPONSORS</p><p>&#128104;&#127998;&#8205;&#128187; <a href="https://app.codecrafters.io/join?via=daycyberwox">Enhance your coding skills for cybersecurity with Code Crafters</a></p><p>&#129470; <a href="http://ultrahuman.com/DayCyberwox">Enhance your health to manage your challenging cybersecurity career with Ultrahuman</a>_____________</p><p>&#9889;&#65039;<a href="https://discord.gg/cyberwoxacademy">JOIN 6,000+ CWX MEMBERS ON DISCORD</a></p><p>&#128240; S<a href="https://cyberwoxunplugged.com">UBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER</a></p><p>&#129398; <a href="https://store.cyberwox.com">WINTER MERCH</a>_____________</p><p>&#129516; CYBERWOX RESOURCES</p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework"> Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313; <a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313; <a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a>_____________</p><p>&#128241; LET'S CONNECT</p><p>&#8594; <a href="https://www.instagram.com/daycyberwox&#8203;">IG</a></p><p>&#8594; <a href="https://www.threads.net/@daycyberwox">Threads</a></p><p>&#8594; <a href="https://substack.com/@cyberwox">Substack</a></p><p>&#8594; <a href="https://twitter.com/DayCyberwox&#8203;">Twitter</a></p><p>&#8594; <a href="https://www.linkedin.com/in/dayspringjohnson/">Linkedin</a></p><p>&#8594; <a href="https://www.tiktok.com/@cyberwox">Tiktok</a></p><p>Email: day@cyberwox.com_____________</p><p>#&#65039;&#8419; Relevant Hashtags#cybersecurity #hacking #bootcamp #threatdetection #cloudcomputing #cloudsecurity #technology #tech #dallas #texas #cloud_____________</p><p>&#9888;&#65039;DISCLAIMER</p><p>This description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!_____________</p><p>&#9200;TIMESTAMPS00:00 Intro02:50 Getting Started03:36 Ayoub's Background10:33 GRC's - Business &amp; Cybersecurity14:25 The Evolution of GRC21:09 GRC is Boring23:24 Security Assurance26:49 GRC is NOT Technical31:12 Cyberwox Resource33:11 Cloud &amp; GRC33:55 GRC Engineering41:28 Automation in GRC46:14 Staff Level GRC Work49:26 Getting into GRC53:52 Learning GRC Skils56:10 GRC for the Cloud-Native Revolution Course59:03 The GRC Engineering Podcast01:03:04 Final Thoughts01:04:12 Outro</p>]]></content:encoded></item><item><title><![CDATA[The Cybersecurity Bootcamp Industry & Level Effect with Anthony Bendas]]></title><description><![CDATA[A conversation with Anthony Bendas - Co-Founder at Level Effect, where he designs and delivers cutting-edge cybersecurity training programs, including the Cyber Defense Analyst Program.]]></description><link>https://www.cyberstoriespodcast.com/p/the-cybersecurity-bootcamp-industry-47d</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/the-cybersecurity-bootcamp-industry-47d</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Wed, 26 Feb 2025 14:54:38 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/157966414/0978549718b7095cc2e2640b49e41f2d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>A conversation with Anthony Bendas - Co-Founder at Level Effect, where he designs and delivers cutting-edge cybersecurity training programs, including the Cyber Defense Analyst Program. With over a decade of experience spanning penetration testing, security consulting, and engineering, he has built a reputation for translating complex security concepts into practical, real-world applications.</p><p><a href="https://www.linkedin.com/in/anthonybendas/">Anthony's LinkedIn</a></p><p><a href="https://www.linkedin.com/school/leveleffect/">Level Effect's Linkedin</a></p><p><a href="https://bit.ly/cwx-csp-leveleffect">Level Effect</a></p><p>_____________</p><p>&#9889;&#65039;<a href="https://discord.gg/cyberwoxacademy">JOIN 5,000+ CWX MEMBERS ON DISCORD</a></p><p>&#128240; <a href=" https://cyberwoxunplugged.com">SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER</a></p><p>&#129398;<a href=" https://store.cyberwox.com"> WINTER MERCH</a></p><p>_____________</p><p>&#129516; CYBERWOX RESOURCES</p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><p>_____________</p><p>&#128241; LET'S CONNECT</p><p>Email: day@cyberwox.com</p>]]></content:encoded></item><item><title><![CDATA[Cyber Threat Intelligence at Microsoft & Building KC7 with Simeon Kakpovi]]></title><description><![CDATA[A conversation with Simeon Kakpovi, a Senior Threat Intelligence Analyst at Microsoft & founder of the KC7 foundation.]]></description><link>https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-at-microsoft-e5c</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/cyber-threat-intelligence-at-microsoft-e5c</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 11 Nov 2024 13:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/151501210/c1e66ab99e873fcad6bf4f222b60a341.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>A conversation with Simeon Kakpovi, a Senior Threat Intelligence Analyst at Microsoft &amp; founder of the KC7 foundation.</p><p><a href="https://www.linkedin.com/in/kakpovi/">Simeon's LinkedIn</a></p><p><a href="https://www.linkedin.com/company/kc7cyber/posts/?feedView=all">KC7 Linkedin</a></p><p><a href="https://kc7cyber.com/">KC7Cyber</a></p><p>_____________</p><p>&#9889;&#65039;<a href="https://discord.gg/cyberwoxacademy">&#8288;JOIN 4,000+ CWX MEMBERS ON DISCORD&#8288;</a></p><p>&#128240; <a href="https://cyberwoxunplugged.com">&#8288;SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER&#8288;</a></p><p>&#129398; <a href="https://store.cyberwox.com">&#8288;WINTER MERCH DROP COMING SOON!&#8288;</a></p><p>_____________</p><p>&#129516; CYBERWOX RESOURCES</p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">&#8288;Cyberwox Cybersecurity Notion Templates for planning your career&#8288;</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">&#8288;Cyberwox Best Entry-Level Cybersecurity Resume Template&#8288;</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">&#8288;Learn AWS Threat Detection with my LinkedIn Learning Course&#8288;</a></p><p>_____________</p><p>&#128241; LET'S CONNECT</p><p>Email: day@cyberwox.com</p><p>_____________</p><p>&#9888;&#65039;DISCLAIMER</p><p>This video description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!</p>]]></content:encoded></item><item><title><![CDATA[Automating Security Detection Engineering with Dennis Chow]]></title><description><![CDATA[A conversation with Dennis Chow, an experienced security engineer and manager who has led global security teams in multiple Fortune 500 industries.]]></description><link>https://www.cyberstoriespodcast.com/p/automating-security-detection-engineering-e30</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/automating-security-detection-engineering-e30</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 16 Sep 2024 11:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/149232352/8fad1bf21b43f15e6ab541413aa8dd06.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>A conversation with Dennis Chow, an experienced security engineer and manager who has led global security teams in multiple Fortune 500 industries. Dennis started from an IT and security analyst background, working his way up to engineering, architecture, and consultancy in blue and red team-focused roles. Dennis is also a former AWS professional services consultant who focused on transforming security operations for clients and holds GIAC Security Expert (GSE) #288. <a href="https://dwchow.medium.com/">Dennis' Blog</a></p><p><a href="https://github.com/dc401/">Dennis' Github</a></p><p><a href="https://www.linkedin.com/in/dwchow/">Dennis' LinkedIn</a></p><p><a href="https://amzn.to/47v2EFw">Automating Security Detection Engineering Book</a></p><p>_____________</p><p>PACKT GIVEAWAY</p><p><a href="https://www.linkedin.com/posts/activity-7241420432510214144-53Sd?utm_source=share&amp;utm_medium=member_desktop">Packt Giveaway Linkedin Link</a></p><p><a href="https://x.com/daycyberwox/status/1835655895230906818">Packt Giveaway Twitter/X Link</a></p><p>_____________</p><p>&#9889;&#65039;<a href="https://discord.gg/cyberwoxacademy">JOIN 4,000+ CWX MEMBERS ON DISCORD</a></p><p>&#128240; <a href="https://cyberwoxunplugged.com">SUBSCRIBE TO THE CYBERWOX UNPLUGGED NEWSLETTER</a></p><p>&#129398; <a href="https://store.cyberwox.com">WINTER MERCH DROP COMING SOON!</a> _____________</p><p>&#129516; CYBERWOX RESOURCES</p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cyberlearningframework">Cyberwox Cybersecurity Notion Templates for planning your career</a></p><p>&#128313;<a href="https://daycyberwox.gumroad.com/l/cybersecurityresume">Cyberwox Best Entry-Level Cybersecurity Resume Template</a></p><p>&#128313;<a href="https://www.linkedin.com/learning/introduction-to-aws-threat-detection/">Learn AWS Threat Detection with my LinkedIn Learning Course</a></p><p>_____________</p><p>&#128241; LET'S CONNECT</p><p>Email: day@cyberwox.com</p><p>_____________</p><p>&#9888;&#65039;DISCLAIMER</p><p>This video description has some affiliate links, and I may receive a small commission for purchases made through these links. I appreciate your support!</p>]]></content:encoded></item><item><title><![CDATA[Asking Cybersecurity Bootcamp Graduates If It Was Worth It]]></title><description><![CDATA[Live panel discussion with boot camp graduates, asking them difficult questions about their Cybersecurity boot camp experience.]]></description><link>https://www.cyberstoriespodcast.com/p/asking-cybersecurity-bootcamp-graduates-dd2</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/asking-cybersecurity-bootcamp-graduates-dd2</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 23:36:23 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479429/c7afa92305640dd5db41bf302d65b81a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Live panel discussion with boot camp graduates, asking them difficult questions about their Cybersecurity boot camp experience. Podcast starts at 01:40.</p><p>PANELISTS:</p><ul><li><p><a href="https://www.linkedin.com/in/cyberprojd/">Joshua Davis</a></p></li><li><p><a href="https://www.linkedin.com/in/leeclayton1995/">Lee Clayton</a></p></li><li><p><a href="https://www.linkedin.com/in/david-elgut/">David Egult</a></p></li><li><p><a href="https://www.linkedin.com/in/nigelbboston/">Nigel Boston</a></p></li><li><p><a href="https://www.linkedin.com/in/moja-williams-3aa577190/">Moja Williams</a></p></li><li><p><a href="https://www.linkedin.com/in/joshua-mpere-b5590470/">Joshua Mpere</a></p></li><li><p><a href="https://www.linkedin.com/in/charleslin02/">Charles Lin</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[From US Marine to Cybersecurity Analyst with David Huynh]]></title><description><![CDATA[Today&#8217;s episode is with a friend and Cyberwox Community Manager, David Hyunh, and we discuss everything involving his evolution and transition from the US Marines to becoming a Cybersecurity Analyst.]]></description><link>https://www.cyberstoriespodcast.com/p/from-us-marine-to-cybersecurity-analyst-195</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/from-us-marine-to-cybersecurity-analyst-195</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 23:00:55 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479430/5779c3e3ac5938248ac6e2584e313af5.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Today&#8217;s episode is with a friend and Cyberwox Community Manager, David Hyunh, and we discuss everything involving his evolution and transition from the US Marines to becoming a Cybersecurity Analyst.</p><p>&#128073;&#127997;CONNECT WITH DAVID: <a href="https://www.linkedin.com/in/knowfatiguetech/">David's LinkedIn</a></p>]]></content:encoded></item><item><title><![CDATA[From Olympic Athlete To Cloud Engineer Ifeanyi Otuonye]]></title><description><![CDATA[Today&#8217;s episode is with a friend, Ifeanyi Otuonye, and we discuss everything involving his past life as an Olympic Athlete and the journey to becoming a Cloud Engineer.]]></description><link>https://www.cyberstoriespodcast.com/p/from-olympic-athlete-to-cloud-engineer-81c</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/from-olympic-athlete-to-cloud-engineer-81c</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 22:42:08 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479431/b523d0a7f868b6e8c328255072df2bc0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Today&#8217;s episode is with a friend, Ifeanyi Otuonye, and we discuss everything involving his past life as an Olympic Athlete and the journey to becoming a Cloud Engineer.</p><p>&#128071;&#127997;IFEANYI's STUFF:</p><ul><li><p><a href="https://www.linkedin.com/in/ifeanyi-otuonye/">LinkedIn</a></p></li><li><p><a href="https://x.com/ifeanyi_otuonye">Twitter/X</a></p></li><li><p><a href="https://medium.com/@ifeanyiro">Blog/Medium</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Asking Ex-Helpdesks How To Transition Into Cybersecurity]]></title><description><![CDATA[Live panel discussion of previous Helpdesk and IT Support Professionals who now work in Cybersecurity.]]></description><link>https://www.cyberstoriespodcast.com/p/asking-ex-helpdesks-how-to-transition-be2</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/asking-ex-helpdesks-how-to-transition-be2</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 22:19:46 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479432/9ff33b6edc363f0dc23ef5239d6f5720.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Live panel discussion of previous Helpdesk and IT Support Professionals who now work in Cybersecurity. Episode starts at 2:45.</p><p>PANELISTS:</p><ul><li><p><a href="https://www.linkedin.com/in/reginald-wilkerson/">Reginald (Dion) Wilkerson II</a></p></li><li><p><a href="https://www.linkedin.com/in/knowfatiguetech/">David (KnowFatigue) Huynh</a></p></li><li><p><a href="https://www.linkedin.com/in/jonathan-bailey-tx/">Jonathan Bailey</a></p></li><li><p><a href="https://www.linkedin.com/in/courtney-wright03/">Courtney Wright</a></p></li><li><p><a href="https://www.linkedin.com/in/jalinmayberry/">Jalin Mayberry</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Modern Detection Engineering with Jimmy Vo]]></title><description><![CDATA[Today&#8217;s episode is with a mentor & colleague, Jimmy Vo, and we discuss everything career, threat intelligence, detection engineering, cloud security, hiring, Brazilian Jiu Jitsu, and so much more.]]></description><link>https://www.cyberstoriespodcast.com/p/modern-detection-engineering-with-b45</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/modern-detection-engineering-with-b45</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 21:53:36 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479433/01145efdfbdd21b7164ec2bc5ab1e613.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Today&#8217;s episode is with a mentor &amp; colleague, Jimmy Vo, and we discuss everything career, threat intelligence, detection engineering, cloud security, hiring, Brazilian Jiu Jitsu, and so much more. &#128071;&#127997;JIMMY's STUFF:</p><ul><li><p><a href="https://www.linkedin.com/in/jimmytvo/">LinkedIn</a></p></li><li><p><a href=" https://twitter.com/JimmyVo">Twitter</a></p></li><li><p><a href="https://blog.jimmyvo.com/">Blog</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[My 3+ Years Cybersecurity & Cloud Security Engineering Journey]]></title><description><![CDATA[Stop data brokers from exposing your information.]]></description><link>https://www.cyberstoriespodcast.com/p/my-3-years-cybersecurity-and-cloud-e31</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/my-3-years-cybersecurity-and-cloud-e31</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 20:46:25 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479434/ef015a89df08b0cceaa1d7be62f9e6a6.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Stop data brokers from exposing your information. Visit my sponsor, https://aura.com/daycyberwox, to get a 14-day free trial and see if your personal information has been compromised!</p><p>&#127909; EPISODE RESOURCES: &#8212;&#8212; &#128313;<a href="https://www.trendmicro.com/vinfo/us/security/definition/business-email-compromise-(bec)">Business email compromise</a> &#128313;<a href="https://www.ibm.com/topics/phishing#:~:text=Phishing%20attacks%20are%20fraudulent%20emails,actions%20that%20expose%20themselves%20or">Phising</a> &#128313;<a href="https://www.ibm.com/docs/en/qsip/7.5?topic=tools-artifact-analysis-suspicious-malicious-content">Analyzing exchange artifacts</a> &#128313;<a href="https://www.blumira.com/email-forwarding-risks/ ">Analyzing suspicious email forwarding rule</a> &#128313;<a href="https://www.cybersecurity-insiders.com/threat-hunting-through-email-headers/">Analyzing email headers</a> &#128313;<a href="https://insights.sei.cmu.edu/blog/detecting-and-grouping-malware-using-section-hashes/">Analyzing malicious hashes</a> &#128313;<a href="https://www.crowdstrike.com/cybersecurity-101/malware/malware-analysis/">Analyzing malicious files</a></p>]]></content:encoded></item><item><title><![CDATA[Cashier turned Cybersecurity Content Engineer with Malik Girondin]]></title><description><![CDATA[Today's episode features Malik Girondin, a highly energetic cybersecurity content engineer at Security Blue Team, who shares his journey into cybersecurity.]]></description><link>https://www.cyberstoriespodcast.com/p/cashier-turned-cybersecurity-content-7ee</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/cashier-turned-cybersecurity-content-7ee</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 20:34:37 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479435/437e8f8a101bd180b5ed66de6b764bc0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Today's episode features Malik Girondin, a highly energetic cybersecurity content engineer at Security Blue Team, who shares his journey into cybersecurity. _____________ &#128104;&#127997;&#8205;&#128300;MALIK's STUFF</p><ul><li><p><a href="https://www.youtube.com/@malikgirondin">YouTube</a></p></li><li><p><a href="https://www.linkedin.com/in/malikgirondin/">LinkedIn</a></p></li><li><p><a href="https://www.udemy.com/course/blue-team-content-engineer-the-complete-career-guide/?kw=blue+team&amp;src=sac">Udemy Course</a></p></li><li><p><a href="https://www.blkheights.com/">Black Heights</a></p></li><li><p><a href="https://blackgirlshack.org/">Black Girls Hack</a></p></li><li><p><a href="https://amzn.to/48lPvP5">Financial Starter Kit</a></p></li><li><p><a href="https://amzn.to/48jGPZl">So Good They Can't Ignore You</a></p></li><li><p><a href="https://amzn.to/48kKxSm">Digital Minimalism</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Genius Cybersecurity Advice for 40 Minutes]]></title><description><![CDATA[The Very Best of Cyber Stories SEASON 1.]]></description><link>https://www.cyberstoriespodcast.com/p/genius-cybersecurity-advice-for-40-831</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/genius-cybersecurity-advice-for-40-831</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 20:25:50 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479436/62260cfdee0aeefd3277a08809bf1e65.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>The Very Best of Cyber Stories SEASON 1.</p>]]></content:encoded></item><item><title><![CDATA[Scaling Governance, Risk & Compliance (GRC) with Izzy Vixsama]]></title><description><![CDATA[Izzy is a GRC (Governance, Risk & Compliance) professional with over a decade of experience in Cybersecurity.]]></description><link>https://www.cyberstoriespodcast.com/p/scaling-governance-risk-and-compliance-953</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/scaling-governance-risk-and-compliance-953</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 20:20:04 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479437/b73c0320279358e3f02c0733d26d2947.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Izzy is a GRC (Governance, Risk &amp; Compliance) professional with over a decade of experience in Cybersecurity. In today's episode, we discuss everything related to this field and address various misconceptions that many people have about GRC. We also delve into Izzy's life as a Digital Nomad and the many lessons she's learned over that journey.</p><p>&#128073;&#127997;CONNECT WITH IZZY:</p><ul><li><p><a href="https://twitter.com/Is_Vix">Twitter</a></p></li><li><p><a href="https://www.linkedin.com/in/ismaellevixsama/">LinkedIn</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[US Marine Cyber Threat Intelligence to Cybersecurity Creative with Chris Cochran]]></title><description><![CDATA[Chris Cochran is Hacker Valley Media's Co-Founder and Chief Creative Officer (@HackerValleyMedia).]]></description><link>https://www.cyberstoriespodcast.com/p/us-marine-cyber-threat-intelligence-f84</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/us-marine-cyber-threat-intelligence-f84</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 20:09:23 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479438/1d1b6e2f722f2de0e847e6b160b9e9c2.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Chris Cochran is Hacker Valley Media's Co-Founder and Chief Creative Officer (@HackerValleyMedia). He is a former cybersecurity leader who now focuses on content creation. With a background in threat intelligence from his time in the US Marine Corps, Chris has spent over a decade building Threat Intelligence Programs for significant organizations like Netflix.</p><p>Currently, he serves as the Chief Evangelist and Advisory CISO at Huntress, passionately addressing cybersecurity challenges SMBs face. Chris's expertise and practical communication skills make him a valuable asset in Cybersecurity.</p><p>&#128071;&#127997;CONNECT WITH CHRIS:</p><ul><li><p><a href="https://twitter.com/chrishvm">Twitter</a></p></li><li><p><a href="https://www.linkedin.com/in/chrishvm/">Linkedin</a></p></li><li><p><a href="https://hackervalley.com/">Hacker Valley Media</a></p></li><li><p><a href="https://www.axonius.com/blog/the-easy-framework-for-your-threat-intelligence-program">The EASY Framework</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[Deli Clerk turned Fortune 500 SIEM & SOAR Consultant with Kenneth Ellington]]></title><description><![CDATA[Kenneth is a seasoned senior consultant with extensive experience in SIEM and SOAR technologies.]]></description><link>https://www.cyberstoriespodcast.com/p/deli-clerk-turned-fortune-500-siem-f46</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/deli-clerk-turned-fortune-500-siem-f46</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 19:20:08 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479439/ecd9c7e9bf8611026807b263a9f5b15c.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Kenneth is a seasoned senior consultant with extensive experience in SIEM and SOAR technologies. He has taught at reputable universities like the University of Houston and has worked as a consultant for Fortune 500 companies, including Publix, DTCC, and EY. Kenneth's expertise has helped his clients achieve significant salary increases within a short span of three months. His proficiency in these technologies, coupled with his teaching and consulting achievements, make him a highly sought-after professional in the cybersecurity field.</p><p>Learn more about Kenneth's story in this episode of Cyber Stories. &#128071;&#127997;CONNECT WITH KENNETH:</p><ul><li><p><a href="https://www.linkedin.com/in/kenneth-ellington">Linkedin</a></p></li><li><p><a href="/https://twitter.com/KennethElling31">Twitter</a></p></li><li><p><a href="https://kenneth-ellington-s-school.teachable.com/p/home">Ellington Cyber Academy</a></p></li><li><p><a href="https://www.linkedin.com/company/ellington-cyber-academy/">ECA Linkedin</a></p></li></ul>]]></content:encoded></item><item><title><![CDATA[From CISO to Cloud Security YouTuber with Ashish Rajan]]></title><description><![CDATA[This is my conversation with Ashish Rajan, the cloud security podcast host and aficionado.]]></description><link>https://www.cyberstoriespodcast.com/p/from-ciso-to-cloud-security-youtuber-3fa</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/from-ciso-to-cloud-security-youtuber-3fa</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 18:54:20 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479440/c2f02a5edd58766580a1496fe95c66d0.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>This is my conversation with Ashish Rajan, the cloud security podcast host and aficionado. Ashish and I met a couple of years ago during the podcast's early days, and I was privileged to be a guest even before I started working fully immersed in cloud security.</p><p>In this episode, we discuss the journey &amp; origin story of the cloud security podcast, Ashish's professional background, the magnificent beard (of course!), some insightful and funny podcast moments, food, and a ton of other exciting things! &#128073;&#127997;SUBSCRIBE to the <a href="https://www.youtube.com/c/cloudsecuritypodcast">&nbsp;@CloudSecurityPodcast&nbsp;</a>!</p><p>&#128071;&#127997;Follow Ashish and Cloud Security Podcast:</p><ul><li><p><a href="https://twitter.com/hashishrajan">Ashish's Twitter</a></p></li><li><p><a href="https://twitter.com/CloudSecPod">Cloud Security Podcast's Twitter</a></p></li><li><p><a href="https://au.linkedin.com/in/ashishrajan">Ashsish's Linkedin</a></p></li><li><p><a href="https://www.linkedin.com/company/cloud-security-podcast">Cloud Security Podcast's Linkedin</a></p></li><li><p><a href="https://www.instagram.com/cloudsecuritypodcast/">Cloud Security Podcast's Instagram</a></p></li></ul><p>_____________ &#129516; EPISODE RESOURCES: &#128313;<a href="https://www.youtube.com/watch?v=8Zc7f_4M6JE">My previous Interview with Ashish</a> &#128313;<a href="https://www.youtube.com/watch?v=Nz0CrOzeVl0&amp;t=3893s">My Notion Tutorial for Beginners</a></p>]]></content:encoded></item><item><title><![CDATA[From DoD to Red Teamer & Offensive Security Engineer with Travon Duncan]]></title><description><![CDATA[Excited to share this conversation with Travon, where we discuss his journey into Cybersecurity from college to the DOD, his transition from defensive security to offensive security, and achieving certifications such as the @OffSecTraining OSCP,]]></description><link>https://www.cyberstoriespodcast.com/p/from-dod-to-red-teamer-and-offensive-73e</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/from-dod-to-red-teamer-and-offensive-73e</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Tue, 03 Sep 2024 18:34:23 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479441/7682667f5b082d5f9fa8b70bd70ef132.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Excited to share this conversation with Travon, where we discuss his journey into Cybersecurity from college to the DOD, his transition from defensive security to offensive security, and achieving certifications such as the&nbsp; <a href="https://studio.youtube.com/channel/UChYZsplz61SeG0olX6cMoAA">&nbsp;@OffSecTraining&nbsp;</a>&nbsp; OSCP,&nbsp; <a href="https://studio.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw">&nbsp;@TCMSecurityAcademy&nbsp;</a>&nbsp; PNPT &amp; the CRTO, all within a relatively short but incredibly focused period. Travon is also big on helping others get into the industry, building Legos, and many other cool things.</p><p>&#128071;&#127997;CONNECT WITH TRAVON:</p><ul><li><p><a href="https://www.instagram.com/premier/">IG</a></p></li><li><p><a href="https://www.tiktok.com/@whoispremier">Tiktok</a></p></li><li><p><a href="https://twitter.com/whoisPremier">Twitter</a></p></li><li><p><a href="https://discord.gg/Yz5CMZPf7S">Discord</a></p></li></ul><p>_____________ &#129516; EPISODE RESOURCES &#128313; <a href="https://youtu.be/LtFdjt-LU9I">Interview with TayOnTech</a></p><p>&#128313;<a href="https://www.youtube.com/watch?v=Nz0CrOzeVl0&amp;t=3893s">My Notion Tutorial for Beginners</a></p>]]></content:encoded></item><item><title><![CDATA[Becoming A Detection Architect at 21 with Charles Quansah]]></title><description><![CDATA[This episode is an interview with my best friend and @CyberwoxAcademy co-founder Charles.]]></description><link>https://www.cyberstoriespodcast.com/p/becoming-a-detection-architect-at-be8</link><guid isPermaLink="false">https://www.cyberstoriespodcast.com/p/becoming-a-detection-architect-at-be8</guid><dc:creator><![CDATA[Day Johnson]]></dc:creator><pubDate>Mon, 02 Sep 2024 09:21:55 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/148479442/e73c226feead4f8baea622797c6e389a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>This episode is an interview with my best friend and @CyberwoxAcademy co-founder Charles. Charles is one of the brightest and sharpest young people I know, and this conversation has been going on for a long time.</p><p>We talk about Charles&#8217; journey into Cybersecurity, securing multiple Cybersecurity internships during College, majoring in Computer Science while learning Cybersecurity on his own, Specializing in Azure Security, becoming a Threat Detection Architect, and much more. _____________ &#129516; EPISODE RESOURCES: &#128313;<a href="https://www.blacksincyberconf.com/">Blacks in Cybersecurity</a> <a href="https://www.cybersecuritydive.com/news/microsoft-20b-security-revenue/641498/#:~:text=Microsoft%20surpassed%20%2420%20billion%20in,quarter%20earnings%20call%20last%20week.">&#128313;Microsoft surpasses $20B in security revenue as enterprise customers consolidate news article</a> &#128313;<a href="https://cyberwoxacademy.com/azure-cloud-detection-lab-project/">Azure Detection Lab Blog</a> &#128313;<a href="https://youtube.com/playlist?list=PLBNtagSCmDWw27ccfeWeiaMcpNIxpGHy4">Azure Detection Lab Playlist</a> &#128313;<a href="https://learn.microsoft.com/en-us/azure/defender-for-cloud/just-in-time-access-usage Interview With My Director: https://youtu.be/Ay-S4E2_fDc">Just-in-time Access</a> &#128313;<a href="https://www.youtube.com/watch?v=Nz0CrOzeVl0&amp;t=3893s">My Notion Tutorial for Beginners</a></p>]]></content:encoded></item></channel></rss>