Episodes

  • #5 Pay It Forward ft. George Raileanu
    Jul 24 2024

    In this conversation, George Raileanu discusses the importance of mentoring, strategies for finding a mentor, and the benefits of building a strong network in cybersecurity. He also shares advice on continuous learning, dealing with imposter syndrome and burnout, and the value of paying it forward in the industry.

    Connect with George Raileanu on LinkedIn: https://www.linkedin.com/in/george-raileanu/

    Takeaways

    • Mentoring is a crucial aspect of career development in cybersecurity, regardless of experience level.
    • To find a mentor, attend local cybersecurity conferences, join online communities, and reach out to professionals in the field.
    • Building a strong network in cybersecurity involves being genuine, reaching out to like-minded individuals, and asking for advice and guidance.
    • Continuous learning in cybersecurity requires understanding your learning style, considering your flexibility, and identifying your goals.
    • Dealing with imposter syndrome and burnout involves finding hobbies outside of technology, checking in with yourself regularly, and recognizing your progress.
    • Paying it forward by sharing knowledge and experiences with others is essential for personal growth and the advancement of the cybersecurity community.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark

    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of my employer.

    Show more Show less
    39 mins
  • #4 A Vulnerability Assessment Isn't a Pentest ft. Kristofer Johnson
    Jul 17 2024

    Kyser Clark and Kristopher Johnson's conversation covers various topics related to offensive security, certifications, career progression, and distinguishing between vulnerability assessments and penetration tests. Kristopher shares his journey into offensive security, his challenges, and the importance of continuous learning and perseverance. The conversation also goes into the significance of different certifications, the value of practical experience, and the need for clear differentiation between vulnerability assessments and penetration tests. Additionally, the discussion highlights the relevance of LinkedIn for career growth and networking within the cybersecurity industry.

    Connect with Kristofer Johnson on LinkedIn: https://www.linkedin.com/in/kjohnson422/

    Takeaways

    • Continuous learning and perseverance are essential for success in offensive security.
    • Clear differentiation between vulnerability assessments and penetration tests is crucial for accurate testing and reporting.
    • LinkedIn is a powerful platform for career growth and networking within the cybersecurity industry.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark

    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of my employer.

    Show more Show less
    36 mins
  • #3 Best Way to Learn Active Directory Hacking Skills ft. Robert O’Connor
    Jul 10 2024

    The conversation between Kyser Clark and Robert O'Connor covers a wide range of topics related to penetration testing, certifications, career progression, and personal experiences in the cybersecurity field. Robert shares insights on his journey from IT intern to senior analyst to penetration tester, discussing certifications, specialization in Active Directory assessments, and the challenges of transitioning into pen testing. The conversation also goes into the nuances of different types of pentesting, the impact of imposter syndrome, and the evolving landscape of pen testing roles in the industry.

    Connect with Robert O'Connor on LinkedIn: https://www.linkedin.com/in/robert-o-connor-16634a164/

    Takeaways

    • The journey from IT intern to senior analyst to penetration tester highlights the diverse career paths within the cybersecurity field.
    • Specialization in Active Directory and internal network assessments is a key focus for some penetration testers.
    • The challenges of transitioning into pentesting, including imposter syndrome and the need for support and collaboration, are important considerations for individuals entering the field.
    • The evolving landscape of pentesting roles in the industry, focusing on web app and cloud assessments, presents opportunities and challenges for aspiring penetration testers.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark

    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of my employer.

    Show more Show less
    39 mins
  • #2 Transition From Pentester to Senior Pentester ft. Adolfo (Val) Vask
    Jul 2 2024

    Adolfo (Val) Vask, a seasoned cybersecurity professional, shares insights on his journey from intelligence analysis to penetration testing and red teaming. He discusses certifications, the MetaSploit Pro Specialist, the relevance of education in cybersecurity, and the transition from penetration tester to senior penetration tester. He also provides valuable advice on training, note-taking, and maintaining technical skills as a leader in cybersecurity.

    Connect with Val Vask on LinkedIn: https://www.linkedin.com/in/adolfo-vask/

    Takeaways

    • Val Vask's transition from intelligence analysis to cybersecurity showcases the diverse paths available in the field.
    • Certifications and the relevance of education in cybersecurity play a significant role in career development.
    • Val Vask emphasizes the importance of maintaining technical skills and continuous learning, even in leadership positions.
    • Training to improve job performance rather than to obtain certifications is a valuable approach in cybersecurity.
    • Effective note-taking and note-taking apps are essential for cybersecurity professionals to document and retain valuable information.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark

    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of my employer.

    Show more Show less
    37 mins
  • #1 Do Something Great in the World ft. Joshua Ragland
    Jul 2 2024

    The conversation covers a wide range of topics related to cybersecurity, including the background and career journey of the guest, the importance of offensive security, the cybersecurity skills shortage, strategies for excelling in CTF competitions, and the correlation between cybersecurity and everyday life. The guest also shares insights on preventing burnout and the impact of cybersecurity attacks on society.

    Connect with Joshua Ragland on Linkedin: https://www.linkedin.com/in/7h3-gh05t/

    Takeaways:

    • The importance of offensive security and the transition from generalist to specialist in cybersecurity careers.
    • The correlation between cybersecurity and everyday life, emphasizing the impact of cybersecurity attacks on society.
    • Strategies for excelling in CTF competitions and the significance of preventing burnout in the cybersecurity field.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark

    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of my employer.

    Show more Show less
    37 mins
  • #0 Security Is Not Everybody’s Responsibility
    Jul 1 2024

    In this episode, I introduce myself, Kyser Clark, and share my background in cybersecurity. I talk about my experience as a client systems technician in the United States Air Force and my transition into penetration testing. I also discuss my certifications and educational background in cybersecurity. I explain the purpose of this podcast, which is to provide value to the cybersecurity community and learn from industry professionals. I'll outline the upcoming episodes and the topics that will be covered. I conclude with a hot take on the responsibility of end users and the importance of designing secure networks.

    Takeaways:

    • Kyser Clark has a background in cybersecurity and worked as a client systems technician in the United States Air Force before transitioning into penetration testing.
    • He has obtained several certifications in cybersecurity and is currently pursuing a master's degree in cybersecurity management and policy.
    • The purpose of the podcast is to provide value to the cybersecurity community and learn from industry professionals.
    • Upcoming episodes will cover topics such as offensive security, CTF competitions, penetration testing, and the correlation between cybersecurity and everyday life.
    • Kyser believes that security is not everyone's responsibility and that the focus should be on designing secure networks rather than relying on end users to be vigilant.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark

    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of my employer.

    Show more Show less
    30 mins