<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/2361455.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>TLP - The Digital Forensics Podcast</title>

  <lastBuildDate>Wed, 04 Mar 2026 18:46:36 -0500</lastBuildDate>
  <link>http://www.dfirinsights.com</link>
  <language>en-au</language>
  <copyright>© 2026 TLP - The Digital Forensics Podcast</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>91c5abe1-fd12-5fdb-aaf8-014840736ab5</podcast:guid>
<podcast:podroll>
    <podcast:remoteItem feedGuid="793c056c-abe0-51de-b0b7-257978652396" feedUrl="https://feeds.soundcloud.com/users/soundcloud:users:983956231/sounds.rss" />
    <podcast:remoteItem feedGuid="8dfb6eb0-be64-555c-b945-66036ba368a7" feedUrl="https://kbi.digital/feed/podcast/kbkast" />
  </podcast:podroll>
  <itunes:author>Clint Marsden</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[<p>Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast.<br><br>In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn about new attack chains.&nbsp;</p>]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:keywords>DFIR,incident response,forensics,cyber,IR,Windows,hacking,blue team,red team,AUSCERT</itunes:keywords>
  <itunes:owner>
    <itunes:name>Clint Marsden</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/bxo2oza89vd62mmf5kcmqn1gna5m?.jpg</url>
     <title>TLP - The Digital Forensics Podcast</title>
     <link>http://www.dfirinsights.com</link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/bxo2oza89vd62mmf5kcmqn1gna5m?.jpg" />
  <itunes:category text="Technology" />
  <podcast:person role="host" href="https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea" img="https://storage.buzzsprout.com/g7hc5tzucm1qdzzj71e5axd24i9p">Clint Marsden</podcast:person>
  <item>
    <itunes:title>Episode 24: Voice AI Under Attack: Hackers Exploit AI Call Agents | Traffic Light Protocol Podcast</itunes:title>
    <title>Episode 24: Voice AI Under Attack: Hackers Exploit AI Call Agents | Traffic Light Protocol Podcast</title>
    <itunes:summary><![CDATA[Send a text Voice AI is moving fast — but so are the attackers. In this episode of the Traffic Light Protocol Podcast, Clint and Myles break down how scammers are exploiting Voice AI platforms with the same tricks that wrecked email and telecom decades ago: Premium-rate fraud dressed up in AI clothingBot-driven spam that floods calendars and burns ops teamsConsent loopholes where “user input” becomes an attacker’s best weaponThis isn’t FUD. It’s happening right now, and the industry risks wal...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Voice AI is moving fast — but so are the attackers.</p><p>In this episode of the <em>Traffic Light Protocol Podcast</em>, Clint and Myles break down how scammers are exploiting Voice AI platforms with the same tricks that wrecked email and telecom decades ago:</p><ul><li><b>Premium-rate fraud</b> dressed up in AI clothing</li><li><b>Bot-driven spam</b> that floods calendars and burns ops teams</li><li><b>Consent loopholes</b> where “user input” becomes an attacker’s best weapon</li></ul><p>This isn’t FUD. It’s happening right now, and the industry risks walking into the same “secure it later” trap we’ve seen before.</p><p>We dig into why this matters for anyone deploying AI into customer-facing systems, what patterns connect it to broader cybercrime trends, and the hard questions leaders should be asking before they put an AI agent on the phone network.</p><p>If you care about AI, fraud, and the future of secure automation then this one’s for you.</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Voice AI is moving fast — but so are the attackers.</p><p>In this episode of the <em>Traffic Light Protocol Podcast</em>, Clint and Myles break down how scammers are exploiting Voice AI platforms with the same tricks that wrecked email and telecom decades ago:</p><ul><li><b>Premium-rate fraud</b> dressed up in AI clothing</li><li><b>Bot-driven spam</b> that floods calendars and burns ops teams</li><li><b>Consent loopholes</b> where “user input” becomes an attacker’s best weapon</li></ul><p>This isn’t FUD. It’s happening right now, and the industry risks walking into the same “secure it later” trap we’ve seen before.</p><p>We dig into why this matters for anyone deploying AI into customer-facing systems, what patterns connect it to broader cybercrime trends, and the hard questions leaders should be asking before they put an AI agent on the phone network.</p><p>If you care about AI, fraud, and the future of secure automation then this one’s for you.</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/17850199-episode-24-voice-ai-under-attack-hackers-exploit-ai-call-agents-traffic-light-protocol-podcast.mp3" length="39953732" type="audio/mpeg" />
    <link>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</link>
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17850199</guid>
    <pubDate>Tue, 16 Sep 2025 10:00:00 +1000</pubDate>
    <itunes:duration>3327</itunes:duration>
    <itunes:keywords>Voice AI Security, AI Fraud Prevention, AI Cybersecurity, Voice AI Risks, AI Scams 2025, AI Security Podcast, AI and Cybercrime, Traffic Light Protocol Podcast, Premium Rate Fraud AI, AI Voice Agent Hacking, SIP Trunk Security, Telecom Fraud AI, Voicebot </itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>24</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 23:AI Voice Agent Security: Voice AI Under Siege: SIP Spoofing, Cost Drain, and How to Fight Back</itunes:title>
    <title>Episode 23:AI Voice Agent Security: Voice AI Under Siege: SIP Spoofing, Cost Drain, and How to Fight Back</title>
    <itunes:summary><![CDATA[Send a text In this episode of Traffic Light Protocol, we kick off our AI series with a hard look at how voice AI agents are being targeted; and how fast small businesses and startups can rack up serious bills overnight. Guest Myles Agnew returns to unpack how old-school telecom tricks are being repurposed in the age of SIP/VoIP and AI: caller ID spoofing, open SIP trunks, and automated call loops that tie up your agents and quietly burn cash. We break down how easy it is to spin up a low-cos...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode of Traffic Light Protocol, we kick off our AI series with a hard look at how voice AI agents are being targeted; and how fast small businesses and startups can rack up serious bills overnight.</p><p>Guest Myles Agnew returns to unpack how old-school telecom tricks are being repurposed in the age of SIP/VoIP and AI: caller ID spoofing, open SIP trunks, and automated call loops that tie up your agents and quietly burn cash. We break down how easy it is to spin up a low-cost PABX, why authentication is weak in SIP land, and what practical controls you can turn on today to reduce fraud and noise.</p><p>What we cover:</p><ul><li>How SIP (Session Initiation Protocol) is abused to hit voice AI agents</li><li>Why caller ID “verification” often isn’t verification at all</li><li>The $5–$10/month attacker vs. your $/minute billing problem</li><li>Channels/lines, trunk limits, and how attackers amplify cost</li><li>Geo-fencing, call gating, and rate limits that actually help</li><li>“Stop loss” ideas for web and voice agents</li><li>How provider security maturity (and defaults) drives your risk</li><li>Where laws and policies are heading (AU, US) and what to watch</li></ul><p>If you’re building or buying voice AI, this is a must-listen before you scale.</p><p>Free course (limited time): The AI Cybersecurity Starter Pack</p><p><br/> Get practical checklists, templates (incident response, HIPAA/GDPR/APPs), and step-by-step hardening for AI apps and AI voice agents. </p><p>Join the Skool community and learn how to protect your voice AI from abuse.<br/><br/></p><p><a href='https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea'>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</a></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode of Traffic Light Protocol, we kick off our AI series with a hard look at how voice AI agents are being targeted; and how fast small businesses and startups can rack up serious bills overnight.</p><p>Guest Myles Agnew returns to unpack how old-school telecom tricks are being repurposed in the age of SIP/VoIP and AI: caller ID spoofing, open SIP trunks, and automated call loops that tie up your agents and quietly burn cash. We break down how easy it is to spin up a low-cost PABX, why authentication is weak in SIP land, and what practical controls you can turn on today to reduce fraud and noise.</p><p>What we cover:</p><ul><li>How SIP (Session Initiation Protocol) is abused to hit voice AI agents</li><li>Why caller ID “verification” often isn’t verification at all</li><li>The $5–$10/month attacker vs. your $/minute billing problem</li><li>Channels/lines, trunk limits, and how attackers amplify cost</li><li>Geo-fencing, call gating, and rate limits that actually help</li><li>“Stop loss” ideas for web and voice agents</li><li>How provider security maturity (and defaults) drives your risk</li><li>Where laws and policies are heading (AU, US) and what to watch</li></ul><p>If you’re building or buying voice AI, this is a must-listen before you scale.</p><p>Free course (limited time): The AI Cybersecurity Starter Pack</p><p><br/> Get practical checklists, templates (incident response, HIPAA/GDPR/APPs), and step-by-step hardening for AI apps and AI voice agents. </p><p>Join the Skool community and learn how to protect your voice AI from abuse.<br/><br/></p><p><a href='https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea'>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</a></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/17797419-episode-23-ai-voice-agent-security-voice-ai-under-siege-sip-spoofing-cost-drain-and-how-to-fight-back.mp3" length="24812234" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17797419</guid>
    <pubDate>Sat, 06 Sep 2025 07:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17797419/transcript" type="text/html" />
    <itunes:duration>2065</itunes:duration>
    <itunes:keywords>Voice AI, SIP, SIP Spoofing, VoIP Security, AI Security, Fraud Prevention, Cost Control, PABX, Twilio, Vapi, Retail, Digital Forensics, Incident Response, AI Compliance, GDPR, HIPAA, Australia Privacy Principles, Skool Course</itunes:keywords>
    <itunes:season>2</itunes:season>
    <itunes:episode>23</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 22:AI Chat Forensics: How to Find, Investigate, and Analyse Evidence from ChatGPT, Claude &amp; Gemini</itunes:title>
    <title>Episode 22:AI Chat Forensics: How to Find, Investigate, and Analyse Evidence from ChatGPT, Claude &amp; Gemini</title>
    <itunes:summary><![CDATA[Send a text Unlock the secrets behind digital forensic investigations into AI chat platforms like ChatGPT, Claude, and Google's Gemini in this insightful episode. Learn the precise methods for discovering, extracting, and interpreting digital evidence across Windows, Mac, and Linux environments, whether it's browser caches, memory forensics, network logs, or cloud-based data exports. From identifying subtle signs of malicious AI usage and attempts to evade security controls, to piecing togeth...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Unlock the secrets behind digital forensic investigations into AI chat platforms like ChatGPT, Claude, and Google&apos;s Gemini in this insightful episode. Learn the precise methods for discovering, extracting, and interpreting digital evidence across Windows, Mac, and Linux environments, whether it&apos;s browser caches, memory forensics, network logs, or cloud-based data exports.</p><p>From identifying subtle signs of malicious AI usage and attempts to evade security controls, to piecing together forensic timelines, this podcast provides practical, hands-on guidance tailored for cybersecurity professionals, forensic analysts, and IT investigators. Tune in now and boost your expertise in this emerging field of AI-driven digital forensics. <br/><br/>You&apos;ll learn:<br/><br/><b>AI Chat Evidence Locations</b><br/> Discover exactly where to find critical forensic evidence from ChatGPT, Claude, and Gemini across Windows, Mac, and Linux systems.</p><p><b>Extracting and Analyzing Chat Data</b><br/> Learn practical techniques to extract, review, and interpret digital artifacts, including browser caches, local storage, memory dumps, and network logs.</p><p><b>Identifying AI Jailbreaking and Misuse</b><br/> Understand how to spot attempts to bypass AI guardrails and recognize malicious prompts or suspicious activity within chat logs.</p><p><b>Cloud vs Local Forensic Challenges</b><br/> Explore unique challenges associated with investigating cloud-based AI platforms versus local installations, and how to overcome them.</p><p><b>Building Effective Forensic Timelines</b><br/> Master the art of assembling comprehensive forensic timelines by integrating timestamps, metadata, network traffic, and other key sources of digital evidence.</p><p><br/></p><p>Links and references</p><p><a href='https://help.openai.com/en/articles/7260999-how-do-i-export-my-chatgpt-history-and-data'>https://help.openai.com/en/articles/7260999-how-do-i-export-my-chatgpt-history-and-data</a></p><p><a href='https://pvieito.com/2024/07/chatgpt-unprotected-conversations'>https://pvieito.com/2024/07/chatgpt-unprotected-conversations</a></p><p><a href='https://www.scribd.com/document/818273058/Conversational-AI-forensics#:~:text=of%20Gemini%20are%20stored%20in,based%20mobile%20app'>https://www.scribd.com/document/818273058/Conversational-AI-forensics#:~:text=of%20Gemini%20are%20stored%20in,based%20mobile%20app</a></p><p><a href='https://ar5iv.labs.arxiv.org/html/2505.23938v1#:~:text=source%20for%20corroborating%20evidence,of%20the%20NationalSecureBank%20phishing%20email'>https://ar5iv.labs.arxiv.org/html/2505.23938v1#:~:text=source%20for%20corroborating%20evidence,of%20the%20NationalSecureBank%20phishing%20email</a></p><p>aletheia.medium.com</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Unlock the secrets behind digital forensic investigations into AI chat platforms like ChatGPT, Claude, and Google&apos;s Gemini in this insightful episode. Learn the precise methods for discovering, extracting, and interpreting digital evidence across Windows, Mac, and Linux environments, whether it&apos;s browser caches, memory forensics, network logs, or cloud-based data exports.</p><p>From identifying subtle signs of malicious AI usage and attempts to evade security controls, to piecing together forensic timelines, this podcast provides practical, hands-on guidance tailored for cybersecurity professionals, forensic analysts, and IT investigators. Tune in now and boost your expertise in this emerging field of AI-driven digital forensics. <br/><br/>You&apos;ll learn:<br/><br/><b>AI Chat Evidence Locations</b><br/> Discover exactly where to find critical forensic evidence from ChatGPT, Claude, and Gemini across Windows, Mac, and Linux systems.</p><p><b>Extracting and Analyzing Chat Data</b><br/> Learn practical techniques to extract, review, and interpret digital artifacts, including browser caches, local storage, memory dumps, and network logs.</p><p><b>Identifying AI Jailbreaking and Misuse</b><br/> Understand how to spot attempts to bypass AI guardrails and recognize malicious prompts or suspicious activity within chat logs.</p><p><b>Cloud vs Local Forensic Challenges</b><br/> Explore unique challenges associated with investigating cloud-based AI platforms versus local installations, and how to overcome them.</p><p><b>Building Effective Forensic Timelines</b><br/> Master the art of assembling comprehensive forensic timelines by integrating timestamps, metadata, network traffic, and other key sources of digital evidence.</p><p><br/></p><p>Links and references</p><p><a href='https://help.openai.com/en/articles/7260999-how-do-i-export-my-chatgpt-history-and-data'>https://help.openai.com/en/articles/7260999-how-do-i-export-my-chatgpt-history-and-data</a></p><p><a href='https://pvieito.com/2024/07/chatgpt-unprotected-conversations'>https://pvieito.com/2024/07/chatgpt-unprotected-conversations</a></p><p><a href='https://www.scribd.com/document/818273058/Conversational-AI-forensics#:~:text=of%20Gemini%20are%20stored%20in,based%20mobile%20app'>https://www.scribd.com/document/818273058/Conversational-AI-forensics#:~:text=of%20Gemini%20are%20stored%20in,based%20mobile%20app</a></p><p><a href='https://ar5iv.labs.arxiv.org/html/2505.23938v1#:~:text=source%20for%20corroborating%20evidence,of%20the%20NationalSecureBank%20phishing%20email'>https://ar5iv.labs.arxiv.org/html/2505.23938v1#:~:text=source%20for%20corroborating%20evidence,of%20the%20NationalSecureBank%20phishing%20email</a></p><p>aletheia.medium.com</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/17375385-episode-22-ai-chat-forensics-how-to-find-investigate-and-analyse-evidence-from-chatgpt-claude-gemini.mp3" length="30127423" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17375385</guid>
    <pubDate>Sun, 22 Jun 2025 16:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17375385/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17375385/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17375385/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17375385/transcript.vtt" type="text/vtt" />
    <itunes:duration>2508</itunes:duration>
    <itunes:keywords>AI Forensics, Digital Forensics,  ChatGPT Investigation,  Claude AI Evidence,  Gemini AI Analysis,  Cyber Investigation,  Browser Artifacts Forensics, Memory Forensics Techniques,  Network Forensics,  AI Jailbreaking,  Cybersecurity Incident Response,  Cl</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>22</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 21: How IRCO is Changing DFIR: The AI Copilot for Real-Time Cyber Investigations</itunes:title>
    <title>Episode 21: How IRCO is Changing DFIR: The AI Copilot for Real-Time Cyber Investigations</title>
    <itunes:summary><![CDATA[Send a text Link to IRCO- Incident Response Copilot on Chat  GPT https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot In this episode of TLP: The Digital Forensics Podcast, Clint dives deep into IRCO (a custom GPT designed specifically for DFIR and SOC analysts). From real-world cyber incidents to post-incident reporting and CTF training, IRCO acts like your AI-powered colleague: fast, focused, and built for real investigations or even CTF's. Learn how...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Link to IRCO- Incident Response Copilot on Chat  GPT</p><p>https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot</p><p>In this episode of <em>TLP: The Digital Forensics Podcast</em>, Clint dives deep into <b>IRCO (</b>a custom GPT designed specifically for <b>DFIR and SOC analysts)</b>. From real-world cyber incidents to post-incident reporting and CTF training, IRCO acts like your AI-powered colleague: fast, focused, and built for real investigations or even CTF&apos;s.</p><p>Learn how this tool understands your forensic workflows, decodes technical jargon, and supports smarter, faster investigations. Clint shares how to start using IRCO, common use cases, how to keep your data safe, and why many in the field are <b>underestimating its capability</b>.</p><p>Whether you&apos;re writing reports, analyzing logs, or stuck mid-incident, IRCO can give you the 1% edge you need to  solve tricky DFIR investigations and communicate reports more quickly.</p><p>🔍 Topics covered:<br/> – What is IRCO?<br/> – How to integrate AI into digital forensics workflows<br/> – Using  IRCO  for live incidents, CTFs, and training<br/> – Privacy and responsible AI use in SOC environments<br/> – Actionable prompts and use cases</p><p>🎧 Subscribe to TLP now and give IRCO a test run. You might just find your new secret weapon in responding to incidents quicker than ever. <br/><br/> https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Link to IRCO- Incident Response Copilot on Chat  GPT</p><p>https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot</p><p>In this episode of <em>TLP: The Digital Forensics Podcast</em>, Clint dives deep into <b>IRCO (</b>a custom GPT designed specifically for <b>DFIR and SOC analysts)</b>. From real-world cyber incidents to post-incident reporting and CTF training, IRCO acts like your AI-powered colleague: fast, focused, and built for real investigations or even CTF&apos;s.</p><p>Learn how this tool understands your forensic workflows, decodes technical jargon, and supports smarter, faster investigations. Clint shares how to start using IRCO, common use cases, how to keep your data safe, and why many in the field are <b>underestimating its capability</b>.</p><p>Whether you&apos;re writing reports, analyzing logs, or stuck mid-incident, IRCO can give you the 1% edge you need to  solve tricky DFIR investigations and communicate reports more quickly.</p><p>🔍 Topics covered:<br/> – What is IRCO?<br/> – How to integrate AI into digital forensics workflows<br/> – Using  IRCO  for live incidents, CTFs, and training<br/> – Privacy and responsible AI use in SOC environments<br/> – Actionable prompts and use cases</p><p>🎧 Subscribe to TLP now and give IRCO a test run. You might just find your new secret weapon in responding to incidents quicker than ever. <br/><br/> https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/17309829-episode-21-how-irco-is-changing-dfir-the-ai-copilot-for-real-time-cyber-investigations.mp3" length="11400099" type="audio/mpeg" />
    <link>https://chatgpt.com/g/g-68033ce1b26481919b26df0737241bac-irco-incident-response-co-pilot</link>
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17309829</guid>
    <pubDate>Tue, 10 Jun 2025 12:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17309829/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17309829/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17309829/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17309829/transcript.vtt" type="text/vtt" />
    <itunes:duration>948</itunes:duration>
    <itunes:keywords>#DigitalForensics #DFIR #SOCAnalyst #CyberSecurity #IncidentResponse #ChatGPT #CustomGPT #AIinSecurity #CTFTraining #ForensicsTools #CyberThreats #CyberInvestigations #AIWorkflow #SecurityPodcast #TechPodcast #InfosecTools #Erco</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>21</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 20:What Makes an Elite Incident Response Team: Mindset, Mastery, and Real-World DFIR Lessons</itunes:title>
    <title>Episode 20:What Makes an Elite Incident Response Team: Mindset, Mastery, and Real-World DFIR Lessons</title>
    <itunes:summary><![CDATA[Send a text Drawing inspiration from observing military special forces and over five years of hands-on DFIR experience, Clint explores the mindset, habits, and tactical processes that set top-performing IR teams apart. Clint Marsden explores the mindset, habits, and tactical processes that set top-performing IR teams apart. From threat intelligence workflows and detection-first thinking to deep forensic analysis and clear executive reporting, this episode is packed with real-world lessons, re...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Drawing inspiration from observing military special forces and over five years of hands-on DFIR experience, Clint explores the mindset, habits, and tactical processes that set top-performing IR teams apart. Clint Marsden explores the mindset, habits, and tactical processes that set top-performing IR teams apart.</p><p>From threat intelligence workflows and detection-first thinking to deep forensic analysis and clear executive reporting, this episode is packed with real-world lessons, relatable stories, and practical advice. Whether you&apos;re running your first threat hunt or leading an enterprise SOC, you&apos;ll walk away with a clearer vision for building a resilient, high-performing IR capability.</p><p>You’ll learn:</p><ul><li>Why elite IR teams focus on boring repetition and clarity over cool tools</li><li>How to track threat groups and adapt detection rules in real time</li><li>Where most SOCs fail with SIEM tuning and memory forensics</li><li>How to communicate findings that actually move leadership to act</li></ul><p>Check out the blog: www.dfirinsights.com</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Drawing inspiration from observing military special forces and over five years of hands-on DFIR experience, Clint explores the mindset, habits, and tactical processes that set top-performing IR teams apart. Clint Marsden explores the mindset, habits, and tactical processes that set top-performing IR teams apart.</p><p>From threat intelligence workflows and detection-first thinking to deep forensic analysis and clear executive reporting, this episode is packed with real-world lessons, relatable stories, and practical advice. Whether you&apos;re running your first threat hunt or leading an enterprise SOC, you&apos;ll walk away with a clearer vision for building a resilient, high-performing IR capability.</p><p>You’ll learn:</p><ul><li>Why elite IR teams focus on boring repetition and clarity over cool tools</li><li>How to track threat groups and adapt detection rules in real time</li><li>Where most SOCs fail with SIEM tuning and memory forensics</li><li>How to communicate findings that actually move leadership to act</li></ul><p>Check out the blog: www.dfirinsights.com</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/17277683-episode-20-what-makes-an-elite-incident-response-team-mindset-mastery-and-real-world-dfir-lessons.mp3" length="28229981" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17277683</guid>
    <pubDate>Wed, 04 Jun 2025 10:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17277683/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17277683/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17277683/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17277683/transcript.vtt" type="text/vtt" />
    <itunes:duration>2350</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>20</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 19: AI Data Poisoning: How Bad Actors Corrupt Machine Learning Systems for Under $60</itunes:title>
    <title>Episode 19: AI Data Poisoning: How Bad Actors Corrupt Machine Learning Systems for Under $60</title>
    <itunes:summary><![CDATA[Send a text Clint Marsden breaks down a critical cybersecurity report from intelligence agencies including the CSA, NSA, and FBI about the growing threat of AI data poisoning. Learn how malicious actors can hijack AI systems for as little as $60, turning machine learning models against their intended purpose by corrupting training data. Clint explains the technical concept of data poisoning in accessible terms, comparing it to teaching a child the wrong labels for objects. He walks through th...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Clint Marsden breaks down a critical cybersecurity report from intelligence agencies including the CSA, NSA, and FBI about the growing threat of AI data poisoning. Learn how malicious actors can hijack AI systems for as little as $60, turning machine learning models against their intended purpose by corrupting training data.</p><p>Clint explains the technical concept of data poisoning in accessible terms, comparing it to teaching a child the wrong labels for objects. He walks through the six-stage framework where AI systems become vulnerable, from initial design to production deployment, and covers the ten security recommendations intelligence agencies are now promoting to defend against these attacks.</p><p>The episode explores real-world examples of AI systems gone wrong, from shopping bots buying drugs on the dark web to coordinated attacks by online communities. You&apos;ll discover practical mitigation strategies including cryptographic verification, secure data storage, anomaly detection, and the importance of &quot;human in the loop&quot; safeguards.</p><p>Whether you&apos;re a cybersecurity professional, AI developer, or simply curious about emerging digital threats, this episode provides essential insights into protecting AI systems from manipulation and understanding why data integrity has become a national security concern.</p><p><b>Key Topics Covered:</b></p><ul><li>Split view poisoning and expired domain attacks</li><li>Data sanitization and anomaly detection techniques</li><li>Zero trust principles for AI infrastructure</li><li>The role of adversarial machine learning in cybersecurity</li><li>Why defenders must learn AI as quickly as attackers<br/><br/>The PDF from CISA etc al: https://www.ic3.gov/CSA/2025/250522.pdf</li></ul> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Clint Marsden breaks down a critical cybersecurity report from intelligence agencies including the CSA, NSA, and FBI about the growing threat of AI data poisoning. Learn how malicious actors can hijack AI systems for as little as $60, turning machine learning models against their intended purpose by corrupting training data.</p><p>Clint explains the technical concept of data poisoning in accessible terms, comparing it to teaching a child the wrong labels for objects. He walks through the six-stage framework where AI systems become vulnerable, from initial design to production deployment, and covers the ten security recommendations intelligence agencies are now promoting to defend against these attacks.</p><p>The episode explores real-world examples of AI systems gone wrong, from shopping bots buying drugs on the dark web to coordinated attacks by online communities. You&apos;ll discover practical mitigation strategies including cryptographic verification, secure data storage, anomaly detection, and the importance of &quot;human in the loop&quot; safeguards.</p><p>Whether you&apos;re a cybersecurity professional, AI developer, or simply curious about emerging digital threats, this episode provides essential insights into protecting AI systems from manipulation and understanding why data integrity has become a national security concern.</p><p><b>Key Topics Covered:</b></p><ul><li>Split view poisoning and expired domain attacks</li><li>Data sanitization and anomaly detection techniques</li><li>Zero trust principles for AI infrastructure</li><li>The role of adversarial machine learning in cybersecurity</li><li>Why defenders must learn AI as quickly as attackers<br/><br/>The PDF from CISA etc al: https://www.ic3.gov/CSA/2025/250522.pdf</li></ul> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/17225983-episode-19-ai-data-poisoning-how-bad-actors-corrupt-machine-learning-systems-for-under-60.mp3" length="19662847" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-17225983</guid>
    <pubDate>Mon, 26 May 2025 18:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17225983/transcript" type="text/html" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17225983/transcript.json" type="application/json" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17225983/transcript.srt" type="application/x-subrip" />
    <podcast:transcript url="https://www.buzzsprout.com/2361455/17225983/transcript.vtt" type="text/vtt" />
    <itunes:duration>1636</itunes:duration>
    <itunes:keywords>#AIDatapoisoning   #CyberSecurity   #AdversarialAI   #MachineLearningSecurity   #AIThreats   #AIManipulation   #NSACyber   #FBIAdvisory   #ZeroTrustAI   #CSAReport   #SecureAI   #AIIntegrity   #ModelPoisoning   #AIinCyberSecurity   #CISAguidance   #Anomal</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>19</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps</itunes:title>
    <title>Audiobook - Mastering Sysmon. Deploying, Configuring, and Tuning in 10 easy steps</title>
    <itunes:summary><![CDATA[Send a text This episode features the complete narration of my ebook: Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps, providing a step-by-step guide to getting Sysmon up and running for better threat detection and incident response. If you’re in security operations, digital forensics, or incident response, this episode will help you: Deploy Sysmon efficiently.Tune Sysmon logs for maximum insight while reducing noise.Use Sysmon for investigations—from process creation t...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>This episode features the complete narration of my ebook: <em>Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps</em>, providing a <b>step-by-step guide</b> to getting Sysmon up and running for <b>better threat detection and incident response</b>.</p><p>If you’re in <b>security operations, digital forensics, or incident response</b>, this episode will help you:</p><ul><li><b>Deploy Sysmon</b> efficiently.</li><li><b>Tune Sysmon logs</b> for maximum insight while reducing noise.</li><li><b>Use Sysmon for investigations</b>—from process creation tracking to network monitoring.</li><li><b>Understand real-world use cases</b> of how Sysmon can catch adversaries in action.</li></ul><p><b>Key Topics Covered:</b></p><ul><li><b>Why Sysmon Matters</b> – A deep dive into how Sysmon enhances Windows logging.</li><li><b>Common Mistakes &amp; How to Avoid Them</b> – Logging misconfigurations, tuning issues, and evidence handling best practices.</li><li><b>Step-by-Step Deployment Guide</b> – From downloading Sysmon to configuring it for lean detections.</li><li><b>Tuning for Performance &amp; Relevance</b> – How to tweak Sysmon settings to avoid excessive log volume.</li><li><b>Investigating Security Events</b> – Key Sysmon event IDs that provide forensic gold.</li><li><b>Real-World Use Cases</b> – Examples of how Sysmon has caught attackers in action.</li><li><b>Sysmon Bypass Techniques</b> – How adversaries evade detection and how to stay ahead.</li></ul><p><b>Resources Mentioned:</b></p><ol><li><b>Sysmon Download</b> – <a href='https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon'>Microsoft Sysinternals</a></li><li><b>Sysmon Configuration Files</b> – <a href='https://github.com/olafhartong/sysmon-modular'>Olaf Hartong’s Sysmon-Modular</a></li><li><b>MITRE ATT&amp;CK Framework</b> – <a href='https://attack.mitre.org/'>MITRE ATT&amp;CK</a></li><li><b>ACSC Sysmon Config Guide</b> – <a href='https://github.com/australiancybersecuritycentre/windows_event_logging'>ACSC GitHub</a></li></ol><p><b>Key Takeaways:</b></p><ul><li><b>Sysmon provides deep system visibility</b> – if tuned correctly.</li><li> <b>Tuning is essential</b> – Avoid log overload while keeping useful data.</li><li> <b>Use a structured deployment process</b> – From baselining performance to verifying logs.</li><li> <b>Sysmon alone isn’t enough</b> – It works best when combined with other detection tools.</li><li> <b>Be aware of bypass techniques</b> – Attackers can disable Sysmon, so defense in depth is key.</li></ul> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>This episode features the complete narration of my ebook: <em>Mastering Sysmon – Deploying, Configuring, and Tuning in 10 Easy Steps</em>, providing a <b>step-by-step guide</b> to getting Sysmon up and running for <b>better threat detection and incident response</b>.</p><p>If you’re in <b>security operations, digital forensics, or incident response</b>, this episode will help you:</p><ul><li><b>Deploy Sysmon</b> efficiently.</li><li><b>Tune Sysmon logs</b> for maximum insight while reducing noise.</li><li><b>Use Sysmon for investigations</b>—from process creation tracking to network monitoring.</li><li><b>Understand real-world use cases</b> of how Sysmon can catch adversaries in action.</li></ul><p><b>Key Topics Covered:</b></p><ul><li><b>Why Sysmon Matters</b> – A deep dive into how Sysmon enhances Windows logging.</li><li><b>Common Mistakes &amp; How to Avoid Them</b> – Logging misconfigurations, tuning issues, and evidence handling best practices.</li><li><b>Step-by-Step Deployment Guide</b> – From downloading Sysmon to configuring it for lean detections.</li><li><b>Tuning for Performance &amp; Relevance</b> – How to tweak Sysmon settings to avoid excessive log volume.</li><li><b>Investigating Security Events</b> – Key Sysmon event IDs that provide forensic gold.</li><li><b>Real-World Use Cases</b> – Examples of how Sysmon has caught attackers in action.</li><li><b>Sysmon Bypass Techniques</b> – How adversaries evade detection and how to stay ahead.</li></ul><p><b>Resources Mentioned:</b></p><ol><li><b>Sysmon Download</b> – <a href='https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon'>Microsoft Sysinternals</a></li><li><b>Sysmon Configuration Files</b> – <a href='https://github.com/olafhartong/sysmon-modular'>Olaf Hartong’s Sysmon-Modular</a></li><li><b>MITRE ATT&amp;CK Framework</b> – <a href='https://attack.mitre.org/'>MITRE ATT&amp;CK</a></li><li><b>ACSC Sysmon Config Guide</b> – <a href='https://github.com/australiancybersecuritycentre/windows_event_logging'>ACSC GitHub</a></li></ol><p><b>Key Takeaways:</b></p><ul><li><b>Sysmon provides deep system visibility</b> – if tuned correctly.</li><li> <b>Tuning is essential</b> – Avoid log overload while keeping useful data.</li><li> <b>Use a structured deployment process</b> – From baselining performance to verifying logs.</li><li> <b>Sysmon alone isn’t enough</b> – It works best when combined with other detection tools.</li><li> <b>Be aware of bypass techniques</b> – Attackers can disable Sysmon, so defense in depth is key.</li></ul> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/16708060-audiobook-mastering-sysmon-deploying-configuring-and-tuning-in-10-easy-steps.mp3" length="31852709" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16708060</guid>
    <pubDate>Fri, 28 Feb 2025 16:00:00 +1100</pubDate>
    <itunes:duration>2652</itunes:duration>
    <itunes:keywords>#Sysmon #WindowsLogging #ThreatDetection #IncidentResponse #DigitalForensics #DFIR #SecurityOperations #SOC #Sysinternals #SysmonConfiguration #SysmonTuning #WindowsSecurity #LogAnalysis #ForensicsTools #CyberSecurity #SecurityMonitoring #DetectionEnginee</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>18</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 17 - Building a CTF</itunes:title>
    <title>Episode 17 - Building a CTF</title>
    <itunes:summary><![CDATA[Send a text So You Want to Build Your Own DFIR CTF? Ever wanted to build your own Digital Forensics and Incident Response (DFIR) Capture the Flag (CTF) challenge but weren’t sure where to start? In this episode of Traffic Light Protocol, we share the how-to of CTF builders, making it easy for anyone—no pentesting skills required! Today's episode includes:  Choosing Your CTF Theme – Using MITRE ATT&amp;CK and APT tracking to craft a realistic attack scenario.Setting Up the Lab – Spin...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><h1><b>So You Want to Build Your Own DFIR CTF?</b> </h1><p>Ever wanted to build your own <b>Digital Forensics and Incident Response (DFIR) Capture the Flag (CTF)</b> challenge but weren’t sure where to start? In this episode of <em>Traffic Light Protocol</em>, we share the how-to of CTF builders, making it easy for anyone—no pentesting skills required!</p><p><b>Today&apos;s episode includes:</b></p><ul><li> <b>Choosing Your CTF Theme</b> – Using <b>MITRE ATT&amp;CK</b> and APT tracking to craft a realistic attack scenario.</li><li><b>Setting Up the Lab</b> – Spinning up a <b>Windows VM</b>, configuring <b>Sysmon</b>, and enabling forensic logging.</li><li><b>Running the Attack Simulations</b> – Using <b>Atomic Red Team</b> to generate forensic artifacts.</li><li><b>Testing &amp; Troubleshooting</b> – Making sure your tests actually work before unleashing them on your team.</li><li><b>Building an Engaging Story</b> – Crafting a compelling <b>incident narrative</b> that challenges analysts to think like investigators.</li></ul><p>Resources mentioned in the podcast:<br/><br/></p><p>https://drive.google.com/drive/folders/1vF3y-OlsowjX9LUOi7ywDy8VgcfhWcUX?usp=sharing</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><h1><b>So You Want to Build Your Own DFIR CTF?</b> </h1><p>Ever wanted to build your own <b>Digital Forensics and Incident Response (DFIR) Capture the Flag (CTF)</b> challenge but weren’t sure where to start? In this episode of <em>Traffic Light Protocol</em>, we share the how-to of CTF builders, making it easy for anyone—no pentesting skills required!</p><p><b>Today&apos;s episode includes:</b></p><ul><li> <b>Choosing Your CTF Theme</b> – Using <b>MITRE ATT&amp;CK</b> and APT tracking to craft a realistic attack scenario.</li><li><b>Setting Up the Lab</b> – Spinning up a <b>Windows VM</b>, configuring <b>Sysmon</b>, and enabling forensic logging.</li><li><b>Running the Attack Simulations</b> – Using <b>Atomic Red Team</b> to generate forensic artifacts.</li><li><b>Testing &amp; Troubleshooting</b> – Making sure your tests actually work before unleashing them on your team.</li><li><b>Building an Engaging Story</b> – Crafting a compelling <b>incident narrative</b> that challenges analysts to think like investigators.</li></ul><p>Resources mentioned in the podcast:<br/><br/></p><p>https://drive.google.com/drive/folders/1vF3y-OlsowjX9LUOi7ywDy8VgcfhWcUX?usp=sharing</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/16702025-episode-17-building-a-ctf.mp3" length="20944493" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16702025</guid>
    <pubDate>Thu, 27 Feb 2025 18:00:00 +1100</pubDate>
    <itunes:duration>1743</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>17</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations</itunes:title>
    <title>Episode 16 - Mastering the Basics: Key Strategies for Cyber Investigations</title>
    <itunes:summary><![CDATA[Send a text Kicking off 2025, we're getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity. In this episode, we cover how to build an investigation plan that keeps you on track, ensures consistency, and leads to better results. We talk about evidence volatility, log retenti...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Kicking off 2025, we&apos;re getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity.</p><p>In this episode, we cover how to build an investigation plan that keeps you on track, ensures consistency, and leads to better results. We talk about evidence volatility, log retention, structuring reports that make sense to non-technical stakeholders, and how to ask the right questions from the start.</p><p><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Kicking off 2025, we&apos;re getting back to basics with something every cyber investigator needs to master—starting an investigation the right way. Too often, investigations get derailed because the right questions weren’t asked at the outset, evidence wasn’t properly handled, or reporting lacked clarity.</p><p>In this episode, we cover how to build an investigation plan that keeps you on track, ensures consistency, and leads to better results. We talk about evidence volatility, log retention, structuring reports that make sense to non-technical stakeholders, and how to ask the right questions from the start.</p><p><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/16700923-episode-16-mastering-the-basics-key-strategies-for-cyber-investigations.mp3" length="22822582" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16700923</guid>
    <pubDate>Thu, 27 Feb 2025 13:00:00 +1100</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/16700923/transcript" type="text/html" />
    <itunes:duration>1899</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>16</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool</itunes:title>
    <title>Episode 15 -Windows event log analysis with Hayabusa. The Sigma-based log analysis tool</title>
    <itunes:summary><![CDATA[Send a text Key Takeaways: Introduction to Hayabusa: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments.Critical Alerts Detection: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Active Directory replication.Efficient Incident Response: Hayabusa is ideal for incident response workflows, enabling teams to quickly triage and analyze Wi...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Key Takeaways:</p><ul><li><b>Introduction to Hayabusa</b>: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments.</li><li><b>Critical Alerts Detection</b>: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Active Directory replication.</li><li><b>Efficient Incident Response</b>: Hayabusa is ideal for incident response workflows, enabling teams to quickly triage and analyze Windows logs to detect potential breaches or malicious activity.</li><li><b>Importance of Informational Alerts</b>: Informational alerts can indicate early reconnaissance phases of attacks and should not be dismissed.</li><li><b>Hypothesis-Driven Threat Hunting</b>: Build a threat hunting hypothesis using MITRE ATT&amp;CK or industry-specific threat intelligence to narrow the focus of the search.</li><li><b>Integration with SIEM and TimeSketch</b>: Hayabusa supports integration with security tools like SIEM and can export logs into TimeSketch for further analysis and visualization.</li><li><b>Open-source and Free</b>: Hayabusa is freely available to the cybersecurity community, making it an essential tool for threat detection without added cost.</li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Key Takeaways:</p><ul><li><b>Introduction to Hayabusa</b>: Hayabusa is an open-source Windows Event Log Analysis Tool used for processing EVTX logs to detect suspicious activities in Windows environments.</li><li><b>Critical Alerts Detection</b>: The tool is capable of detecting a variety of suspicious activities, including WannaCry ransomware and unauthorized Active Directory replication.</li><li><b>Efficient Incident Response</b>: Hayabusa is ideal for incident response workflows, enabling teams to quickly triage and analyze Windows logs to detect potential breaches or malicious activity.</li><li><b>Importance of Informational Alerts</b>: Informational alerts can indicate early reconnaissance phases of attacks and should not be dismissed.</li><li><b>Hypothesis-Driven Threat Hunting</b>: Build a threat hunting hypothesis using MITRE ATT&amp;CK or industry-specific threat intelligence to narrow the focus of the search.</li><li><b>Integration with SIEM and TimeSketch</b>: Hayabusa supports integration with security tools like SIEM and can export logs into TimeSketch for further analysis and visualization.</li><li><b>Open-source and Free</b>: Hayabusa is freely available to the cybersecurity community, making it an essential tool for threat detection without added cost.</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15925758-episode-15-windows-event-log-analysis-with-hayabusa-the-sigma-based-log-analysis-tool.mp3" length="16832835" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15925758</guid>
    <pubDate>Tue, 15 Oct 2024 15:00:00 +1100</pubDate>
    <itunes:duration>1400</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>15</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson</itunes:title>
    <title>Episode 14 - AI and the future of log analysis, bug detection, forensics and AI ethical considerations with Jonathan Thompson</title>
    <itunes:summary><![CDATA[Send a text In this episode of Traffic Light Protocol, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University.   Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital forensics, incident response, and everyday IT operations.   The conversation touches on ethical considerations, potential job impacts, and how AI c...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode of <em>Traffic Light Protocol</em>, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University.<br/><br/> Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital forensics, incident response, and everyday IT operations.<br/><br/> The conversation touches on ethical considerations, potential job impacts, and how AI can be harnessed to streamline tasks like log analysis, bug detection, and threat identification.<br/><br/><br/>Daniel Kahneman - Thinking Fast and Slow<br/>https://amzn.to/47Cpfjo <br/><br/>The pyramid of pain by David J Bianco: http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html<br/><br/><br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode of <em>Traffic Light Protocol</em>, Clint Marsden is joined by Jonathan Thompson, a developer and AI enthusiast currently studying at Macquarie University.<br/><br/> Together, they dive into how artificial intelligence (AI) is transforming the cybersecurity landscape and discuss Jon’s insights into AI’s potential applications in digital forensics, incident response, and everyday IT operations.<br/><br/> The conversation touches on ethical considerations, potential job impacts, and how AI can be harnessed to streamline tasks like log analysis, bug detection, and threat identification.<br/><br/><br/>Daniel Kahneman - Thinking Fast and Slow<br/>https://amzn.to/47Cpfjo <br/><br/>The pyramid of pain by David J Bianco: http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html<br/><br/><br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15792887-episode-14-ai-and-the-future-of-log-analysis-bug-detection-forensics-and-ai-ethical-considerations-with-jonathan-thompson.mp3" length="50060979" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15792887</guid>
    <pubDate>Sun, 22 Sep 2024 13:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15792887/transcript" type="text/html" />
    <itunes:duration>4169</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>14</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation &amp; Forensics in the cloud,  with Jacob Wilson</itunes:title>
    <title>Episode 13-ELK EDR and Sandboxing, Home grown CTF environments, DFIR Automation &amp; Forensics in the cloud,  with Jacob Wilson</title>
    <itunes:summary><![CDATA[Send a text Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon.  Sandbox Environments: Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysis by capturing and analyzing detailed system activity. Automation in Investigations: Jacob emphasizes the importance of automating repetitive tasks, such as b...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon.<br/><br/><b>Sandbox Environments:</b> Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysis by capturing and analyzing detailed system activity.</p><p><b>Automation in Investigations:</b> Jacob emphasizes the importance of automating repetitive tasks, such as business email compromise investigations, to streamline processes and improve efficiency.<br/><br/><b>Pen Testing and Red Teaming:</b> Jacob shares insights into the importance of understanding both offensive (red teaming) and defensive (blue teaming) techniques to better anticipate and mitigate threats.</p><p><b>Practical Learning:</b> Jacob advocates for hands-on experience in digital forensics, highlighting the limitations of theoretical knowledge and the value of real-world application.<br/><br/><b>Resources Mentioned:</b></p><ul><li><b>ELK Stack</b>: Used for creating a detailed sandbox environment for malware analysis. Learn more about ELK Stack <a href='https://www.elastic.co/what-is/elk-stack'>here</a>.</li><li><b>Sysmon</b>: Essential tool for capturing detailed logs on Windows systems. Explore Sysmon <a href='https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon'>here</a>.</li><li><b>Axiom</b>: A commercial digital forensics tool praised for its comprehensive and reliable results. More about Axiom here.</li><li><b>Cellebrite</b>: A tool used for mobile device forensics, particularly for logical acquisitions. Discover Cellebrite here.</li><li><b>Splunk</b>: Utilized for automating the investigation process by analyzing large datasets quickly. More on Splunk <a href='https://www.splunk.com/'>here</a>.</li></ul><p>Jacob Wilson&apos;s LinkedIn: https://www.linkedin.com/in/jacob--wilson/?originalSubdomain=au</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Episode 13 is another giant episode with a focus on what its like be in the mud working on real life forensic investigations. Jacob and Clint talk about ELK EDR, using Sysmon.<br/><br/><b>Sandbox Environments:</b> Jacob discusses the creation of a sandbox environment using an ELK stack combined with Sysmon, enabling in-depth malware analysis by capturing and analyzing detailed system activity.</p><p><b>Automation in Investigations:</b> Jacob emphasizes the importance of automating repetitive tasks, such as business email compromise investigations, to streamline processes and improve efficiency.<br/><br/><b>Pen Testing and Red Teaming:</b> Jacob shares insights into the importance of understanding both offensive (red teaming) and defensive (blue teaming) techniques to better anticipate and mitigate threats.</p><p><b>Practical Learning:</b> Jacob advocates for hands-on experience in digital forensics, highlighting the limitations of theoretical knowledge and the value of real-world application.<br/><br/><b>Resources Mentioned:</b></p><ul><li><b>ELK Stack</b>: Used for creating a detailed sandbox environment for malware analysis. Learn more about ELK Stack <a href='https://www.elastic.co/what-is/elk-stack'>here</a>.</li><li><b>Sysmon</b>: Essential tool for capturing detailed logs on Windows systems. Explore Sysmon <a href='https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon'>here</a>.</li><li><b>Axiom</b>: A commercial digital forensics tool praised for its comprehensive and reliable results. More about Axiom here.</li><li><b>Cellebrite</b>: A tool used for mobile device forensics, particularly for logical acquisitions. Discover Cellebrite here.</li><li><b>Splunk</b>: Utilized for automating the investigation process by analyzing large datasets quickly. More on Splunk <a href='https://www.splunk.com/'>here</a>.</li></ul><p>Jacob Wilson&apos;s LinkedIn: https://www.linkedin.com/in/jacob--wilson/?originalSubdomain=au</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15610413-episode-13-elk-edr-and-sandboxing-home-grown-ctf-environments-dfir-automation-forensics-in-the-cloud-with-jacob-wilson.mp3" length="40250953" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15610413</guid>
    <pubDate>Tue, 20 Aug 2024 17:00:00 +1000</pubDate>
    <itunes:duration>3352</itunes:duration>
    <itunes:keywords>CTF, DFIR,ELK,Forensics</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>13</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 12 - You&#39;re forced to decide: Cyber Generalist or Cyber Specialist? </itunes:title>
    <title>Episode 12 - You&#39;re forced to decide: Cyber Generalist or Cyber Specialist? </title>
    <itunes:summary><![CDATA[Send a text Quotes: “In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.”“Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-changing landscape of cybersecurity.”“The choice between specializing and generalizing doesn’t always need to be a conscious decision. Often, you just fall into o...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Quotes:</p><ul><li>“In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.”</li><li>“Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-changing landscape of cybersecurity.”</li><li>“The choice between specializing and generalizing doesn’t always need to be a conscious decision. Often, you just fall into one or the other depending on the work you do day to day.”</li></ul><p>Resources Mentioned:</p><ul><li><b>LinkedIn - Follow TLP Podcast</b>: Follow us on Linked in, and share your thoughts on this episode. <a href='https://www.linkedin.com/company/traffic-light-protocol-the-digital-forensics-podcast-tlp'>Follow TLP Podcast on LinkedIn</a></li><li><b>B-Sides Brisbane Presentation by Ben Gittins</b>: A shout-out was given to Ben Gittins for his presentation on the topic of generalists vs. specialists at B-Sides Brisbane. <a href='https://www.bsidesbrisbane.com/'>More about B-Sides Brisbane</a></li><li><b>Volatility - Memory Forensics Tool</b>: Developed by Andrew Case, Volatility is highlighted as an essential tool for memory forensics. <a href='https://www.volatilityfoundation.org/'>Download Volatility</a></li></ul><p>Action Points:</p><ul><li><b>Reflect on Your Career Path</b>: Consider whether you are currently on the path of specialization or generalization in DFIR. Reflect on how this aligns with your career goals and the needs of your organization.</li><li><b>Engage with the Community</b>: The host invites listeners to share their thoughts on the specialist vs. generalist debate on LinkedIn. Join the discussion to see how others in the field are navigating their careers.</li><li><b>Stay Updated</b>: Follow the TLP podcast on LinkedIn for more discussions and updates on digital forensics and incident response topics.</li></ul>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Quotes:</p><ul><li>“In the fast-paced world of DFIR, you are a mission critical system. Your job isn’t just to uncover what happened during an incident, but to do so in a way that gets results fast.”</li><li>“Specialists bring expertise that pushes the entire industry forward, while generalists offer versatility and adaptability in the ever-changing landscape of cybersecurity.”</li><li>“The choice between specializing and generalizing doesn’t always need to be a conscious decision. Often, you just fall into one or the other depending on the work you do day to day.”</li></ul><p>Resources Mentioned:</p><ul><li><b>LinkedIn - Follow TLP Podcast</b>: Follow us on Linked in, and share your thoughts on this episode. <a href='https://www.linkedin.com/company/traffic-light-protocol-the-digital-forensics-podcast-tlp'>Follow TLP Podcast on LinkedIn</a></li><li><b>B-Sides Brisbane Presentation by Ben Gittins</b>: A shout-out was given to Ben Gittins for his presentation on the topic of generalists vs. specialists at B-Sides Brisbane. <a href='https://www.bsidesbrisbane.com/'>More about B-Sides Brisbane</a></li><li><b>Volatility - Memory Forensics Tool</b>: Developed by Andrew Case, Volatility is highlighted as an essential tool for memory forensics. <a href='https://www.volatilityfoundation.org/'>Download Volatility</a></li></ul><p>Action Points:</p><ul><li><b>Reflect on Your Career Path</b>: Consider whether you are currently on the path of specialization or generalization in DFIR. Reflect on how this aligns with your career goals and the needs of your organization.</li><li><b>Engage with the Community</b>: The host invites listeners to share their thoughts on the specialist vs. generalist debate on LinkedIn. Join the discussion to see how others in the field are navigating their careers.</li><li><b>Stay Updated</b>: Follow the TLP podcast on LinkedIn for more discussions and updates on digital forensics and incident response topics.</li></ul>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15573182-episode-12-you-re-forced-to-decide-cyber-generalist-or-cyber-specialist.mp3" length="12835412" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-15573182</guid>
    <pubDate>Tue, 13 Aug 2024 17:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15573182/transcript" type="text/html" />
    <itunes:duration>1067</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 11 - Velociraptor,  Containerisation and Infrastructure Deployed as Code with Myles Agnew</itunes:title>
    <title>Episode 11 - Velociraptor,  Containerisation and Infrastructure Deployed as Code with Myles Agnew</title>
    <itunes:summary><![CDATA[Send a text In this episode of Traffic Light Protocol, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when deploying Velciraptor-  an advanced open-source endpoint monitoring, digital forensic and cyber response platform).   We delve into his journey fro...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode of <em>Traffic Light Protocol</em>, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when deploying Velciraptor-  an advanced open-source endpoint monitoring, digital forensic and cyber response platform).<br/><br/> We delve into his journey from the military to his current role in deploying and managing advanced cloud infrastructure using docker containers and kubernetes orchestration platforms. <br/><br/><b>Quotes from Myles</b>:</p><ul><li>&quot;My time in the Army taught me the value of precision and strategy, which I now apply to cybersecurity.&quot;</li><li> &quot;Cloud environments offer flexibility, but they also demand a new level of vigilance and control.&quot; </li><li>&quot;With containerization, we’re not just deploying applications; we&apos;re creating a more secure and manageable environment.&quot; </li></ul><p>Key takeaways:<br/><br/><b>Strategic Integration</b>: Integrating automation and cloud technologies can significantly enhance both the efficiency and effectiveness of cybersecurity practices.</p><ul><li><b>Proactive Security Measures</b>: Shifting from reactive to proactive security strategies is essential for staying ahead of emerging threats.</li><li><b>Cloud Security Fundamentals</b>: Understanding the fundamentals of containerization and orchestration is crucial for maintaining a secure cloud environment.</li><li><b>Efficiency Through Automation</b>: Automation not only speeds up response times but also reduces the likelihood of human error in security processes.</li><li><b>Vigilance in Cloud Environments</b>: While cloud technologies offer numerous benefits, they also introduce new security challenges that require continuous vigilance and adaptation.</li><li><b>Role of Military Experience</b>: Insights gained from military experience can offer valuable perspectives on discipline, strategy, and precision in cybersecurity practices.</li><li><b>Future Trends</b>: Keeping up with trends in automation and cloud security will be key to adapting to future cybersecurity challenges.</li></ul><p><b>Links and resources:</b><br/><br/>Contact Myles<br/><br/><b>Website:</b> MylesAgnew.com<br/><b>Github: </b>https://github.com/mylesagnew<br/><br/><b>ASD threat intel:</b><br/>https://www.asd.gov.au/about/what-we-do/cyber-security<br/><br/><b>Tools:</b><br/>Cuckoo Sandbox- https://github.com/cuckoosandbox<br/>Wordfence - Available in Wordpress plugins<br/>WPS Scan (on Kali Linux) for scanning your own Wordpress site for vulnerabilities<br/> Yara Signator: https://github.com/fxb-cocacoding/yara-signator <br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode of <em>Traffic Light Protocol</em>, we sit down with Myles, a cybersecurity veteran with over 15 years of Cyber experience and background as a Combat Engineer in the Army. Myles brings his unique perspective on integrating automation and cloud technologies into cybersecurity infrastructure deployment (Used specifically when deploying Velciraptor-  an advanced open-source endpoint monitoring, digital forensic and cyber response platform).<br/><br/> We delve into his journey from the military to his current role in deploying and managing advanced cloud infrastructure using docker containers and kubernetes orchestration platforms. <br/><br/><b>Quotes from Myles</b>:</p><ul><li>&quot;My time in the Army taught me the value of precision and strategy, which I now apply to cybersecurity.&quot;</li><li> &quot;Cloud environments offer flexibility, but they also demand a new level of vigilance and control.&quot; </li><li>&quot;With containerization, we’re not just deploying applications; we&apos;re creating a more secure and manageable environment.&quot; </li></ul><p>Key takeaways:<br/><br/><b>Strategic Integration</b>: Integrating automation and cloud technologies can significantly enhance both the efficiency and effectiveness of cybersecurity practices.</p><ul><li><b>Proactive Security Measures</b>: Shifting from reactive to proactive security strategies is essential for staying ahead of emerging threats.</li><li><b>Cloud Security Fundamentals</b>: Understanding the fundamentals of containerization and orchestration is crucial for maintaining a secure cloud environment.</li><li><b>Efficiency Through Automation</b>: Automation not only speeds up response times but also reduces the likelihood of human error in security processes.</li><li><b>Vigilance in Cloud Environments</b>: While cloud technologies offer numerous benefits, they also introduce new security challenges that require continuous vigilance and adaptation.</li><li><b>Role of Military Experience</b>: Insights gained from military experience can offer valuable perspectives on discipline, strategy, and precision in cybersecurity practices.</li><li><b>Future Trends</b>: Keeping up with trends in automation and cloud security will be key to adapting to future cybersecurity challenges.</li></ul><p><b>Links and resources:</b><br/><br/>Contact Myles<br/><br/><b>Website:</b> MylesAgnew.com<br/><b>Github: </b>https://github.com/mylesagnew<br/><br/><b>ASD threat intel:</b><br/>https://www.asd.gov.au/about/what-we-do/cyber-security<br/><br/><b>Tools:</b><br/>Cuckoo Sandbox- https://github.com/cuckoosandbox<br/>Wordfence - Available in Wordpress plugins<br/>WPS Scan (on Kali Linux) for scanning your own Wordpress site for vulnerabilities<br/> Yara Signator: https://github.com/fxb-cocacoding/yara-signator <br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15490279-episode-11-velociraptor-containerisation-and-infrastructure-deployed-as-code-with-myles-agnew.mp3" length="38701420" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15490279</guid>
    <pubDate>Mon, 29 Jul 2024 12:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15490279/transcript" type="text/html" />
    <itunes:duration>3223</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>11</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 10 - Detecting and Preventing Phishing Attacks</itunes:title>
    <title>Episode 10 - Detecting and Preventing Phishing Attacks</title>
    <itunes:summary><![CDATA[Send a text Quotes:  "Phishing targets the human element, the 'wetware,' often the weakest link in any security chain." - Clint Marsden "Phishing isn't just about poorly spelled emails anymore; it's about sophisticated campaigns that even cyber-aware individuals can fall victim to." - Clint Marsden "Effective defense against phishing involves not just technology but ongoing education and a culture of security awareness." - Clint Marsden  Key Takeaways:    Phishing attacks continue to evo...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p><b>Quotes:</b><br/><br/>&quot;Phishing targets the human element, the &apos;wetware,&apos; often the weakest link in any security chain.&quot; - Clint Marsden<br/>&quot;Phishing isn&apos;t just about poorly spelled emails anymore; it&apos;s about sophisticated campaigns that even cyber-aware individuals can fall victim to.&quot; - Clint Marsden<br/>&quot;Effective defense against phishing involves not just technology but ongoing education and a culture of security awareness.&quot; - Clint Marsden<br/><br/><b>Key Takeaways:</b><br/><br/></p><ul><li> Phishing attacks continue to evolve and remain a significant cybersecurity threat despite advances in technology.</li><li> Attackers leverage sophisticated techniques including AI and social engineering to exploit human psychology.</li><li> Effective defense strategies involve a multi-layered approach including user education, advanced email gateway technologies, and stringent access controls.</li></ul><p><br/><b>Action Points:</b><br/><br/></p><ol><li> Implement ongoing and evolving user education programs to enhance awareness of phishing tactics.</li><li> Ensure email gateways are configured with DKIM, SPF, and DMARC protocols, and ensure the SEG is tuned appropriately to filter out malicious emails </li><li> Follow the Essential 8 guidelines, focusing on restricting Microsoft Office macros and restricting admin privileges. If you&apos;ve got the capacity, go straight into application control.</li><li> Implement multi-factor authentication (MFA) across all public-facing and internal systems to add an additional layer of security against phishing attempts.</li></ol><p><br/><b>Links and references:</b><br/><br/><b>Mitre ATT&amp;CK - Phishing</b><br/><br/>https://attack.mitre.org/techniques/T1566/<br/><br/><b>ASD Essential 8:</b><br/><br/>https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight <br/><br/><b>IDN Homograph attacks:</b><br/><br/>https://shahjerry33.medium.com/idn-homograph-attack-reborn-of-the-rare-case-99fa1e342352 <br/><br/><br/><b>Phishing Landscape 2023 by Interisle Consulting and APWG:</b><br/><br/>https://www.interisle.net/PhishingLandscape2023.pdf<br/><br/><b>Anti Phishing Working Group:</b><br/><br/>https://apwg.org/trendsreports/<br/><br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p><b>Quotes:</b><br/><br/>&quot;Phishing targets the human element, the &apos;wetware,&apos; often the weakest link in any security chain.&quot; - Clint Marsden<br/>&quot;Phishing isn&apos;t just about poorly spelled emails anymore; it&apos;s about sophisticated campaigns that even cyber-aware individuals can fall victim to.&quot; - Clint Marsden<br/>&quot;Effective defense against phishing involves not just technology but ongoing education and a culture of security awareness.&quot; - Clint Marsden<br/><br/><b>Key Takeaways:</b><br/><br/></p><ul><li> Phishing attacks continue to evolve and remain a significant cybersecurity threat despite advances in technology.</li><li> Attackers leverage sophisticated techniques including AI and social engineering to exploit human psychology.</li><li> Effective defense strategies involve a multi-layered approach including user education, advanced email gateway technologies, and stringent access controls.</li></ul><p><br/><b>Action Points:</b><br/><br/></p><ol><li> Implement ongoing and evolving user education programs to enhance awareness of phishing tactics.</li><li> Ensure email gateways are configured with DKIM, SPF, and DMARC protocols, and ensure the SEG is tuned appropriately to filter out malicious emails </li><li> Follow the Essential 8 guidelines, focusing on restricting Microsoft Office macros and restricting admin privileges. If you&apos;ve got the capacity, go straight into application control.</li><li> Implement multi-factor authentication (MFA) across all public-facing and internal systems to add an additional layer of security against phishing attempts.</li></ol><p><br/><b>Links and references:</b><br/><br/><b>Mitre ATT&amp;CK - Phishing</b><br/><br/>https://attack.mitre.org/techniques/T1566/<br/><br/><b>ASD Essential 8:</b><br/><br/>https://www.cyber.gov.au/resources-business-and-government/essential-cyber-security/essential-eight <br/><br/><b>IDN Homograph attacks:</b><br/><br/>https://shahjerry33.medium.com/idn-homograph-attack-reborn-of-the-rare-case-99fa1e342352 <br/><br/><br/><b>Phishing Landscape 2023 by Interisle Consulting and APWG:</b><br/><br/>https://www.interisle.net/PhishingLandscape2023.pdf<br/><br/><b>Anti Phishing Working Group:</b><br/><br/>https://apwg.org/trendsreports/<br/><br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15427362-episode-10-detecting-and-preventing-phishing-attacks.mp3" length="13755126" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15427362</guid>
    <pubDate>Wed, 17 Jul 2024 17:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15427362/transcript" type="text/html" />
    <itunes:duration>1144</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>10</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies</itunes:title>
    <title>Episode 9 -Unmasking APT40 (Leviathan): Tactics, Challenges, and Defense Strategies</title>
    <itunes:summary><![CDATA[Send a text Episode Title: "Unmasking APT40: Tactics, Challenges, and Defense Strategies" Key Takeaways:  APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009. They target various sectors including academia, aerospace, defense, healthcare, and maritime industries. APT40 uses advanced tactics such as spear phishing, watering hole attacks, and living off the land binaries (LOLBINS). Digital forensics faces challenges in detecting APT40 due to their use of leg...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Episode Title: &quot;Unmasking APT40: Tactics, Challenges, and Defense Strategies&quot;<br/>Key Takeaways:<br/><br/>APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009.<br/>They target various sectors including academia, aerospace, defense, healthcare, and maritime industries.<br/>APT40 uses advanced tactics such as spear phishing, watering hole attacks, and living off the land binaries (LOLBINS).<br/>Digital forensics faces challenges in detecting APT40 due to their use of legitimate tools and anti-forensics techniques.<br/>Effective defense against APT40 requires a comprehensive, layered security approach.<br/><br/>Engaging Quotes:<br/>&quot;APT40 represents a significant and evolving threat in the cyber landscape. Their sophisticated attacks, large scope targets and state sponsorship make them a formidable adversary.&quot; - Clint Marsden<br/>&quot;Defense against groups like APT40 it is not about implementing a single solution. What matters is creating a comprehensive and layered security approach that can adapt to evolving threats.&quot; - Clint Marsden<br/><br/>Resources Mentioned:<br/><br/>MITRE ATT&amp;CK Framework: https://attack.mitre.org/<br/>Pyramid of Pain by David J. Bianco: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html<br/>NIST Computer Security Incident Handling Guide: https://csrc.nist.gov/pubs/sp/800/61/r2/final<br/>Sysmon (System Monitor): https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon<br/><br/>Action Points:<br/><br/>Implement robust email security measures, including secure email gateways and employee training.<br/>Keep all systems and software up-to-date to reduce vulnerabilities.<br/>Use multi-factor authentication to protect against credential theft.<br/>Implement network segmentation to limit lateral movement.<br/>Deploy advanced endpoint detection and response (EDR) tools.<br/>Conduct regular threat hunting exercises.<br/>Implement data loss prevention (DLP) solutions.<br/>Develop a comprehensive cloud security strategy.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>Episode Title: &quot;Unmasking APT40: Tactics, Challenges, and Defense Strategies&quot;<br/>Key Takeaways:<br/><br/>APT40 is a sophisticated Chinese state-sponsored cyber espionage group active since 2009.<br/>They target various sectors including academia, aerospace, defense, healthcare, and maritime industries.<br/>APT40 uses advanced tactics such as spear phishing, watering hole attacks, and living off the land binaries (LOLBINS).<br/>Digital forensics faces challenges in detecting APT40 due to their use of legitimate tools and anti-forensics techniques.<br/>Effective defense against APT40 requires a comprehensive, layered security approach.<br/><br/>Engaging Quotes:<br/>&quot;APT40 represents a significant and evolving threat in the cyber landscape. Their sophisticated attacks, large scope targets and state sponsorship make them a formidable adversary.&quot; - Clint Marsden<br/>&quot;Defense against groups like APT40 it is not about implementing a single solution. What matters is creating a comprehensive and layered security approach that can adapt to evolving threats.&quot; - Clint Marsden<br/><br/>Resources Mentioned:<br/><br/>MITRE ATT&amp;CK Framework: https://attack.mitre.org/<br/>Pyramid of Pain by David J. Bianco: https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html<br/>NIST Computer Security Incident Handling Guide: https://csrc.nist.gov/pubs/sp/800/61/r2/final<br/>Sysmon (System Monitor): https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon<br/><br/>Action Points:<br/><br/>Implement robust email security measures, including secure email gateways and employee training.<br/>Keep all systems and software up-to-date to reduce vulnerabilities.<br/>Use multi-factor authentication to protect against credential theft.<br/>Implement network segmentation to limit lateral movement.<br/>Deploy advanced endpoint detection and response (EDR) tools.<br/>Conduct regular threat hunting exercises.<br/>Implement data loss prevention (DLP) solutions.<br/>Develop a comprehensive cloud security strategy.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15401530-episode-9-unmasking-apt40-leviathan-tactics-challenges-and-defense-strategies.mp3" length="15720951" type="audio/mpeg" />
    <link>http://www.dfirinsights.com</link>
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15401530</guid>
    <pubDate>Fri, 12 Jul 2024 10:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15401530/transcript" type="text/html" />
    <itunes:duration>1308</itunes:duration>
    <itunes:keywords>APT40, MUDCARP, Kryptonite Panda, Gadolinium, BRONZE MOHAWK, TEMP.Jumper, APT40, TEMP.Periscope, Gingham Typhoon </itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>9</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and printer forensics</itunes:title>
    <title>Episode 8 - Hidden digital forensic logging for Cybersecurity on Any Budget: Practical Strategies for Enhanced Detection and Prevention Using Sysmon, Blocking Data Exfil with group policy and printer forensics</title>
    <itunes:summary><![CDATA[Send a text In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget.  Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security.  Event log cleared: Event ID 1102 ACSC Sysmon: https://github.com/AustralianCyberSecurityCentre/windows_event_logging Swift on security Sysmon: https://github.com/SwiftOnSecurity/sysmon-config Printer ...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget.<br/><br/>Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. </p><p>Event log cleared: Event ID 1102<br/>ACSC Sysmon: https://github.com/AustralianCyberSecurityCentre/windows_event_logging<br/>Swift on security Sysmon: https://github.com/SwiftOnSecurity/sysmon-config<br/>Printer forensics: https://eventlogxp.com/blog/how-to-track-printer-usage-with-event-logs/</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this episode, Clint Marsden goes straight into 4 practical strategies that enable better forensics and stop data exfiltration, no matter the size of your budget.<br/><br/>Clint covers deploying Sysmon for enhanced monitoring, and using Group Policy to tighten print and USB security. </p><p>Event log cleared: Event ID 1102<br/>ACSC Sysmon: https://github.com/AustralianCyberSecurityCentre/windows_event_logging<br/>Swift on security Sysmon: https://github.com/SwiftOnSecurity/sysmon-config<br/>Printer forensics: https://eventlogxp.com/blog/how-to-track-printer-usage-with-event-logs/</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15372054-episode-8-hidden-digital-forensic-logging-for-cybersecurity-on-any-budget-practical-strategies-for-enhanced-detection-and-prevention-using-sysmon-blocking-data-exfil-with-group-policy-and-printer-forensics.mp3" length="14387391" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15372054</guid>
    <pubDate>Sun, 07 Jul 2024 20:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15372054/transcript" type="text/html" />
    <itunes:duration>1197</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>8</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures</itunes:title>
    <title>Episode 7 - Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures</title>
    <itunes:summary><![CDATA[Send a text In todays episode of TLP - Traffic Light Protocol, Clint Marsden talks about Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures.  Key Takeaways   Understanding Scattered Spider: Scattered Spider, also known as Roasted Octopus or Octo Tempest, utilizes various legitimate tools for malicious purposes.   Common Tools and Techniques: They employ tools for reconnaissance (PingCastle, ADRecon), credential dumping (Mimikatz, Lazagne), Re...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In todays episode of TLP - Traffic Light Protocol, Clint Marsden talks about Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures.<br/><br/>Key Takeaways<br/><br/> Understanding Scattered Spider: Scattered Spider, also known as Roasted Octopus or Octo Tempest, utilizes various legitimate tools for malicious purposes.<br/><br/> Common Tools and Techniques: They employ tools for reconnaissance (PingCastle, ADRecon), credential dumping (Mimikatz, Lazagne), Remote access (Screen Connect, Team Viewer), and VPN (Tailscale).<br/><br/>Social Engineering Tactics: Their methods include impersonation, MFA fatigue (MFA bombing), and SIM swapping to gain access.<br/><br/>Persistence Mechanisms: They maintain access through methods like automatic account linking and adding additional MFA tokens <br/><br/>Defense Strategies: Implement strong identity verification, monitor for unusual activity, and educate users social engineering &amp; smishing<br/><br/>Quotes<br/><br/>&quot;By understanding their tactics, techniques, and procedures, or TTPs, you can better defend your network and improve its security posture.&quot;<br/> &quot;There&apos;s a lot of push on recognizing phishing emails and hovering over links and verifying the sender, but not enough focus on social engineering training for staff&quot;<br/><br/>Action Points<br/><br/>Review Service Desk Processes: Ensure robust identity verification to prevent social engineering.<br/>Monitor for Unusual Activity: Regularly audit and set up automated alerts for suspicious MFA changes or logins.<br/>Educate Users: Conduct training on recognizing phishing and social engineering techniques.<br/>Test Tools in a Lab: Use the mentioned tools to simulate attacks and improve defensive measures by analyzing security logs and infrastructure.<br/><br/>Mentioned Resources<br/><br/>Remote monitoring and management or RMM tools<br/><br/>Fleetdeck.io<br/>Level.io <br/>Ngrok Mitre Ref: [S0508]   <br/>Screenconnect  <br/>Splashtop <br/>Teamviewer      <br/>Pulseway <br/>Tactical RMM<br/><br/>Reconnaissance:<br/><br/>PingCastle - https://www.pingcastle.com/<br/>ADRecon - https://github.com/sense-of-security/ADRecon<br/>Advanced IP Scanner - https://www.advanced-ip-scanner.com/<br/>Govmomi - https://github.com/vmware/govmomi<br/><br/>Cred dumpers:<br/><br/>Mimikatz - https://github.com/ParrotSec/mimikatz<br/>Hekatomb - https://github.com/ProcessusT/HEKATOMB<br/>Lazagne - https://github.com/AlessandroZ/LaZagne<br/>gosecretsdump - https://github.com/C-Sto/gosecretsdump<br/>smbpasswd.py - (as part of Impacket) - https://github.com/fortra/impacket/blob/master/examples/smbpasswd.py<br/>LinPEAS - https://github.com/peass-ng/PEASS-ng/tree/master/linPEAS<br/>ADFSDump - https://github.com/mandiant/ADFSDump <br/><br/>VPN:<br/><br/>Tailscale -   Provides virtual private networks (VPNs) to secure network communications<br/><br/><br/><br/><br/><br/> <br/><br/><br/></p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In todays episode of TLP - Traffic Light Protocol, Clint Marsden talks about Defending Against Scattered Spider: Understanding Their Tactics, Techniques, and Procedures.<br/><br/>Key Takeaways<br/><br/> Understanding Scattered Spider: Scattered Spider, also known as Roasted Octopus or Octo Tempest, utilizes various legitimate tools for malicious purposes.<br/><br/> Common Tools and Techniques: They employ tools for reconnaissance (PingCastle, ADRecon), credential dumping (Mimikatz, Lazagne), Remote access (Screen Connect, Team Viewer), and VPN (Tailscale).<br/><br/>Social Engineering Tactics: Their methods include impersonation, MFA fatigue (MFA bombing), and SIM swapping to gain access.<br/><br/>Persistence Mechanisms: They maintain access through methods like automatic account linking and adding additional MFA tokens <br/><br/>Defense Strategies: Implement strong identity verification, monitor for unusual activity, and educate users social engineering &amp; smishing<br/><br/>Quotes<br/><br/>&quot;By understanding their tactics, techniques, and procedures, or TTPs, you can better defend your network and improve its security posture.&quot;<br/> &quot;There&apos;s a lot of push on recognizing phishing emails and hovering over links and verifying the sender, but not enough focus on social engineering training for staff&quot;<br/><br/>Action Points<br/><br/>Review Service Desk Processes: Ensure robust identity verification to prevent social engineering.<br/>Monitor for Unusual Activity: Regularly audit and set up automated alerts for suspicious MFA changes or logins.<br/>Educate Users: Conduct training on recognizing phishing and social engineering techniques.<br/>Test Tools in a Lab: Use the mentioned tools to simulate attacks and improve defensive measures by analyzing security logs and infrastructure.<br/><br/>Mentioned Resources<br/><br/>Remote monitoring and management or RMM tools<br/><br/>Fleetdeck.io<br/>Level.io <br/>Ngrok Mitre Ref: [S0508]   <br/>Screenconnect  <br/>Splashtop <br/>Teamviewer      <br/>Pulseway <br/>Tactical RMM<br/><br/>Reconnaissance:<br/><br/>PingCastle - https://www.pingcastle.com/<br/>ADRecon - https://github.com/sense-of-security/ADRecon<br/>Advanced IP Scanner - https://www.advanced-ip-scanner.com/<br/>Govmomi - https://github.com/vmware/govmomi<br/><br/>Cred dumpers:<br/><br/>Mimikatz - https://github.com/ParrotSec/mimikatz<br/>Hekatomb - https://github.com/ProcessusT/HEKATOMB<br/>Lazagne - https://github.com/AlessandroZ/LaZagne<br/>gosecretsdump - https://github.com/C-Sto/gosecretsdump<br/>smbpasswd.py - (as part of Impacket) - https://github.com/fortra/impacket/blob/master/examples/smbpasswd.py<br/>LinPEAS - https://github.com/peass-ng/PEASS-ng/tree/master/linPEAS<br/>ADFSDump - https://github.com/mandiant/ADFSDump <br/><br/>VPN:<br/><br/>Tailscale -   Provides virtual private networks (VPNs) to secure network communications<br/><br/><br/><br/><br/><br/> <br/><br/><br/></p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15312894-episode-7-defending-against-scattered-spider-understanding-their-tactics-techniques-and-procedures.mp3" length="12357464" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15312894</guid>
    <pubDate>Wed, 26 Jun 2024 08:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15312894/transcript" type="text/html" />
    <itunes:duration>1027</itunes:duration>
    <itunes:keywords>DFIR,TTP&#39;s,Scattered Spider,Best DFIR Podcast, Top Digital Forensics Insights, Latest Incident Response Techniques, Digital Forensics Experts, Cybersecurity and DFIR, Advanced Digital Investigations, Cyber Crime Analysis, DFIR Strategies, Incident Respons</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>7</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo</itunes:title>
    <title>Episode 6 - Responding to ransomware - is your VPN a target? Plus ransomware risk mitigation with Phil Ngo</title>
    <itunes:summary><![CDATA[Send a text  In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture's global cyber response team.   As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a high school teacher, before moving into IT support and eventually into cyber security six years ago. Philip has a worked across multiple industri...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p> In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture&apos;s global cyber response team. <br/><br/>As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a high school teacher, before moving into IT support and eventually into cyber security six years ago. Philip has a worked across multiple industries and through his experience, has built up a solid cyber forensics and response skillset. <br/><br/>Get some tactical assistance with Phil&apos;s real life high-pressure incident experience. In this episode we cover:<br/><br/>Challenges in Digital Forensics: <br/>Obstacles in digital forensics and incident response - working people and systems<br/>Frequent vulnerabilities exploited in breaches <br/>The potential impact of AI on digital forensics and incident response<br/> Essential qualities and resources for aspiring cybersecurity professionals <br/><br/>Connect with Phil on LinkedIn here:<br/>https://www.linkedin.com/in/phil-ngo1337/<br/><br/>Youtube channels for additional learning:<br/><br/>13 Cubed www.youtube.com/@13Cubed<br/>Network Chuck: http://www.youtube.com/@NetworkChuck<br/>http://www.youtube.com/@SANSForensics<br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p> In this episode, we speak with Phil Ngo, a Primary Investigator in Accenture&apos;s global cyber response team. <br/><br/>As a primary investigator, he is responsible for helping clients recover from major incidents as well as delivering proactive cyber services, such as threat hunting and tabletop exercises. Philip started his career as a high school teacher, before moving into IT support and eventually into cyber security six years ago. Philip has a worked across multiple industries and through his experience, has built up a solid cyber forensics and response skillset. <br/><br/>Get some tactical assistance with Phil&apos;s real life high-pressure incident experience. In this episode we cover:<br/><br/>Challenges in Digital Forensics: <br/>Obstacles in digital forensics and incident response - working people and systems<br/>Frequent vulnerabilities exploited in breaches <br/>The potential impact of AI on digital forensics and incident response<br/> Essential qualities and resources for aspiring cybersecurity professionals <br/><br/>Connect with Phil on LinkedIn here:<br/>https://www.linkedin.com/in/phil-ngo1337/<br/><br/>Youtube channels for additional learning:<br/><br/>13 Cubed www.youtube.com/@13Cubed<br/>Network Chuck: http://www.youtube.com/@NetworkChuck<br/>http://www.youtube.com/@SANSForensics<br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15281569-episode-6-responding-to-ransomware-is-your-vpn-a-target-plus-ransomware-risk-mitigation-with-phil-ngo.mp3" length="19559430" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15281569</guid>
    <pubDate>Thu, 20 Jun 2024 13:00:00 +1000</pubDate>
    <itunes:duration>1628</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>6</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity)</itunes:title>
    <title>Episode 5 - NIST SP 800-61 Computer Security Incident Handling Guide (Post-Incident Activity)</title>
    <itunes:summary><![CDATA[Send a text This is the biggest episode from a content perspective so far. I'm excited to share it with you.  Episode Highlights: How to run post-incident debriefs and post-mortems.Involving external teamsUsing lessons learned to form actionable insights.Key questions to address in incident analysis.Effective report writing strategies, including  timelines and executive summaries.Evaluating and improving incident response procedures and tools preparation.Engaging broader teams in the deb...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>This is the biggest episode from a content perspective so far. I&apos;m excited to share it with you.<br/><br/><b>Episode Highlights:</b></p><ul><li>How to run post-incident debriefs and post-mortems.</li><li>Involving external teams</li><li>Using lessons learned to form actionable insights.</li><li>Key questions to address in incident analysis.</li><li>Effective report writing strategies, including  timelines and executive summaries.</li><li>Evaluating and improving incident response procedures and tools preparation.</li><li>Engaging broader teams in the debrief process for better cooperation.</li><li>Tracking and documenting incident response efforts for continuous improvement.</li></ul><p><b>Key Takeaways:</b></p><ul><li>Post-incident debriefs and post-mortems afford the most value for learning, improving incident response and preventing reoccurance.</li><li>Using structured frameworks and guidelines, like NIST 800-61, provide valuable direction for how to run your debrief and post-mortem meeting.</li><li>Effective communication, documentation, and cooperation across teams enhance incident handling and future preparedness.</li></ul> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>This is the biggest episode from a content perspective so far. I&apos;m excited to share it with you.<br/><br/><b>Episode Highlights:</b></p><ul><li>How to run post-incident debriefs and post-mortems.</li><li>Involving external teams</li><li>Using lessons learned to form actionable insights.</li><li>Key questions to address in incident analysis.</li><li>Effective report writing strategies, including  timelines and executive summaries.</li><li>Evaluating and improving incident response procedures and tools preparation.</li><li>Engaging broader teams in the debrief process for better cooperation.</li><li>Tracking and documenting incident response efforts for continuous improvement.</li></ul><p><b>Key Takeaways:</b></p><ul><li>Post-incident debriefs and post-mortems afford the most value for learning, improving incident response and preventing reoccurance.</li><li>Using structured frameworks and guidelines, like NIST 800-61, provide valuable direction for how to run your debrief and post-mortem meeting.</li><li>Effective communication, documentation, and cooperation across teams enhance incident handling and future preparedness.</li></ul> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15243170-episode-5-nist-sp-800-61-computer-security-incident-handling-guide-post-incident-activity.mp3" length="24539139" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-15243170</guid>
    <pubDate>Thu, 13 Jun 2024 07:00:00 +1000</pubDate>
    <itunes:duration>2043</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery)</itunes:title>
    <title>Episode 4 - NIST SP 800-61 Computer Security Incident Handling Guide (Containment,Eradication and Recovery)</title>
    <itunes:summary><![CDATA[Send a text  Show Notes: Episode on Containment, Eradication, and Recovery In this episode of Traffic Light Protocol,  Clint Marsden explores the containment, eradication, and recovery phases of the NIST SP 800-61 framework for computer security incident handling. Key Topics Covered: Containment Strategies:  Choosing appropriate containment methods based on the incident type, potential damage, service availability, and evidence preservation. Examples include power disconnection...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p> Show Notes: Episode on Containment, Eradication, and Recovery</p><p>In this episode of Traffic Light Protocol,  Clint Marsden explores the containment, eradication, and recovery phases of the NIST SP 800-61 framework for computer security incident handling.</p><p><b>Key Topics Covered:</b></p><ul><li><b>Containment Strategies</b>:  Choosing appropriate containment methods based on the incident type, potential damage, service availability, and evidence preservation. Examples include power disconnection and network isolation.</li><li><b>Real-World Example</b>: Clint shares an incident response case where premature action against attackers led to a total domain takeover.</li><li><b>Evidence Gathering and Handling</b>: The use of tools like write blockers to preserve evidence integrity.</li><li><b>Threat Analysis</b>: Highlights passive techniques for analysing threats without alerting attackers, such as remote log analysis and OPSEC to track attackers</li><li><b>Restoration and Recovery</b>: Covers steps to restore systems to normal operations, including vulnerability patching, backup restoration, and password resets.</li><li><b>Future Considerations</b>: Suggests engaging with external vendors for comprehensive incident response and utilizing threat intelligence platforms.</li></ul><p>Join Clint Marsden as he guides you through the intricacies of incident response, helping you enhance your digital forensics skills. Follow Clint Marsden on LinkedIn (https://www.linkedin.com/in/clintmarsden/) and TLP on Linked In https://www.linkedin.com/company/traffic-light-protocol-the-digital-forensics-podcast-tlp for more updates and insights. </p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p> Show Notes: Episode on Containment, Eradication, and Recovery</p><p>In this episode of Traffic Light Protocol,  Clint Marsden explores the containment, eradication, and recovery phases of the NIST SP 800-61 framework for computer security incident handling.</p><p><b>Key Topics Covered:</b></p><ul><li><b>Containment Strategies</b>:  Choosing appropriate containment methods based on the incident type, potential damage, service availability, and evidence preservation. Examples include power disconnection and network isolation.</li><li><b>Real-World Example</b>: Clint shares an incident response case where premature action against attackers led to a total domain takeover.</li><li><b>Evidence Gathering and Handling</b>: The use of tools like write blockers to preserve evidence integrity.</li><li><b>Threat Analysis</b>: Highlights passive techniques for analysing threats without alerting attackers, such as remote log analysis and OPSEC to track attackers</li><li><b>Restoration and Recovery</b>: Covers steps to restore systems to normal operations, including vulnerability patching, backup restoration, and password resets.</li><li><b>Future Considerations</b>: Suggests engaging with external vendors for comprehensive incident response and utilizing threat intelligence platforms.</li></ul><p>Join Clint Marsden as he guides you through the intricacies of incident response, helping you enhance your digital forensics skills. Follow Clint Marsden on LinkedIn (https://www.linkedin.com/in/clintmarsden/) and TLP on Linked In https://www.linkedin.com/company/traffic-light-protocol-the-digital-forensics-podcast-tlp for more updates and insights. </p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15203616-episode-4-nist-sp-800-61-computer-security-incident-handling-guide-containment-eradication-and-recovery.mp3" length="15986155" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-15203616</guid>
    <pubDate>Fri, 07 Jun 2024 12:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15203616/transcript" type="text/html" />
    <itunes:duration>1330</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 3 - (Part 2) NIST SP 800-61 Computer Security Incident Handling Guide (Detection)</itunes:title>
    <title>Episode 3 - (Part 2) NIST SP 800-61 Computer Security Incident Handling Guide (Detection)</title>
    <itunes:summary><![CDATA[Send a text In this conclusion of the Detection phase, Clint wraps up Incident Prioritisation. This includes Functional impacts of the incident, information impact of the incident and the recoverability of the incident.  Not all of these are needed, or relevant when tracking your incident and Clint explains when to categorise incidents using these factors.  To finish off, Clint discusses incident notification - Who are the stakeholders that need to be informed and included in your incident re...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this conclusion of the Detection phase, Clint wraps up Incident Prioritisation. This includes Functional impacts of the incident, information impact of the incident and the recoverability of the incident.<br/><br/>Not all of these are needed, or relevant when tracking your incident and Clint explains when to categorise incidents using these factors.<br/><br/>To finish off, Clint discusses incident notification - Who are the stakeholders that need to be informed and included in your incident response process, and how will they be notified?<br/><br/>Auscert: www.auscert.org.au</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this conclusion of the Detection phase, Clint wraps up Incident Prioritisation. This includes Functional impacts of the incident, information impact of the incident and the recoverability of the incident.<br/><br/>Not all of these are needed, or relevant when tracking your incident and Clint explains when to categorise incidents using these factors.<br/><br/>To finish off, Clint discusses incident notification - Who are the stakeholders that need to be informed and included in your incident response process, and how will they be notified?<br/><br/>Auscert: www.auscert.org.au</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15167673-episode-3-part-2-nist-sp-800-61-computer-security-incident-handling-guide-detection.mp3" length="8439069" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15167673</guid>
    <pubDate>Fri, 31 May 2024 12:00:00 +1000</pubDate>
    <itunes:duration>701</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>4</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 3 - NIST SP 800-61 Computer Security Incident Handling Guide (Detection)</itunes:title>
    <title>Episode 3 - NIST SP 800-61 Computer Security Incident Handling Guide (Detection)</title>
    <itunes:summary><![CDATA[Send a text In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61.  Attack vectors for digital security incidents, including insider threats and weaponized USBs. Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation The importance of following temporal linearity in  Forensic Investigations, expanding analysis to 5-10 minutes prior to and after events, particularly in Internet History and Memor...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61.<br/><br/>Attack vectors for digital security incidents, including insider threats and weaponized USBs.<br/>Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation<br/>The importance of following temporal linearity in  Forensic Investigations, expanding analysis to 5-10 minutes prior to and after events, particularly in Internet History and Memory Dumps<br/>Building a baseline of activity through network pcaps and log analysis<br/>Why synchronised clocks are important?<br/>How detailed notes help in your investigations</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this 45 minute episode Clint covers a lot of ground based on the Detection phase of NIST 800-61.<br/><br/>Attack vectors for digital security incidents, including insider threats and weaponized USBs.<br/>Cybersecurity incident response and detection, including NIST guidelines and Sysmon logging augmentation<br/>The importance of following temporal linearity in  Forensic Investigations, expanding analysis to 5-10 minutes prior to and after events, particularly in Internet History and Memory Dumps<br/>Building a baseline of activity through network pcaps and log analysis<br/>Why synchronised clocks are important?<br/>How detailed notes help in your investigations</p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15085326-episode-3-nist-sp-800-61-computer-security-incident-handling-guide-detection.mp3" length="34444746" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-15085326</guid>
    <pubDate>Tue, 28 May 2024 11:00:00 +1000</pubDate>
    <itunes:duration>2868</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>3</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 2 - NIST SP 800-61 Computer Security Incident Handling Guide (Preparation)</itunes:title>
    <title>Episode 2 - NIST SP 800-61 Computer Security Incident Handling Guide (Preparation)</title>
    <itunes:summary><![CDATA[Send a text In this Episode Clint Marsden talks about the first phase of Computer Security Incident Handling according to NIST. Listen to real world examples of how to get prepared before a Cyber Security Incident arrives.  Show notes:  Link to NIST SP 800-61 PDF  https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf   Bro has been renamed to Zeek. https://zeek.org/  Rita is Real Intelligence Threat Analytics. Created by Active Countermeasures -   Available from http...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this Episode Clint Marsden talks about the first phase of Computer Security Incident Handling according to NIST. Listen to real world examples of how to get prepared before a Cyber Security Incident arrives.<br/><br/>Show notes:<br/><br/>Link to NIST SP 800-61 PDF<br/><br/>https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf<br/><br/><br/>Bro has been renamed to Zeek. https://zeek.org/<br/><br/>Rita is Real Intelligence Threat Analytics. Created by Active Countermeasures - <br/><br/>Available from https://github.com/activecm/rita<br/><br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this Episode Clint Marsden talks about the first phase of Computer Security Incident Handling according to NIST. Listen to real world examples of how to get prepared before a Cyber Security Incident arrives.<br/><br/>Show notes:<br/><br/>Link to NIST SP 800-61 PDF<br/><br/>https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf<br/><br/><br/>Bro has been renamed to Zeek. https://zeek.org/<br/><br/>Rita is Real Intelligence Threat Analytics. Created by Active Countermeasures - <br/><br/>Available from https://github.com/activecm/rita<br/><br/><br/></p> <p><b>Join the AI Cyber Security Skool Group</b><br>Inside the group, you’ll learn how to defend against prompt injections, lock down API keys, and stop your automations from turning into costly incidents. It’s a space for cyber pros, engineers, and AI builders to share playbooks, tools, and real-world lessons on keeping AI secure.<br>https://www.skool.com/ai-automation-security-5754/about?ref=3e3ebf81027c4bceb6f7cbfdbabe22ea</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15085312-episode-2-nist-sp-800-61-computer-security-incident-handling-guide-preparation.mp3" length="20353086" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15085312</guid>
    <pubDate>Fri, 17 May 2024 19:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15085312/transcript" type="text/html" />
    <itunes:duration>1694</itunes:duration>
    <itunes:keywords>NIST 800-61, Incident Preparedness,Cyber Security,DFIR,Digital Forensics</itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>2</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Episode 1 - Digital forensics trends and preparations, learning from real life case studies &amp; DFIR training for getting started</itunes:title>
    <title>Episode 1 - Digital forensics trends and preparations, learning from real life case studies &amp; DFIR training for getting started</title>
    <itunes:summary><![CDATA[Send a text In this first episode we kick off with Clint Marsden, the host of Traffic Light Protocol (TLP) where he talks about what its like to work in DFIR, how to get started with Cyber training, what to expect in future episodes, and of course a light touch on AI Forensics!  Join us for the first episode. The next episodes coming up talk about the NIST SP 800-61 where we break down Preparation, Detection, Eradication and Recovery.  Highlights:  Current trends and best practices in digital...]]></itunes:summary>
    <description><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this first episode we kick off with Clint Marsden, the host of Traffic Light Protocol (TLP) where he talks about what its like to work in DFIR, how to get started with Cyber training, what to expect in future episodes, and of course a light touch on AI Forensics!<br/><br/>Join us for the first episode. The next episodes coming up talk about the NIST SP 800-61 where we break down Preparation, Detection, Eradication and Recovery.<br/><br/>Highlights:<br/><br/>Current trends and best practices in digital forensics, emphasizing the importance of preparation, experience across different domains, and the challenges of acquiring artifacts. Clint highlights the need for a wide breadth of experience and stressed the importance of continuous learning, while  emphasising the need for a broad range of tools and methods. <br/>Finally, we also discussed various methods for learning cybersecurity without spending money, including exploring free resources and leveraging AI.</p>]]></description>
    <content:encoded><![CDATA[<p><a target="_blank" href="https://www.buzzsprout.com/twilio/text_messages/2361455/open_sms">Send a text</a></p><p>In this first episode we kick off with Clint Marsden, the host of Traffic Light Protocol (TLP) where he talks about what its like to work in DFIR, how to get started with Cyber training, what to expect in future episodes, and of course a light touch on AI Forensics!<br/><br/>Join us for the first episode. The next episodes coming up talk about the NIST SP 800-61 where we break down Preparation, Detection, Eradication and Recovery.<br/><br/>Highlights:<br/><br/>Current trends and best practices in digital forensics, emphasizing the importance of preparation, experience across different domains, and the challenges of acquiring artifacts. Clint highlights the need for a wide breadth of experience and stressed the importance of continuous learning, while  emphasising the need for a broad range of tools and methods. <br/>Finally, we also discussed various methods for learning cybersecurity without spending money, including exploring free resources and leveraging AI.</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/2361455/episodes/15077705-episode-1-digital-forensics-trends-and-preparations-learning-from-real-life-case-studies-dfir-training-for-getting-started.mp3" length="16910342" type="audio/mpeg" />
    <itunes:author>Clint Marsden</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15077705</guid>
    <pubDate>Thu, 16 May 2024 12:00:00 +1000</pubDate>
    <podcast:transcript url="https://www.buzzsprout.com/2361455/15077705/transcript" type="text/html" />
    <itunes:duration>1407</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:season>1</itunes:season>
    <itunes:episode>1</itunes:episode>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
