Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
TV & Film
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/37/14/e5/3714e5fb-e8f1-3fc1-c7ab-5a1ef90ceb48/mza_9071309666049007459.png/600x600bb.jpg
Human Element
Maltego
14 episodes
6 days ago
Welcome to Human Element, a podcast by Ben April, CTO at Maltego, focused on exploring the experiences and perspectives that shape cybersecurity leadership. In each episode, we speak with industry leaders to uncover the challenges they’ve encountered, the pivotal decisions that have influenced their careers, and the human dynamics that continue to shape the cybersecurity landscape beyond the technical domain.
Show more...
Technology
RSS
All content for Human Element is the property of Maltego and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Welcome to Human Element, a podcast by Ben April, CTO at Maltego, focused on exploring the experiences and perspectives that shape cybersecurity leadership. In each episode, we speak with industry leaders to uncover the challenges they’ve encountered, the pivotal decisions that have influenced their careers, and the human dynamics that continue to shape the cybersecurity landscape beyond the technical domain.
Show more...
Technology
https://pbcdn1.podbean.com/imglogo/ep-logo/pbblog20535894/Maltego_HE-Pod_1900x1900px_Episodes_B_2_ScottSmall8mcis.jpg
Tidal Cyber’s Scott Small on Useful Self-Teaching Technical Security Skills
Human Element
35 minutes
3 weeks ago
Tidal Cyber’s Scott Small on Useful Self-Teaching Technical Security Skills
Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber, built his security career on self-taught technical skills while competitors relied on computer science degrees, proving that intelligence analysis fundamentals combined with relentless curiosity often produce superior threat researchers. Scott shares how his background in critical thinking and intelligence studies created stronger foundations than formal technical training and how diverse career backgrounds generate the different perspectives needed to stay ahead of evolving attackers. Scott also tells Ben why maintaining varied information feeds without getting distracted requires deliberate discipline, how he uses AI daily to process unstructured public threat reports while checking for hallucinations through prompt refinement, and why building trust in remote security teams demands reliability during late-night incidents more than technical brilliance. He reveals his approach to staying current when attackers evolve tactics weekly, the specific frameworks he learned from extracurricular intelligence work that shaped his career more than classroom education, and why documenting your analytical process publicly benefits the community even when the topic has been extensively covered. Stories We’re Telling Today:  How intelligence fundamentals and curiosity create more adaptable analysts than pure technical training Why diverse backgrounds and perspectives generates superior analytical products, allowing security problems to be approached from unexpected angles that purely technical analysts miss Building operational trust in distributed security teams through consistent reliability, empathy for colleagues' challenges, and proactive gap-filling based on understanding teammates' strengths Balancing emerging trend awareness with daily responsibilities by maintaining primary research sources alongside peripheral feeds Leveraging AI for processing unstructured public threat reporting while maintaining accuracy through output verification and prompt refinement when hallucinations occur How early career mistakes with data interpretation, particularly reading too much into face-value metrics without considering underlying variables, build essential analytical skepticism Creating effective remote work patterns by maintaining consistent schedules, incorporating physical activity, and recreating beneficial office environment routines  Network building strategies that emphasize maintaining connections before needing help and leveraging conferences Information sharing through informal channels including trust-based Slack groups, security-focused newsletters, and social media tracking AI's dual impact as attackers leverage it to lower barriers to entry while defenders use it to process larger data volumes How increased law enforcement success against ransomware groups may push criminals deeper underground Too busy; didn’t listen:  Curiosity and willingness to continuously learn outweigh formal technical credentials in security analysis. Building trust in distributed security teams requires consistent reliability during high-pressure incidents, empathy for teammates' technical gaps, and proactive communication. AI effectively processes unstructured public threat reports when outputs are verified and prompts are refined to prevent hallucinations. Diverse career backgrounds create superior analytical products because varied perspectives allow approaching security problems from angles purely technical analysts miss. Maintaining professional networks before needing help, documenting analytical processes publicly despite existing coverage, and staying active in informal sharing communities builds the resilience security professionals need for long-term success. Skip to the Highlight of the episode:  [11:45-12:11] “You need to be able to trust and rely on the support of your colleagues to get through those moments. So understanding where folks are coming from, what
Human Element
Welcome to Human Element, a podcast by Ben April, CTO at Maltego, focused on exploring the experiences and perspectives that shape cybersecurity leadership. In each episode, we speak with industry leaders to uncover the challenges they’ve encountered, the pivotal decisions that have influenced their careers, and the human dynamics that continue to shape the cybersecurity landscape beyond the technical domain.