<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/bhis-webcasts" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>BHIS Webcasts</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/bhis-webcasts</itunes:new-feed-url>
    <description>Podcast audio-only versions of weekly webcasts from Black Hills Information Security</description>
    <copyright>© Black Hills Information Security</copyright>
    <podcast:guid>d7087d50-12f3-5e72-af9d-040f7921f47d</podcast:guid>
    <podcast:podroll>
      <podcast:remoteItem feedGuid="7009cf9d-3ce4-5dc6-8ada-5fc1dabb887b" feedUrl="https://feeds.transistor.fm/talkin-bout-infosec-news"/>
      <podcast:remoteItem feedGuid="0543e6d6-b875-52ac-bb17-d2b531254cfe" feedUrl="https://feeds.transistor.fm/ai-security-ops"/>
    </podcast:podroll>
    <podcast:locked>yes</podcast:locked>
    <language>en</language>
    <pubDate>Tue, 24 Mar 2026 00:00:15 -0400</pubDate>
    <lastBuildDate>Sat, 04 Apr 2026 01:06:43 -0400</lastBuildDate>
    <image>
      <url>https://img.transistorcdn.com/oQfWIfNInofOUoUcR7od8EubMDeWhpqfwfCWKE2rL2s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTNh/MGZmODJlNTAxNDll/MzljMzAzMjlkM2M1/ZDI2MS5wbmc.jpg</url>
      <title>BHIS Webcasts</title>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Black Hills Information Security</itunes:author>
    <itunes:image href="https://img.transistorcdn.com/oQfWIfNInofOUoUcR7od8EubMDeWhpqfwfCWKE2rL2s/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85MTNh/MGZmODJlNTAxNDll/MzljMzAzMjlkM2M1/ZDI2MS5wbmc.jpg"/>
    <itunes:summary>Podcast audio-only versions of weekly webcasts from Black Hills Information Security</itunes:summary>
    <itunes:subtitle>Podcast audio-only versions of weekly webcasts from Black Hills Information Security.</itunes:subtitle>
    <itunes:keywords></itunes:keywords>
    <itunes:owner>
      <itunes:name>Black Hills Information Security</itunes:name>
      <itunes:email>marketing@blackhillsinfosec.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Data Loss Prevention (DLP) Survival Guide - Ashley Knowles</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Data Loss Prevention (DLP) Survival Guide - Ashley Knowles</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">99015de1-96e1-4b77-990d-26e23ffa0a5d</guid>
      <link>https://share.transistor.fm/s/d0fa6726</link>
      <description>
        <![CDATA[<p>How quickly could you detect sensitive data being exfiltrated?<br> <br>Join us for a free one-hour BHIS webcast with Ashley Knowles on best practices for data loss prevention and keeping your most sensitive information safe.<br> <br>You’ll learn about common vulnerabilities, real-world scenarios, and practical, actionable strategies to protect the data you’ve been hired to safeguard.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:57) - About Ashley Knowles</li>
<li>(03:26) - Why DLP Shouldn't Terrify You (Too Much)</li>
<li>(08:10) - Understanding Your Data Landscape</li>
<li>(10:23) - Data Classification Framework</li>
<li>(11:49) - Where Does Your Data Live?</li>
<li>(14:24) - Understanding Data Exfiltration</li>
<li>(18:34) - Advanced Exfiltration Methods</li>
<li>(22:20) - The Insider Threat Reality</li>
<li>(24:19) - How to Stop Data Loss: The Basics</li>
<li>(25:51) - Technical Controls That Work</li>
<li>(27:44) - Recommended Layered Approach</li>
<li>(30:56) - Cloud &amp; Modern Workplace Protection</li>
<li>(32:01) - The Purple Team Process</li>
<li>(34:18) - Purple Team Testing: Scenario 1</li>
<li>(36:38) - Purple Team Testing: Scenario 2</li>
<li>(39:13) - Purple Team Testing: Scenario 3</li>
<li>(40:12) - Purple Team Testing: Scenario 4</li>
<li>(40:40) - Purple Team Testing: Scenario 5</li>
<li>(42:03) - Starting Your DLP Journey</li>
<li>(43:50) - Key Takeaways &amp; Action Items</li>
<li>(44:16) - Questions &amp; Resources</li>
<li>(55:59) - The "What it's like to work with Black Hills Information Security" segment</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ashley-knowles">Ashley Knowles</a> - Guest</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=5vj9e6B3I0Y" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/d0fa6726/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>How quickly could you detect sensitive data being exfiltrated?<br> <br>Join us for a free one-hour BHIS webcast with Ashley Knowles on best practices for data loss prevention and keeping your most sensitive information safe.<br> <br>You’ll learn about common vulnerabilities, real-world scenarios, and practical, actionable strategies to protect the data you’ve been hired to safeguard.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:57) - About Ashley Knowles</li>
<li>(03:26) - Why DLP Shouldn't Terrify You (Too Much)</li>
<li>(08:10) - Understanding Your Data Landscape</li>
<li>(10:23) - Data Classification Framework</li>
<li>(11:49) - Where Does Your Data Live?</li>
<li>(14:24) - Understanding Data Exfiltration</li>
<li>(18:34) - Advanced Exfiltration Methods</li>
<li>(22:20) - The Insider Threat Reality</li>
<li>(24:19) - How to Stop Data Loss: The Basics</li>
<li>(25:51) - Technical Controls That Work</li>
<li>(27:44) - Recommended Layered Approach</li>
<li>(30:56) - Cloud &amp; Modern Workplace Protection</li>
<li>(32:01) - The Purple Team Process</li>
<li>(34:18) - Purple Team Testing: Scenario 1</li>
<li>(36:38) - Purple Team Testing: Scenario 2</li>
<li>(39:13) - Purple Team Testing: Scenario 3</li>
<li>(40:12) - Purple Team Testing: Scenario 4</li>
<li>(40:40) - Purple Team Testing: Scenario 5</li>
<li>(42:03) - Starting Your DLP Journey</li>
<li>(43:50) - Key Takeaways &amp; Action Items</li>
<li>(44:16) - Questions &amp; Resources</li>
<li>(55:59) - The "What it's like to work with Black Hills Information Security" segment</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ashley-knowles">Ashley Knowles</a> - Guest</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=5vj9e6B3I0Y" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/d0fa6726/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Feb 2026 11:16:33 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/d0fa6726/65f2bd80.mp3" length="69354945" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/wg1T6pg8cCI_RosB2vYwj6-3Q-oJx4Q7ftW2TUYD_xc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85OTdh/MTkxMWFkZmFlZWEw/OGM1OGI4MzJlOTYy/NDFiNy5wbmc.jpg"/>
      <itunes:duration>4160</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>How quickly could you detect sensitive data being exfiltrated?<br> <br>Join us for a free one-hour BHIS webcast with Ashley Knowles on best practices for data loss prevention and keeping your most sensitive information safe.<br> <br>You’ll learn about common vulnerabilities, real-world scenarios, and practical, actionable strategies to protect the data you’ve been hired to safeguard.</p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/02/SLIDES_Data-Loss-Protection-Survival-Guide.pdf</a></p><p><br><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro</li>
<li>(02:57) - About Ashley Knowles</li>
<li>(03:26) - Why DLP Shouldn't Terrify You (Too Much)</li>
<li>(08:10) - Understanding Your Data Landscape</li>
<li>(10:23) - Data Classification Framework</li>
<li>(11:49) - Where Does Your Data Live?</li>
<li>(14:24) - Understanding Data Exfiltration</li>
<li>(18:34) - Advanced Exfiltration Methods</li>
<li>(22:20) - The Insider Threat Reality</li>
<li>(24:19) - How to Stop Data Loss: The Basics</li>
<li>(25:51) - Technical Controls That Work</li>
<li>(27:44) - Recommended Layered Approach</li>
<li>(30:56) - Cloud &amp; Modern Workplace Protection</li>
<li>(32:01) - The Purple Team Process</li>
<li>(34:18) - Purple Team Testing: Scenario 1</li>
<li>(36:38) - Purple Team Testing: Scenario 2</li>
<li>(39:13) - Purple Team Testing: Scenario 3</li>
<li>(40:12) - Purple Team Testing: Scenario 4</li>
<li>(40:40) - Purple Team Testing: Scenario 5</li>
<li>(42:03) - Starting Your DLP Journey</li>
<li>(43:50) - Key Takeaways &amp; Action Items</li>
<li>(44:16) - Questions &amp; Resources</li>
<li>(55:59) - The "What it's like to work with Black Hills Information Security" segment</li>
</ul><br><strong><strong>Creators &amp; Guests</strong>
<ul>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/jason-blanchard">Jason Blanchard</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ryan-poirier">Ryan Poirier</a> - Producer</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/deb-wigley">Deb Wigley</a> - Host</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand">Bryan Strand</a> - Guest</li>
  <li><a href="https://bhispodcasts-webcasts.transistor.fm/people/ashley-knowles">Ashley Knowles</a> - Guest</li>
</ul></strong><p><strong>Chat with your fellow attendees in the BHIS Discord server:</strong><br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com/">https://poweredbybhis.com</a></p><p><strong><a href="https://www.youtube.com/watch?v=5vj9e6B3I0Y" title="Click here to watch a video of this episode.">Click here to watch a video of this episode.</a><br>
</strong></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com/">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com/">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com/">https://wildwesthackinfest.com</a></p><p><a href="https://share.transistor.fm/s/d0fa6726/transcript" title="Click here to view the episode transcript.">Click here to view the episode transcript.</a><br>
</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand" img="https://img.transistorcdn.com/eStU88KNcCYeBF7vHPfDc5tBToOrcofdWVGkNUhU61Y/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDIw/OWZlZGI2NDZkOGQ0/ZTY1YjhjODI5NGZj/ZjkyMi5qcGc.jpg">Bryan Strand</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/ashley-knowles/" img="https://img.transistorcdn.com/5kO2dt1bzuEW3f6YVkHAwpqQH4qE41noK503hAbe-fA/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85YzVi/MTE4YzY5ZWU0MzEy/NWI1ZTI5ODk4YmNh/YmIzZS5qcGc.jpg">Ashley Knowles</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/d0fa6726/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/d0fa6726/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Simplify Pentest Workflows Using Cerno - Chris Traynor</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Simplify Pentest Workflows Using Cerno - Chris Traynor</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eb2f0248-f2f5-4666-a636-18c2dd1c5c83</guid>
      <link>https://share.transistor.fm/s/a77039a3</link>
      <description>
        <![CDATA[<p>Are you reviewing findings or managing chaos?</p><p><strong> 🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf</a></p><p><strong>✏️ Learn from Chris Traynor with Offensive Tooling for Operators</strong><br><a href="https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/">https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/</a></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>If you are a pentester, you have been there. Hundreds of findings. Critical vulns buried in noise. Too many terminal windows, lost context, and manual tracking slowing you down. On offensive work, time is everything, and disorganization wastes it fast.<br> <br>Join us for a free one-hour webcast with Chris Traynor, Security Consultant at Black Hills Infosec, as he introduces Cerno, a new free and open-source tool designed to bring order to pentest findings.<br> <br>Cerno is a Terminal User Interface tool that imports vulnerability data for structured review and validation. Navigate findings with keyboard shortcuts, launch tools with a single keystroke, track progress automatically, extract CVEs, look up related exploits, compare findings across hosts, and follow built-in or custom verification workflows.<br> <br>You'll learn how to use Cerno to organize, review, and validate pentest findings faster, reduce chaos during engagements, and stay efficient under real-world time pressure.<br> <br>Get familiar with Cerno: https://github.com/ridgebackinfosec/cerno</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – Simplify Pentest Workflows Using Cerno w/ Chris Traynor</li>
<li>(06:03) - The Problem</li>
<li>(10:55) - The Solution</li>
<li>(13:14) - Feature Overview</li>
<li>(16:37) - Database-First Design</li>
<li>(17:17) - Module Architecture</li>
<li>(18:11) - Data Flow</li>
<li>(19:02) - Interactive TUI</li>
<li>(21:16) - Severity Filtering</li>
<li>(22:57) - Finding Review</li>
<li>(25:09) - Tool Orchestration - nmap</li>
<li>(27:35) - NetExec &amp; Custom Tools</li>
<li>(28:45) - NetExec DB [Beta]</li>
<li>(30:22) - Host Comparison</li>
<li>(32:40) - Session Persistence</li>
<li>(34:23) - Configuration</li>
<li>(36:22) - Demo Time</li>
<li>(57:38) - Getting Started</li>
<li>(57:49) - Resources</li>
<li>(58:13) - Thank You / Free Labs</li>
<li>(59:58) - CTF challenge</li>
<li>(01:00:23) - Free Survival Guide - Spearphish General Store</li>
<li>(01:00:42) - QA Start</li>
<li>(01:10:16) - Taking Care of Business Related Plugs</li>
</ul><p>Chat with your fellow attendees in the BHIS Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are you reviewing findings or managing chaos?</p><p><strong> 🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf</a></p><p><strong>✏️ Learn from Chris Traynor with Offensive Tooling for Operators</strong><br><a href="https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/">https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/</a></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>If you are a pentester, you have been there. Hundreds of findings. Critical vulns buried in noise. Too many terminal windows, lost context, and manual tracking slowing you down. On offensive work, time is everything, and disorganization wastes it fast.<br> <br>Join us for a free one-hour webcast with Chris Traynor, Security Consultant at Black Hills Infosec, as he introduces Cerno, a new free and open-source tool designed to bring order to pentest findings.<br> <br>Cerno is a Terminal User Interface tool that imports vulnerability data for structured review and validation. Navigate findings with keyboard shortcuts, launch tools with a single keystroke, track progress automatically, extract CVEs, look up related exploits, compare findings across hosts, and follow built-in or custom verification workflows.<br> <br>You'll learn how to use Cerno to organize, review, and validate pentest findings faster, reduce chaos during engagements, and stay efficient under real-world time pressure.<br> <br>Get familiar with Cerno: https://github.com/ridgebackinfosec/cerno</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – Simplify Pentest Workflows Using Cerno w/ Chris Traynor</li>
<li>(06:03) - The Problem</li>
<li>(10:55) - The Solution</li>
<li>(13:14) - Feature Overview</li>
<li>(16:37) - Database-First Design</li>
<li>(17:17) - Module Architecture</li>
<li>(18:11) - Data Flow</li>
<li>(19:02) - Interactive TUI</li>
<li>(21:16) - Severity Filtering</li>
<li>(22:57) - Finding Review</li>
<li>(25:09) - Tool Orchestration - nmap</li>
<li>(27:35) - NetExec &amp; Custom Tools</li>
<li>(28:45) - NetExec DB [Beta]</li>
<li>(30:22) - Host Comparison</li>
<li>(32:40) - Session Persistence</li>
<li>(34:23) - Configuration</li>
<li>(36:22) - Demo Time</li>
<li>(57:38) - Getting Started</li>
<li>(57:49) - Resources</li>
<li>(58:13) - Thank You / Free Labs</li>
<li>(59:58) - CTF challenge</li>
<li>(01:00:23) - Free Survival Guide - Spearphish General Store</li>
<li>(01:00:42) - QA Start</li>
<li>(01:10:16) - Taking Care of Business Related Plugs</li>
</ul><p>Chat with your fellow attendees in the BHIS Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p>]]>
      </content:encoded>
      <pubDate>Sun, 01 Feb 2026 13:43:37 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/a77039a3/a08ec740.mp3" length="82876495" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/60_4UPOpieFBlPyfHUvCs5FrISSDahs7Iy_w59dZnyo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS84NWI3/NjVmMWFhZTBlNzkx/NmZhZDY3ZWRlYWNh/ZGZmMC5wbmc.jpg"/>
      <itunes:duration>4989</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are you reviewing findings or managing chaos?</p><p><strong> 🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Simplify-Pentest-Workflows-Using-Cerno.pdf</a></p><p><strong>✏️ Learn from Chris Traynor with Offensive Tooling for Operators</strong><br><a href="https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/">https://www.antisyphontraining.com/product/offensive-tooling-for-operators-with-chris-traynor/</a></p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong><br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p>If you are a pentester, you have been there. Hundreds of findings. Critical vulns buried in noise. Too many terminal windows, lost context, and manual tracking slowing you down. On offensive work, time is everything, and disorganization wastes it fast.<br> <br>Join us for a free one-hour webcast with Chris Traynor, Security Consultant at Black Hills Infosec, as he introduces Cerno, a new free and open-source tool designed to bring order to pentest findings.<br> <br>Cerno is a Terminal User Interface tool that imports vulnerability data for structured review and validation. Navigate findings with keyboard shortcuts, launch tools with a single keystroke, track progress automatically, extract CVEs, look up related exploits, compare findings across hosts, and follow built-in or custom verification workflows.<br> <br>You'll learn how to use Cerno to organize, review, and validate pentest findings faster, reduce chaos during engagements, and stay efficient under real-world time pressure.<br> <br>Get familiar with Cerno: https://github.com/ridgebackinfosec/cerno</p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro – Simplify Pentest Workflows Using Cerno w/ Chris Traynor</li>
<li>(06:03) - The Problem</li>
<li>(10:55) - The Solution</li>
<li>(13:14) - Feature Overview</li>
<li>(16:37) - Database-First Design</li>
<li>(17:17) - Module Architecture</li>
<li>(18:11) - Data Flow</li>
<li>(19:02) - Interactive TUI</li>
<li>(21:16) - Severity Filtering</li>
<li>(22:57) - Finding Review</li>
<li>(25:09) - Tool Orchestration - nmap</li>
<li>(27:35) - NetExec &amp; Custom Tools</li>
<li>(28:45) - NetExec DB [Beta]</li>
<li>(30:22) - Host Comparison</li>
<li>(32:40) - Session Persistence</li>
<li>(34:23) - Configuration</li>
<li>(36:22) - Demo Time</li>
<li>(57:38) - Getting Started</li>
<li>(57:49) - Resources</li>
<li>(58:13) - Thank You / Free Labs</li>
<li>(59:58) - CTF challenge</li>
<li>(01:00:23) - Free Survival Guide - Spearphish General Store</li>
<li>(01:00:42) - QA Start</li>
<li>(01:10:16) - Taking Care of Business Related Plugs</li>
</ul><p>Chat with your fellow attendees in the BHIS Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/chris-traynor/" img="https://img.transistorcdn.com/e41hK0gZX6Mo2e_Q7g-XN4r-Z6CVt4RtSCvdIs8ZyVU/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNjc3/Zjg5OTc2ZTkxYWM1/NGMxMjgwNDg2MWM0/ZGM4NC5qcGc.jpg">Chris Traynor</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/logan-bender/" img="https://img.transistorcdn.com/xczL51LLwDmuUhN2ak4ko6gFVTcDyfOlMQzIlvyB7Ic/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wNGIw/ZmJjOWM3NDk3MDJh/YjQ2NzcxNjBkNmJk/NDZhNC5qcGc.jpg">Logan Bender</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/a77039a3/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/a77039a3/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Zero to Zeek: Build a Network Sensor Fast and Easy w/ Troy Wojewoda</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Zero to Zeek: Build a Network Sensor Fast and Easy w/ Troy Wojewoda</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82e8e7e4-add8-49e3-a1db-33fad39b4a0a</guid>
      <link>https://share.transistor.fm/s/61a55fcb</link>
      <description>
        <![CDATA[<p>What if world-class network monitoring didn’t require being a Linux expert?</p><p>🛝 Webcast Slides (URL)<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf</a></p><p><br>Join Antisyphon instructor Troy Wojewoda (Black Hills Infosec – Incident Response) for a free one-hour training session on how to standup a Zeek sensor in as little as three commands...maybe four.</p><p>Troy will teach you how to quickly deploy and customize a powerful network visibility sensor without needing Linux expertise. </p><p>You'll learn to adjust log formats, reduce noisy traffic, and tune the sensor for richer, higher-quality event data.</p><p>Don't let Linux be the barrier to outstanding insight into your network.</p><p>Register now and gain the power of Zeek today!<br>Chat with your fellow attendees in the BHIS Discord server:<br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What if world-class network monitoring didn’t require being a Linux expert?</p><p>🛝 Webcast Slides (URL)<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf</a></p><p><br>Join Antisyphon instructor Troy Wojewoda (Black Hills Infosec – Incident Response) for a free one-hour training session on how to standup a Zeek sensor in as little as three commands...maybe four.</p><p>Troy will teach you how to quickly deploy and customize a powerful network visibility sensor without needing Linux expertise. </p><p>You'll learn to adjust log formats, reduce noisy traffic, and tune the sensor for richer, higher-quality event data.</p><p>Don't let Linux be the barrier to outstanding insight into your network.</p><p>Register now and gain the power of Zeek today!<br>Chat with your fellow attendees in the BHIS Discord server:<br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p>]]>
      </content:encoded>
      <pubDate>Sat, 24 Jan 2026 09:50:47 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/61a55fcb/358e4c94.mp3" length="76555087" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/aKNtD0DQqk9gkkI7evqf2HZIKLjonoHx_jyRSVcoTcU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jZjkx/NjEzYmEwMTgxYzRh/YTExZmVjMDBjZjll/ZDVkOC5wbmc.jpg"/>
      <itunes:duration>4595</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>What if world-class network monitoring didn’t require being a Linux expert?</p><p>🛝 Webcast Slides (URL)<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Zero-to-Zeek_TroyWojewoda_2026-01-22.pdf</a></p><p><br>Join Antisyphon instructor Troy Wojewoda (Black Hills Infosec – Incident Response) for a free one-hour training session on how to standup a Zeek sensor in as little as three commands...maybe four.</p><p>Troy will teach you how to quickly deploy and customize a powerful network visibility sensor without needing Linux expertise. </p><p>You'll learn to adjust log formats, reduce noisy traffic, and tune the sensor for richer, higher-quality event data.</p><p>Don't let Linux be the barrier to outstanding insight into your network.</p><p>Register now and gain the power of Zeek today!<br>Chat with your fellow attendees in the BHIS Discord server:<br>https://discord.gg/bhis<br>in the #🔴live-chat channel</p><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – <br><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Producer" href="https://www.blackhillsinfosec.com/team/ryan-poirier/">Ryan Poirier</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/troy-wojewoda/" img="https://img.transistorcdn.com/ZsWQcwvwq47ZVKZnG5C6Bf3uF3oVf0rLwsGmXZy2cjI/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wN2Q1/ZGEzYzU1NGQ5MjJm/YWQ0ZmE1NDBiNzM4/NjllMC5qcGc.jpg">Troy Wojewoda</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/tom-smith/" img="https://img.transistorcdn.com/12nWkYs19paQvHCEIO-1B52mRZINRauVUmtefM4gzrc/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9kM2Jl/NGUzOGUyZjA0MzQ0/N2IxYzljNjU5OTM1/ZTVmMS5qcGc.jpg">Tom Smith</podcast:person>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/">Zach Hill</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/61a55fcb/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/61a55fcb/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Active Directory Attack Path in Action</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Active Directory Attack Path in Action</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6173b064-5acf-4e06-8c01-d71440af6af7</guid>
      <link>https://share.transistor.fm/s/ab1c4609</link>
      <description>
        <![CDATA[<p>Are small Active Directory misconfigurations putting you at risk?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf</a></p><p><strong>Antisyphon Training events featuring Alyssa &amp; Kaitlyn</strong><br><a href="https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn">https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Active Directory Attack Path in Action</li>
<li>(02:06) - Alyssa and Kaitlyn Fun Facts</li>
<li>(02:43) - Webcast Overview</li>
<li>(03:34) - Web Services</li>
<li>(06:20) - Jenkins Env Hunter - Tool by Kent Ickler!</li>
<li>(07:53) - Test Credentials</li>
<li>(08:57) - Username Enumeration</li>
<li>(12:12) - Domain Enumeration</li>
<li>(14:11) - NetExec</li>
<li>(15:12) - BloodHound.py</li>
<li>(16:29) - SharpHound</li>
<li>(17:28) - ADExplorer</li>
<li>(19:30) - Convert Snapshot</li>
<li>(20:07) - BOFHound</li>
<li>(22:46) - Identify Attack Path</li>
<li>(23:55) - Abusing RBCD for Local Priviledge Escalation</li>
<li>(26:43) - Machine Account Quota</li>
<li>(27:40) - Resource-Based Constrained Delegation Expolitation Flow</li>
<li>(30:36) - Create Computer Object</li>
<li>(31:58) - Set Delegation</li>
<li>(33:22) - Delegation Attribute</li>
<li>(33:53) - Select a Target Account</li>
<li>(34:34) - Avoid Protected Users</li>
<li>(35:24) - Get Privileged TGS</li>
<li>(37:07) - Delegation Failure Example</li>
<li>(37:39) - Escalation Success</li>
<li>(39:18) - Dump local Secrets</li>
<li>(40:53) - Domain Admin Compromised</li>
<li>(41:39) - Attack Path Summary</li>
<li>(44:24) - Defensive Considerations</li>
<li>(45:42) - Related Antisyphon Courses</li>
<li>(46:08) - More Resources</li>
<li>(47:27) - Q&amp;A Start</li>
<li>(50:03) - Alternative Path for Attackers</li>
<li>(51:30) - Whats the Assumed Compromize Course like?</li>
<li>(56:27) - Are Extended Test Timelines an advantage?</li>
<li>(57:51) - BHIS "Side Quest" capabilities</li>
<li>(58:55) - BHIS CPT On-Boarding Process</li>
<li>(01:02:29) - Getting the Ball Rolling on Test Assessments</li>
<li>(01:04:22) - The Price of Continous Pen Testing</li>
<li>(01:05:30) - Favorite Things About Customer CPTs</li>
</ul><br>Join Kaitlyn Wimberley and Alyssa Snow (Black Hills Infosec – Continuous Penetration Testers) for a free one-hour webcast where they’ll walk through an example Active Directory attack path, from un-credentialed network access to Domain Administrator.<p>You’ll learn how attackers can escalate from un-credentialed access to Domain Admin, identify common misconfigurations, and understand how small weaknesses can combine to compromise your network.</p><p>Chat with your fellow attendees in the Black Hills Infosec Discord server:<br>https://discord.gg/BHIS<br>in the #🔴live-chat channel.</p><p><br></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Are small Active Directory misconfigurations putting you at risk?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf</a></p><p><strong>Antisyphon Training events featuring Alyssa &amp; Kaitlyn</strong><br><a href="https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn">https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Active Directory Attack Path in Action</li>
<li>(02:06) - Alyssa and Kaitlyn Fun Facts</li>
<li>(02:43) - Webcast Overview</li>
<li>(03:34) - Web Services</li>
<li>(06:20) - Jenkins Env Hunter - Tool by Kent Ickler!</li>
<li>(07:53) - Test Credentials</li>
<li>(08:57) - Username Enumeration</li>
<li>(12:12) - Domain Enumeration</li>
<li>(14:11) - NetExec</li>
<li>(15:12) - BloodHound.py</li>
<li>(16:29) - SharpHound</li>
<li>(17:28) - ADExplorer</li>
<li>(19:30) - Convert Snapshot</li>
<li>(20:07) - BOFHound</li>
<li>(22:46) - Identify Attack Path</li>
<li>(23:55) - Abusing RBCD for Local Priviledge Escalation</li>
<li>(26:43) - Machine Account Quota</li>
<li>(27:40) - Resource-Based Constrained Delegation Expolitation Flow</li>
<li>(30:36) - Create Computer Object</li>
<li>(31:58) - Set Delegation</li>
<li>(33:22) - Delegation Attribute</li>
<li>(33:53) - Select a Target Account</li>
<li>(34:34) - Avoid Protected Users</li>
<li>(35:24) - Get Privileged TGS</li>
<li>(37:07) - Delegation Failure Example</li>
<li>(37:39) - Escalation Success</li>
<li>(39:18) - Dump local Secrets</li>
<li>(40:53) - Domain Admin Compromised</li>
<li>(41:39) - Attack Path Summary</li>
<li>(44:24) - Defensive Considerations</li>
<li>(45:42) - Related Antisyphon Courses</li>
<li>(46:08) - More Resources</li>
<li>(47:27) - Q&amp;A Start</li>
<li>(50:03) - Alternative Path for Attackers</li>
<li>(51:30) - Whats the Assumed Compromize Course like?</li>
<li>(56:27) - Are Extended Test Timelines an advantage?</li>
<li>(57:51) - BHIS "Side Quest" capabilities</li>
<li>(58:55) - BHIS CPT On-Boarding Process</li>
<li>(01:02:29) - Getting the Ball Rolling on Test Assessments</li>
<li>(01:04:22) - The Price of Continous Pen Testing</li>
<li>(01:05:30) - Favorite Things About Customer CPTs</li>
</ul><br>Join Kaitlyn Wimberley and Alyssa Snow (Black Hills Infosec – Continuous Penetration Testers) for a free one-hour webcast where they’ll walk through an example Active Directory attack path, from un-credentialed network access to Domain Administrator.<p>You’ll learn how attackers can escalate from un-credentialed access to Domain Admin, identify common misconfigurations, and understand how small weaknesses can combine to compromise your network.</p><p>Chat with your fellow attendees in the Black Hills Infosec Discord server:<br>https://discord.gg/BHIS<br>in the #🔴live-chat channel.</p><p><br></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 19 Jan 2026 09:00:00 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/ab1c4609/13cdae77.mp3" length="73529362" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/BvoMpsbMv1S8d8rLMhA9r_vnB7j531A0dcpH0Iks99Y/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS80Njk0/MjRjMGI4MDMwOTEw/MDZiOTBlOGVmMTk1/ZGVjNC5wbmc.jpg"/>
      <itunes:duration>4190</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Are small Active Directory misconfigurations putting you at risk?</p><p><strong>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </strong></p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p><strong>🛝 Webcast Slides</strong><br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2026/01/SLIDES_Active-Directory-Attack-Path-in-Action.pdf</a></p><p><strong>Antisyphon Training events featuring Alyssa &amp; Kaitlyn</strong><br><a href="https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn">https://www.antisyphontraining.com/search/Alyssa%20Kaitlyn</a></p><p><strong>Chapters</strong><br></p><ul><li>(00:00) - Intro - Active Directory Attack Path in Action</li>
<li>(02:06) - Alyssa and Kaitlyn Fun Facts</li>
<li>(02:43) - Webcast Overview</li>
<li>(03:34) - Web Services</li>
<li>(06:20) - Jenkins Env Hunter - Tool by Kent Ickler!</li>
<li>(07:53) - Test Credentials</li>
<li>(08:57) - Username Enumeration</li>
<li>(12:12) - Domain Enumeration</li>
<li>(14:11) - NetExec</li>
<li>(15:12) - BloodHound.py</li>
<li>(16:29) - SharpHound</li>
<li>(17:28) - ADExplorer</li>
<li>(19:30) - Convert Snapshot</li>
<li>(20:07) - BOFHound</li>
<li>(22:46) - Identify Attack Path</li>
<li>(23:55) - Abusing RBCD for Local Priviledge Escalation</li>
<li>(26:43) - Machine Account Quota</li>
<li>(27:40) - Resource-Based Constrained Delegation Expolitation Flow</li>
<li>(30:36) - Create Computer Object</li>
<li>(31:58) - Set Delegation</li>
<li>(33:22) - Delegation Attribute</li>
<li>(33:53) - Select a Target Account</li>
<li>(34:34) - Avoid Protected Users</li>
<li>(35:24) - Get Privileged TGS</li>
<li>(37:07) - Delegation Failure Example</li>
<li>(37:39) - Escalation Success</li>
<li>(39:18) - Dump local Secrets</li>
<li>(40:53) - Domain Admin Compromised</li>
<li>(41:39) - Attack Path Summary</li>
<li>(44:24) - Defensive Considerations</li>
<li>(45:42) - Related Antisyphon Courses</li>
<li>(46:08) - More Resources</li>
<li>(47:27) - Q&amp;A Start</li>
<li>(50:03) - Alternative Path for Attackers</li>
<li>(51:30) - Whats the Assumed Compromize Course like?</li>
<li>(56:27) - Are Extended Test Timelines an advantage?</li>
<li>(57:51) - BHIS "Side Quest" capabilities</li>
<li>(58:55) - BHIS CPT On-Boarding Process</li>
<li>(01:02:29) - Getting the Ball Rolling on Test Assessments</li>
<li>(01:04:22) - The Price of Continous Pen Testing</li>
<li>(01:05:30) - Favorite Things About Customer CPTs</li>
</ul><br>Join Kaitlyn Wimberley and Alyssa Snow (Black Hills Infosec – Continuous Penetration Testers) for a free one-hour webcast where they’ll walk through an example Active Directory attack path, from un-credentialed network access to Domain Administrator.<p>You’ll learn how attackers can escalate from un-credentialed access to Domain Admin, identify common misconfigurations, and understand how small weaknesses can combine to compromise your network.</p><p>Chat with your fellow attendees in the Black Hills Infosec Discord server:<br>https://discord.gg/BHIS<br>in the #🔴live-chat channel.</p><p><br></p><p>Brought to you by:</p><p><strong>Black Hills Information Security </strong></p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p><strong>Antisyphon Training</strong></p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p><strong>Active Countermeasures</strong></p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p><strong>Wild West Hackin Fest</strong></p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords></itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://www.antisyphontraining.com/instructor/zach-hill-instructor/">Zach Hill</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/alyssa-snow/" img="https://img.transistorcdn.com/1wfrG-4htAdGokgXyuT8WzrrnKPojGvQ1kkAMbNLrhg/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8wMTEz/M2JmNGI1ZTc5YTk1/NDY4MmQzOGU4OWFk/YTdkMS5qcGVn.jpg">Alyssa Snow</podcast:person>
      <podcast:person role="Guest" href="https://bhispodcasts-webcasts.transistor.fm/people/bryan-strand" img="https://img.transistorcdn.com/eStU88KNcCYeBF7vHPfDc5tBToOrcofdWVGkNUhU61Y/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDIw/OWZlZGI2NDZkOGQ0/ZTY1YjhjODI5NGZj/ZjkyMi5qcGc.jpg">Bryan Strand</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/deb-wigley/" img="https://img.transistorcdn.com/uLIPJ13Qd7GFH4gq2fN9TpmDMc9L99GV-_ESH7gER5E/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9hNzE2/OGUyZjczNTlhMWI1/MGMxZTA4OTg2YzIw/NjFmYS5qcGc.jpg">Deb Wigley</podcast:person>
      <podcast:person role="Guest" href="https://www.blackhillsinfosec.com/team/kaitlyn-wimberley/" img="https://img.transistorcdn.com/l3d4M7122B749mJWRi3ymcYsgZAXctFlYUjMluqivgY/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iMzBj/ZWI2YzhiZDE4OTdl/NzM2N2UzYzZiYWM0/OWI3Ny5qcGVn.jpg">Kaitlyn Wimberley</podcast:person>
      <podcast:person role="Host" href="https://www.blackhillsinfosec.com/team/jason-blanchard/" img="https://img.transistorcdn.com/HnHT5QZb62garUHt_Hq5Oc5blK_QCIr8lsnvfrrgmZM/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS85NGU2/OWQ4YmQ3ZmVjYzQ1/ZDk1MzZjOTIwNDQ2/MGM5ZC5qcGc.jpg">Jason Blanchard</podcast:person>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/ab1c4609/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/ab1c4609/chapters.json" type="application/json+chapters"/>
    </item>
    <item>
      <title>Inside SOC: Triage Smarter, Not Harder w/ Tom DeJong</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Inside SOC: Triage Smarter, Not Harder w/ Tom DeJong</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">15e71739-59da-4f14-9dd8-9e0157143efc</guid>
      <link>https://share.transistor.fm/s/37089631</link>
      <description>
        <![CDATA[<p><strong>Inside SOC: Triage Smarter, Not Harder w/ Tom Dejong</strong></p><p>🛝 Webcast Slides<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf</a></p><p>Could you triage an alert on the spot?<br> <br>Learn why alert triage is a crucial skill for every SOC analyst.<br> <br>Tom will teach you the basics of triage, including alert anatomy, how to separate real threats from noise, and when to escalate or close an alert.<br>You’ll also learn documentation best practices, common mistakes to avoid, and tips for strengthening your soft skills.<br>This webcast is ideal for anyone starting out in a SOC or looking to sharpen their foundational skills.</p><p>Chat with your fellow attendees in the Antisyphon Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p></p><ul><li>(00:00) - Inside SOC: Triage Smarter, Not Harder</li>
<li>(01:31) - About Tom DeJong</li>
<li>(02:41) - Agenda: What We’ll Cover Today</li>
<li>(03:21) - What Is Triage?</li>
<li>(06:37) - Why Triage Matters</li>
<li>(08:01) - The Triage Mindset</li>
<li>(12:47) - Anatomy of an Alert</li>
<li>(17:51) - The Triage Process</li>
<li>(23:21) - Real Threat or Just Noise</li>
<li>(27:21) - Escalate or Close</li>
<li>(32:49) - Common Mistakes to Avoid</li>
<li>(34:49) - Tips for Making the Right Call</li>
<li>(35:37) - Smart Documentation Tips</li>
<li>(39:01) - Basic Documentation Template</li>
<li>(39:47) - Soft Skills That Make a Difference</li>
<li>(44:48) - Managing Alert Fatigue</li>
<li>(50:05) - Live Demo</li>
<li>(56:14) - Rule Logic and Detection Examples</li>
<li>(58:56) - Resources and References</li>
<li>(59:21) - Wrap-Up and Thanks</li>
<li>(01:00:16) - Post Show Banter Q&amp;A</li>
</ul><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Inside SOC: Triage Smarter, Not Harder w/ Tom Dejong</strong></p><p>🛝 Webcast Slides<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf</a></p><p>Could you triage an alert on the spot?<br> <br>Learn why alert triage is a crucial skill for every SOC analyst.<br> <br>Tom will teach you the basics of triage, including alert anatomy, how to separate real threats from noise, and when to escalate or close an alert.<br>You’ll also learn documentation best practices, common mistakes to avoid, and tips for strengthening your soft skills.<br>This webcast is ideal for anyone starting out in a SOC or looking to sharpen their foundational skills.</p><p>Chat with your fellow attendees in the Antisyphon Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p></p><ul><li>(00:00) - Inside SOC: Triage Smarter, Not Harder</li>
<li>(01:31) - About Tom DeJong</li>
<li>(02:41) - Agenda: What We’ll Cover Today</li>
<li>(03:21) - What Is Triage?</li>
<li>(06:37) - Why Triage Matters</li>
<li>(08:01) - The Triage Mindset</li>
<li>(12:47) - Anatomy of an Alert</li>
<li>(17:51) - The Triage Process</li>
<li>(23:21) - Real Threat or Just Noise</li>
<li>(27:21) - Escalate or Close</li>
<li>(32:49) - Common Mistakes to Avoid</li>
<li>(34:49) - Tips for Making the Right Call</li>
<li>(35:37) - Smart Documentation Tips</li>
<li>(39:01) - Basic Documentation Template</li>
<li>(39:47) - Soft Skills That Make a Difference</li>
<li>(44:48) - Managing Alert Fatigue</li>
<li>(50:05) - Live Demo</li>
<li>(56:14) - Rule Logic and Detection Examples</li>
<li>(58:56) - Resources and References</li>
<li>(59:21) - Wrap-Up and Thanks</li>
<li>(01:00:16) - Post Show Banter Q&amp;A</li>
</ul><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Dec 2025 16:40:11 -0500</pubDate>
      <author>Black Hills Information Security</author>
      <enclosure url="https://media.transistor.fm/37089631/037232ef.mp3" length="84219346" type="audio/mpeg"/>
      <itunes:author>Black Hills Information Security</itunes:author>
      <itunes:image href="https://img.transistorcdn.com/KRLDzo3BpKSCVFV5TFaXNEvtrJXMlJ3loIodWiIUyDE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9jOWJh/OWUzMTM3ZDY0ZDBl/MmU3MzE5NGVjYzg0/ZmJjMy5qcGc.jpg"/>
      <itunes:duration>4719</itunes:duration>
      <itunes:summary>
        <![CDATA[<p><strong>Inside SOC: Triage Smarter, Not Harder w/ Tom Dejong</strong></p><p>🛝 Webcast Slides<br><a href="https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf">https://www.blackhillsinfosec.com/wp-content/uploads/2025/12/SLIDES_Inside-SOC-Triage-Smarter-Not-Harder-1.pdf</a></p><p>Could you triage an alert on the spot?<br> <br>Learn why alert triage is a crucial skill for every SOC analyst.<br> <br>Tom will teach you the basics of triage, including alert anatomy, how to separate real threats from noise, and when to escalate or close an alert.<br>You’ll also learn documentation best practices, common mistakes to avoid, and tips for strengthening your soft skills.<br>This webcast is ideal for anyone starting out in a SOC or looking to sharpen their foundational skills.</p><p>Chat with your fellow attendees in the Antisyphon Discord server:<br><a href="https://discord.gg/bhis">https://discord.gg/bhis</a><br>in the #🔴live-chat channel</p><p></p><ul><li>(00:00) - Inside SOC: Triage Smarter, Not Harder</li>
<li>(01:31) - About Tom DeJong</li>
<li>(02:41) - Agenda: What We’ll Cover Today</li>
<li>(03:21) - What Is Triage?</li>
<li>(06:37) - Why Triage Matters</li>
<li>(08:01) - The Triage Mindset</li>
<li>(12:47) - Anatomy of an Alert</li>
<li>(17:51) - The Triage Process</li>
<li>(23:21) - Real Threat or Just Noise</li>
<li>(27:21) - Escalate or Close</li>
<li>(32:49) - Common Mistakes to Avoid</li>
<li>(34:49) - Tips for Making the Right Call</li>
<li>(35:37) - Smart Documentation Tips</li>
<li>(39:01) - Basic Documentation Template</li>
<li>(39:47) - Soft Skills That Make a Difference</li>
<li>(44:48) - Managing Alert Fatigue</li>
<li>(50:05) - Live Demo</li>
<li>(56:14) - Rule Logic and Detection Examples</li>
<li>(58:56) - Resources and References</li>
<li>(59:21) - Wrap-Up and Thanks</li>
<li>(01:00:16) - Post Show Banter Q&amp;A</li>
</ul><p>🔗 Register for FREE Infosec Webcasts, Anti-casts &amp; Summits – </p><p><a href="https://poweredbybhis.com">https://poweredbybhis.com</a></p><p><br></p><p>Brought to you by:</p><p>Black Hills Information Security </p><p><a href="https://www.blackhillsinfosec.com">https://www.blackhillsinfosec.com</a></p><p><br></p><p>Antisyphon Training</p><p><a href="https://www.antisyphontraining.com/">https://www.antisyphontraining.com/</a></p><p><br></p><p>Active Countermeasures</p><p><a href="https://www.activecountermeasures.com">https://www.activecountermeasures.com</a></p><p><br></p><p>Wild West Hackin Fest</p><p><a href="https://wildwesthackinfest.com">https://wildwesthackinfest.com</a></p>]]>
      </itunes:summary>
      <itunes:keywords>Black Hills Information Security,BHIS,webcasts</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.vtt" type="text/vtt" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.srt" type="application/x-subrip" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.json" type="application/json" rel="captions"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription.txt" type="text/plain"/>
      <podcast:transcript url="https://share.transistor.fm/s/37089631/transcription" type="text/html"/>
      <podcast:chapters url="https://share.transistor.fm/s/37089631/chapters.json" type="application/json+chapters"/>
    </item>
  </channel>
</rss>
