67 episodes

"Conf T with your SE" is a trailblazing podcast designed specifically for the tech-savvy listener. Launched in 2019, it brings together thought leaders, experts, and enthusiasts in the world of technology to spark insightful discussions, share industry trends, and tackle complex technical concepts in an accessible and engaging way.

Hosted by seasoned systems engineer, Bryan Young, the show breaks down the barriers between the intricate world of computer networking and software and the everyday listener. Bryan's knack for simplifying complex concepts, paired with his infectious enthusiasm for the new and disruptive technology makes the podcast a hit among novices and experts alike.

The "Conf T with your SE" podcast dives deep into a wide array of topics, from the nitty-gritty of coding and algorithm design to the larger implications of technology on society. It also covers career guidance, industry trends, the latest research, and interviews with leading figures from tech giants to startup pioneers.

Listeners of "Conf T with your SE" not only gain a deeper understanding of the world of Information Technology but also get a chance to be part of a growing community that's passionate about learning, innovating, and pushing the boundaries of what's possible in tech.

Yet the dialogue doesn't end with the podcast! We invite listeners to join our growing Discord community at https://discord.gg/shgnswpKzw. Here, you can extend the discussions, engage directly with Bryan and other listeners, and even suggest topics for forthcoming episodes. It's a place for learning, debating, networking, and experiencing the thrill of the ever-evolving tech industry.

Whether you're an experienced professional hunting for fresh insights, a student aspiring to carve out a career in the industry, or a tech enthusiast keen to grasp the world of systems engineering, "Conf T with your SE" caters to all. Tune in, participate in the Discord discourse, and be part of this enlightening voyage through the technological landscape!

Conf T with your SE Bryan Young

    • Technology
    • 5.0 • 27 Ratings

"Conf T with your SE" is a trailblazing podcast designed specifically for the tech-savvy listener. Launched in 2019, it brings together thought leaders, experts, and enthusiasts in the world of technology to spark insightful discussions, share industry trends, and tackle complex technical concepts in an accessible and engaging way.

Hosted by seasoned systems engineer, Bryan Young, the show breaks down the barriers between the intricate world of computer networking and software and the everyday listener. Bryan's knack for simplifying complex concepts, paired with his infectious enthusiasm for the new and disruptive technology makes the podcast a hit among novices and experts alike.

The "Conf T with your SE" podcast dives deep into a wide array of topics, from the nitty-gritty of coding and algorithm design to the larger implications of technology on society. It also covers career guidance, industry trends, the latest research, and interviews with leading figures from tech giants to startup pioneers.

Listeners of "Conf T with your SE" not only gain a deeper understanding of the world of Information Technology but also get a chance to be part of a growing community that's passionate about learning, innovating, and pushing the boundaries of what's possible in tech.

Yet the dialogue doesn't end with the podcast! We invite listeners to join our growing Discord community at https://discord.gg/shgnswpKzw. Here, you can extend the discussions, engage directly with Bryan and other listeners, and even suggest topics for forthcoming episodes. It's a place for learning, debating, networking, and experiencing the thrill of the ever-evolving tech industry.

Whether you're an experienced professional hunting for fresh insights, a student aspiring to carve out a career in the industry, or a tech enthusiast keen to grasp the world of systems engineering, "Conf T with your SE" caters to all. Tune in, participate in the Discord discourse, and be part of this enlightening voyage through the technological landscape!

    Ep 65 - Day in the Life of a SOC Analyst

    Ep 65 - Day in the Life of a SOC Analyst

    Summary
     
    This conversation explores the role of a SOC analyst and the challenges they face in the cybersecurity field. It covers the structure and responsibilities of a SOC team, the impact of remote work on communication and collaboration, and the skills required to be a successful SOC analyst. The conversation also delves into the tools and technologies used in a SOC, the career path of a SOC analyst, and the importance of passion and continuous learning in the IT industry. In this conversation, Bryan and Jordan discuss the qualities of a SOC analyst, the challenges and rewards of the job, significant threats and their mitigation, collaboration with other teams, the role of AI in the SOC, future threats such as quantum computing, and advice for aspiring SOC analysts. They also share funny incidents that have occurred in the SOC. Overall, the conversation highlights the importance of continuous learning, effective communication, and a passion for cybersecurity in the SOC role.  



    Takeaways A SOC (Security Operations Center) is responsible for mitigating threats and analyzing network data to identify potential security breaches. Communication and collaboration are crucial skills for SOC analysts, especially in a remote work environment. SOC analysts need to prioritize and manage alerts effectively to differentiate between actual threats and false positives. Key skills for SOC analysts include analytical thinking, programming knowledge, and incident handling. Becoming a SOC analyst typically involves obtaining a degree in cybersecurity and gaining experience through tiered roles within a SOC team. SOC analysts should have a passion for cybersecurity and be coachable and willing to learn. Challenges in the SOC can be mentally taxing, but the job is rewarding when able to identify and mitigate threats. Collaboration with other teams, such as security engineers, is crucial for a cohesive and effective defense. AI can play a role in automating certain aspects of the SOC, such as alerting and response. Future threats, including quantum computing, should be considered and prepared for in the SOC. Aspiring SOC analysts should be open to learning, ask questions, and embrace the challenges of the job.

    • 1 hr 23 min
    Ep 64 - Pen Testing and Remediation

    Ep 64 - Pen Testing and Remediation

    Show Notes for Episode 64: Penetration Testing and Remediation in Cybersecurity Welcome to Episode 64 of our cybersecurity-focused podcast! In this installment, our host Bryan Young is joined by two experts in the field of cyber defense, Megan Scherer and Ryan Wager from Secure Network Technologies. Dive deep with us as we explore the critical roles that penetration testing and remediation play in safeguarding organizations against digital threats.
    Main Themes: The Importance of Penetration Testing: Our guests discuss how penetration tests are crucial for identifying weaknesses in a variety of infrastructural setups, from small businesses to large enterprises.
    Cybersecurity Remediation: Learn about the steps that need to be taken once vulnerabilities are found, and the importance of timely and effective action to protect an organization’s data integrity.
    Awareness of Cyber Risks: Megan and Ryan stress the need for organizations to be fully aware of the potential risks to their clients, suppliers, and internal operations. They also address the unique challenges faced by organizations without specialized IT teams or a Chief Information Security Officer (CISO).
    Internal Collaboration: Drawing parallels with the development issues of the Ford Pinto, the discussion turns to the importance of internal collaboration within organizations to prevent and mitigate security risks.
    Keeping Up with Evolving Threats: The ever-changing landscape of cybersecurity means constant vigilance and updates to security measures are necessary. The episode touches on the possibility of using automation to stay ahead of the game, especially with the emergence of state-sponsored cyber threats.
    Partnership with Driven: Hear about Secure Network Technologies’ partnership with Driven and how it has helped in pinpointing security vulnerabilities.
    Call to Action: Listeners are encouraged to visit the podcast’s website for more information and resources, and to share the episode with others who are interested in cybersecurity.
    Don’t miss this in-depth conversation that could help you better understand and improve your organization’s cyber defenses. Stay safe and stay informed!
    Remember to subscribe and share Episode 64 with your network. Until next time, keep your data secure and your systems checked!
    For additional resources and episode transcripts, please visit our website. If you have questions or topics you’d like us to cover in future episodes, reach out to us through our contact page.

    • 52 min
    Ep 63 - Quantum Computing

    Ep 63 - Quantum Computing

    Episode Summary:
    In this episode, Bryan Young invites Igor Barshteyn to demystify quantum computing and its implications for cybersecurity. They dive into the intricacies of how quantum computing challenges current encryption methods, specifically public key cryptography, and what that means for data security. The discussion pivots around the looming necessity for transition to post-quantum cryptography and the roles that various entities like NIST, NSA, and leading tech companies are playing in this arena.
    Key Points Discussed:
    Quantum computing's impact on current encryption standards. How recorded encrypted data can be at risk in the future with advancements in quantum computing. The urgency and challenges in transitioning to post-quantum cryptography. The roles of NIST and NSA in standardizing new cryptographic measures. The legal and personal implications for CISOs in the wake of cybersecurity breaches. Global efforts towards developing quantum-resistant cryptographic standards. Notable Quotes:
    "Quantum computers can rapidly factor large numbers, breaking the key establishment part of encryption protocols." "The threat of quantum computing on data security is here now due to the ability to capture and store encrypted data for future decryption." "There's a cybersecurity jobs crisis looming with the emergence of quantum computing technology." Resources Mentioned:
    SolarWinds lawsuit article NIST's post-quantum cryptography project Open Quantum Safe project Call to Action:
    For listener questions and feedback: hello@conft.show Join the Conf T Discord community to engage in discussions: https://discord.conft.show Visit the Conf T merch shop: Conf T Merch Closing Thoughts:
    Bryan and Igor emphasize the importance of staying informed and proactive in the face of quantum computing's challenges to cybersecurity. They encourage listeners to audit their encryption protocols and prepare for the inevitable transition to quantum-resistant cryptography.

    • 1 hr 3 min
    Ep 62 - Empowering our Veterans in the Digital Age

    Ep 62 - Empowering our Veterans in the Digital Age

    Show Notes: Episode 62 - Empowering Veterans in the Digital Age
     
    - Guest Introduction:
       - Guests from Tech4Troops, an organization providing free computers and education programs to veterans.
       - Guests share their military backgrounds, highlighting their experiences and challenges.
    - Importance of Supporting Veterans:
       - Conversation emphasizes the significance of supporting veterans and addressing their unique needs.
       - Tech4Troops' mission to bridge the digital divide for veterans is highlighted.
    - Role of Video Games:
       - Guests discuss the positive impact of video games on their lives, aiding in relaxation and camaraderie.
       - Highlight the therapeutic benefits of gaming for veterans.
    - Commitment to Sustainability:
       - Tech4Troops' commitment to sustainability, data destruction, and recycling efforts are discussed.
       - The environmental benefits of e-waste recycling are highlighted.
    - Educating Veterans:
       - Tech4Troops' in-person programs across the US to educate veterans in computer usage are emphasized.
       - The importance of providing education and skills to veterans for their successful transition is discussed.
    - Call to Action:
       - Encourage listeners to donate their electronics to support Tech4Troops' initiatives.
       - Highlight the significance of recycling e-waste for a sustainable future.
       - Express desire for expansion, collaboration with an educational institution, and increased support for veterans nationwide.

    Links
    Tech for Troops - https://techfortroops.org/
    Donate to T4T - https://techfortroops.org/support/donate/
    T4T Discord - https://discord.gg/jkqNAg9bT9
    T4T Twitch - http://twitch.tv/tech4troops

    • 55 min
    Ep 61 - Tales from the De-Crypt

    Ep 61 - Tales from the De-Crypt

    In this Halloween-themed episode, the hosts share several spooky and comical IT horror stories submitted by listeners. One mishap involved a prank wav file being mistakenly played on thousands of households. Another incident recounted a technician's struggle to fix power outages amid a tropical storm. Mistakes like wrong hard drive shipments and accidental data erasure are also shared. 
    The speaker highlights the impact of network configuration errors and the importance of thorough double-checking. Lessons from various IT professionals are shared, including stories about wrong interface deletions, eerie experiences like a basement full of satanic symbols, close calls, and being trapped in an elevator. Other tales involve humorous incidents, near-death experiences, a hacking incident, and dealing with flash floods.
    Data centers with outdated equipment and piles of wires, comical encounters like spilling beer on the boss, and intricate phone system repairs turned lawsuits are discussed. Finally, an intricate cable management disaster resulting in a severe power outage affecting thousands of people is shared. The speaker expresses gratitude, encourages listeners to connect on social media, and emphasizes the need to back up configurations.
    **Links:**
    - Follow Alexis - https://linktr.ee/digital.byte
    - Join the Discord - https://discord.conft.show
    - Driven - https://www.driven.tech
    Thanks for tuning in to Conf T with your SE! If you found this episode informative and entertaining, please consider rating and reviewing our show on your favorite podcast platforms. Your support helps spread the word!

    • 54 min
    Ep 60 - Safeguarding Bytes with Fortinet

    Ep 60 - Safeguarding Bytes with Fortinet

    In this episode of Conf T with your SE, host Bryan Young welcomes special guest Steve Staurovsky from Fortinet. They start by discussing their previous meeting at the CT NUG event and the wide range of products in Fortinet's portfolio. The importance of interoperability and collaboration with other vendors in the industry is highlighted. Steve emphasizes the need for securing operational technology (OT) environments, especially in industrial and healthcare settings, where secure access and data transmission are crucial.
    The conversation then shifts to the challenges of securing and updating machines in the manufacturing industry that are connected to the network but cannot be easily updated due to their age. The speakers stress the importance of keeping these assets online and the difficulties in finding replacements or compatible hardware. They also discuss the lack of interaction between IT and OT, the vulnerabilities created by preventative maintenance schedules and legacy applications, and the increasing sophistication of ransomware attacks. Fortinet's EDR product is mentioned as a solution for securing legacy devices such as old versions of Windows.
    The need for legacy asset support is further emphasized through a story about a critical asset running on an outdated system. Fortinet's ability to run on unsupported assets and provide peace of mind is highlighted. The conversation then moves on to Fortinet's FortiLink feature, which enables traffic routing through the firewall, offering advantages in terms of defense in depth strategy and flexibility. The evolution of FortiGate firewall from separate boxes for different functions to a single integrated solution is discussed, along with the variety of hardware sizes, feature sets, and licensing options available.
    The speakers then delve into the cycle of expansion and contraction in IT, from mainframes and terminals to the current cloud services and multiple clouds. They touch on the increasing need for processing power and how the cloud addresses this demand. The conversation takes a nostalgic turn as they reminisce about gaming, specifically playing Unreal Tournament and attending a LAN party at the Rochester Institute of Technology. Fortinet's free training and certification program, offered during the pandemic, is mentioned, with praise for its high quality and polished production.
    The importance of using correct terminology in the IT industry is emphasized, along with a personal anecdote about using the correct terms with a doctor. The discussion briefly touches on Chromebooks and the speaker's experience with an original CR-48 Chromebook from Google. The speakers stress the significance of understanding and using the correct terminology in IT and networking, highlighting its impact on communication and professionalism. They also mention the benefits of having knowledge in electrical systems within the IT industry.
    The conversation veers towards programming and its integration into networking, mentioning the use of Postman and sharing their experiences with programming tasks. They conclude by briefly mentioning upcoming merchandise related to their podcast and recommending checking out Fortinet's training and certification at training.fortinet.com. The features of FortiGates, including the use of custom ASICs for better performance and lower power requirements, are discussed. The issues with the supply chain and its impact on product availability are touched upon, with an overall optimistic outlook for improvement.
    The cloud management capabilities of Fortinet's products are then explored, with a focus on FortiManager. The speaker explains how FortiManager allows centralized management and logging of devices, making changes and ensuring synchronization across multiple devices easier. The ability to templatize network configurations for scalability and automation is mentioned, along with the advantages of using FortiManager compared to manual device configuration

    • 1 hr 13 min

Customer Reviews

5.0 out of 5
27 Ratings

27 Ratings

kenhagen ,

Journey to CCIE.

I could relate very much to this episode. I also don’t like to say how many attempts I made. :). But it was well worth it and thanks to Chris Pratt for putting it into words so well. Ken Hagen. #56460.

CaddyshackD ,

Technology with pizzazz!

Bryan and Brian do an incredible job of hosting an amazing podcast that gives you credible information, reliable sources, and deliver it to you in a fun conversational way. Whether you’re in or looking to get in the tech industry, a customer or potential customer, or simply want to see how Cisco continues to evolve - this is the podcast for you!

I’d rate it 10 stars if I could!

Longdistance45 ,

Helpful as a new Sales Person

Thanks for this show! I appreciate the more high level explanations being new to sales at Cisco. Trying to learn as much as I can and this a very helpful show

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Dwarkesh Podcast
Dwarkesh Patel
Deep Questions with Cal Newport
Cal Newport
Acquired
Ben Gilbert and David Rosenthal
TED Radio Hour
NPR

You Might Also Like

The Art of Network Engineering
A.J., Andy, Dan, Tim, and Kevin
The Cisco Learning Network
The Cisco Learning Network
Network Break
Packet Pushers
Security Now (Audio)
TWiT
Darknet Diaries
Jack Rhysider
This Week in Tech (Audio)
TWiT