Talk With an Expert

Blueprint Podcast

Arm yourself with the most valuable and actionable content for advancing cyber defense skills. Hear from some truly interesting people changing the game in the blue teaming field, and ultimately learn actionable ways to take your cyber defense skills to the next level.

Leading by Example: Confidence and Responsibility in Cybersecurity with Zak Stufflebeam | 61

In this episode, John sits down with Zak Stufflebeam, Director of Cybersecurity at a publicly traded insurance company, to discuss his unique journey in the field.

PodcastBlueprint
Blueprint
  • 2025-08-19
  • John Hubbard
  • Season 5
Listen now

Redefining Security Operations: Lessons in AI Integration with James Spiteri | 60

In this episode, John sits down with James Spiteri from Elastic to explore the transformative power of AI on the SOC.

PodcastBlueprint
Blueprint
  • 2025-06-12
  • John Hubbard
  • Season 5
Listen now

From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec | 59

Rich Greene, SANS author/instructor and former U.S. Army Green Beret, shares his journey from military service to cybersecurity. He breaks down why fundamentals and communication matter, while dispelling common myths about entering the field.

PodcastBlueprint
Blueprint
  • 2025-04-09
  • John Hubbard
  • Season 5
Listen now

SOC Dashboards Done Right with Ryan Thompson | 58

Ryan Thompson shares how to build dashboards that detect real threats—not just look good. Learn why most SOC dashboards fail and how to design them for true detection.

PodcastBlueprint
Blueprint
  • 2025-02-18
  • John Hubbard
  • Season 5
Listen now

Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard | 57

Start the new year with a mini solo episode on achieving your 2025 goals. I share my personal productivity system, favorite book recs, and tips to stay focused on what matters most.

PodcastBlueprint
Blueprint
  • 2025-01-01
  • John Hubbard
  • Season 5
Listen now

How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud | 55

Mark Morowczynski returns for his 4th(!) time with his Microsoft coworker and identity and authentication expert Tarek Dawoud in this incredibly insightful conversation on the what, why, and how of phishing resistant credentials that YOU can implement right now.

PodcastBlueprint
Blueprint
  • 2024-12-05
  • John Hubbard
Listen now

How GenAI is Changing Your SOC for the Better with Seth Misenar | 54

In this mega-discussion with Seth Misenar on GenAI and LLM usage for security operations we cover some very interesting topics, such as the unique capabilities GenAI affords to those working in security operations, the importance of natural language processing, and much more.

PodcastBlueprint
Blueprint
  • 2024-10-09
  • John Hubbard
Listen now

From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin | 53

In this episode, we take you behind the scenes of a complex gift card fraud investigation. Join host John Hubbard and guest Mark Jeanmougin as they explore the intricate details of uncovering and combating a clever case of cyber fraud. In this episode Mark discusses how the incident was identified, investigated, contained, and what lessons were learned along the way.

PodcastBlueprint
Blueprint
  • 2024-10-08
  • John Hubbard
Listen now

Bonus Episode: What does it take to author a cybersecurity book?

Have you ever wondered what it takes to write and publish an information security book? In this special bonus episode following season 4, John discusses with Kathryn, Ingrid, and Carson the challenges and rewards of self-publishing, and the kind of effort that goes into producing a book like "11 Strategies of a World-Class Cybersecurity Operations Center".

PodcastBlueprint
Blueprint
  • 2023-08-03
  • John Hubbard
Listen now

Strategy 11: Turn up the Volume by Expanding SOC Functionality | 50

This final chapter of the book is no simple closer! "Turn Up the Volume by Expanding SOC Functionality" covers testing that your SOC is functioning as intended through activities such as Threat Hunting, Red and Purple Teaming, Adversary Emulation, Breach and Attack Simulation, tabletop exercises and more. There's even a discussion of cyber deception types and tactics, and how it can be used to further frustrate attackers. Join John, Kathryn, Ingrid, and Carson in this final chapter episode for some not to be missed tips!

PodcastBlueprint
Blueprint
  • 2023-07-18
  • John Hubbard
Listen now

Strategy 10: Measure Performance to Improve Performance | 49

Metrics, is there any more confusing and contentious topic in cybersecurity? In this episode the authors cover their advice and approach to measuring your team so that issues can be quickly identified and performance can continuously improve!

PodcastBlueprint
Blueprint
  • 2023-07-10
  • John Hubbard
Listen now

Strategy 9: Communicate Clearly, Collaborate Often, Share Generously | 48

Research has shown that communication is one of the most important factors for success in security incident response teams. In this chapter, the authors discuss the critical types of information that must be shared within the SOC, with the constituency, and with the greater cybersecurity community.

PodcastBlueprint
Blueprint
  • 2023-07-05
  • John Hubbard
Listen now