All Episodes
Turn Ideas into Code with GitHub Copilot with Carrie Roberts
What if you could build tools, automate tasks, and write real code without ever having called yourself a developer?Join us for a free one-hour training session with in...
The Absolute Truths of Cybersecurity with Doc Blackburn
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.comDANGER AHEAD.In this bold, no-nonsense talk, instructor Doc Blackburn will reveal...
How to Write SOC Tickets That Build Trust and Drive Action w/ Dan Rearden
What does the ideal SOC ticket look like?🛝 Webcast Slides - https://www.antisyphontraining.com/wp-content/uploads/2026/03/How-to-Write-SOC-Tickets-That-Build-Trust-an...
Securing the Cloud in the Age of AI with Andrew Krug
Existential Courage: The Hitchhiker's Guide to Surviving AI in Cloud🛝 Webcast Slides - https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_The-Hitchhik...
How to Detect Malicious Remote Workers w/ James McQuiggan
SummaryCould a nation-state threat actor get hired and stay invisible to your SOC?🛝Webcast Slides-https://www.blackhillsinfosec.com/wp-content/uploads/2026/03/SLIDES_2...
Preparing IR for AI Incidents with Gerard Johansen
Is your Incident Response plan AI ready?Join us for a free one-hour training session with incident management expert and instructor Gerard Johansen, where he'll teach ...
Red Teaming AI: OWASP LLM Top 10 with Brian and Derek
SummaryAre you currently testing your AI systems the same way you test traditional apps?🛝 Webcast Slideshttps://www.antisyphontraining.com/wp-content/uploads/2026/02/A...
Adapting to Active Directory Security Enhancements with Eric Kuehn
SummaryAre your go-to Active Directory attacks quietly failing without you noticing?Join Eric Kuehn, Principal Security Consultant at Secure Ideas, for a free one-hour...
How to Strengthen M365 Exchange Online Configurations with Kevin Klingbile
SummaryWhen was the last time you reviewed the security of your mail flow rules? Join instructor Kevin Klingbile to learn how attackers exploit weak mail flow rules an...
Effective AI for Practical SecOps Workflows w/ Hayden Covington
Which AI workflows are already running in production SOCs right now, and which ones could you implement by next week?🔗 Register for FREE Infosec Webcasts, Anti-casts &...
OSINT Like a Hacker with Mishaal Khan
What if you could uncover secrets hidden in plain sight, weaving together digital breadcrumbs to reveal the untold stories of the online world? Join Mishaal at WWHF Mi...