Episode 216: Cat Self
MITRE ATT&CK is a framework to explain how networks get penetrated and the techniques attackers use to move laterally and attack other devices. What does this mean for Apple devices? How can we best protect Macs and iOS devices? What are the philosophies? In this episode, we’ll chat with an Adversary Engineer at MITRE ATT&CK, Cat Self, who takes us through what MITRE ATT&CK is and what the framework means for administrators.
- Cat Self, Adversary Emulation Engineer, MITRE – @coolestcatiknow
- Tom Bridge, Principal Product Manager, JumpCloud – @tbridge777
- Charles Edge, CTO, Bootstrappers.mn – @cedge318
- Marcus Ransom, Apple Systems Architect, CompNow – @marcusransom
- MITRE ATT&CK Framework
- Attack Navigator
- Hackers (1995)
- The Prodigy
- MAD training
- Haunted West and Harlem Unbound
The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Weldon Dodd, Damien Barrett, Justin Holt, Chad Swarthout, William Smith, Stephen Weinstein, Seb Nash, Dan McLaughlin, Joe Sfarra, Nate Cinal, Jon Brown, Dan Barker, Tim Perfitt, Ashley MacKinlay, Tobias Linder Philippe Daoust, AJ Potrebka, Adam Burg, & Hamlin Krewson
Mac Admins Podcast Community Calendar, Sponsored by Watchman Monitoring
Sponsor the Mac Admins Podcast:
If you’re interested in sponsoring the Mac Admins Podcast, please email firstname.lastname@example.org for more information.
Get the latest about the Mac Admins Podcast, follow us on Twitter! We’re @MacAdmPodcast!
One Reply to “Episode 216: Cat Self”
Do you normalize the audio? The audio levels for the podcast are all over the place. I have found that these settings in a ffmpeg stream are very good. “dynaudnorm=f=200:g=19:p=0.95:m=24:r=0.27:s=0, volume=.95”