What is a hunt, and how does it scale across tens of thousands
How does GRR "hide" from malware?
How does GRR keep some of the great power it has from being
Automating and integrating GRR with external sources and
Features, functions, capabilities and some magic from Greg
The future features, requests, and direction of GRR
Greg Castle- Greg has 10 years
experience working in computer security. In his current role as
Senior Security Engineer at Google, he is a developer and user of
the open-source GRR live-forensics system. He also has strong
interest and involvement in OS X security, having been responsible
for the security of Google's OS X fleet for two years. His
pre-Google job roles have included pentester, incident responder,
and forensic analyst.
Take a step outside the echo chamber - gain some perspective and context.
Welcome to Cybersecurity: An immature industry where we mandate impossible-to-remember complex passwords that change every 30 days - and call that security. It's an industry where everyone is an expert, but no one's actually solved anything... weird right?
This show is focused on the many aspects of cybersecurity - from professional to leadership, technical to abstract. We look to entertain you while filling your brain with expertise and knowledge from all corners of our industry and beyond. You can expect security experts, policy professionals, and people from outside our own "security bubble" because frankly, our echo chamber needs some perspective.
Join us, subscribe, and share in the conversation.
Follow us on Twitter: @DtSR_Podcast
Check out Rafal's @Medium blog at https://medium.com/@BlogWh1t3Rabbit