4.8 • 1K Ratings
🗓️ 4 May 2021
⏱️ 30 minutes
🧾️ Download transcript
Creating a Grassroots Security Conference: Jack Daniel [ML B-Side]
Click on a timestamp to play from that location
0:00.0 | Hi and welcome to Cyber reasons malicious life. I'm Ran Levy. |
0:22.0 | This episode is a B-side episode, a somewhat shorter interview-based episode which we air in between regular narrative episodes of our show. These B-sides are a place for us to tackle topics |
0:25.8 | which don't really fit the more story-based format of the show and this week's B-ide is somewhat of a Russian Matryushka doll |
0:36.1 | since we'll be talking about Bessides and things that don't really fit with other things. Security B-Sides, or simply B-Sides, is the name given to a series |
0:48.1 | of events, security conferences, which started in 2009. |
0:54.0 | On their website, B-Sides defined themselves as, |
0:57.0 | quote, the first grassroots DIY Open Security Conference in the World. |
1:03.0 | End quote. |
1:04.0 | And in this episode, we'll hear Eliad Kimchi, our producer, |
1:08.1 | talking to Jack Daniel, one of the founders of Security BicidesSides about how B-Sides came to be. |
1:15.7 | From a small and somewhat improvised event in a rented house in Las Vegas |
1:21.3 | to more than 650 events in 50 countries around the world. |
1:26.4 | We'll hear about Jack's unusual origin story as a car mechanic turned security engineer and security besides origin as a conference that was born out of the needs of the community as opposed to the needs of the |
1:41.0 | businesses and organizations. |
1:43.4 | Who knows, it might even encourage you to organize your own local get-together, |
1:48.8 | whether as a security B-sidesides event or something completely different. |
1:55.2 | As a side note, you'll hear Jack mention HD Moore, who took part in one of the earliest |
2:00.9 | B-Sides' events. |
2:02.7 | More, in case you haven't heard the name yet, |
2:05.3 | is the creator of the Metasploit framework |
2:08.6 | and is one of the most well-known white hat hackers around. More is a great example of the kind of success stories |
2:16.4 | that can grow from a security-based event such as security besides. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from Malicious Life, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of Malicious Life and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.