OneCon Logo Don’t miss OneCon23! SentinelOne’s Customer Conference. Register Now
Don’t miss OneCon23! SentinelOne’s Customer Conference.
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
S1 Logo Color Light S1 Logo Color
Platform
  • Platform Overview
    • Singularity Platform Welcome to Integrated
      Enterprise Security
    • Singularity XDR Native & Open Protection,
      Detection, and Response
    • XDR Ingestion One Home for All
      Security Data
    • How It Works The Singularity XDR Difference
    • Singularity Marketplace One-Click Integrations to Unlock the Power of XDR
  • Surfaces
    • Endpoint Autonomous Prevention, Detection, and Response
    • Cloud Autonomous Runtime Protection for Workloads
    • Identity Autonomous Identity & Credential Protection
  • Platform Packages
    • Singularity Complete The Standard for Enterprise Cybersecurity
    • Singularity Control Organization-Wide
      Protection and Control
    • Singularity Core Cloud-Native NGAV
    • Package Comparison Our Platform at a Glance
  • Platform Products
    • Singularity Cloud Container, VM, and Server Workload Security
    • Singularity Mobile Mobile Threat Defense
    • Singularity Cloud Data Security AI-Powered Threat Detection
    • Singularity RemoteOps Orchestrate Forensics at Scale
    • Singularity Identity Identity Threat Detection
      and Response
    • Singularity CloudFunnel Cloud-to-Cloud Telemetry Streaming
    • Singularity Ranger AD Active Directory Attack Surface Reduction
    • Singularity BinaryVault Automatic File Sample Collection
    • Singularity Ranger Rogue Asset Discovery
    • Singularity Hologram Deception Protection
Why SentinelOne?
  • Why SentinelOne?
    • Why SentinelOne? Cybersecurity Built
      for What’s Next
    • Our Customers Trusted by the World’s Leading Enterprises
    • Industry Recognition Tested and Proven
      by the Experts
    • About Us The Industry Leader in Autonomous Cybersecurity
  • Compare SentinelOne
    • CrowdStrike Cyber Dependent
      on a Crowd
    • McAfee Pale Performance,
      More Maintenance
    • Microsoft Platform Coverage
      That Compromises
    • Trend Micro The Risk of DevOps Disruption
    • Palo Alto Networks Hard to Deploy,
      Harder to Manage
    • Carbon Black Adapt Only as Quickly
      as Your Block Lists
    • Symantec Security Limited
      to Signatures
  • Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
Services
  • Threat Services
    • Vigilance Respond Pro
      MDR + DFIR
      24x7 MDR with Full-Scale Investigation & Response
    • WatchTower Pro
      Threat Hunting
      Dedicated Hunting & Compromise Assessment
    • Vigilance Respond
      MDR
      Dedicated SOC
      Expertise & Analysis
    • WatchTower
      Threat Hunting
      Hunting for Emerging Threat Campaigns
    Services Overview
  • Support, Deployment, & Health
    • Technical Account Management Customer Success with Personalized Service
    • SentinelOne GO Guided Onboarding & Deployment Advisory
    • SentinelOne University Live and On-Demand Training
    • Support Services Tiered Support Options for Every Organization
    • SentinelOne Community Community Login
Partners
  • Our Network
    • Singularity Marketplace Extend the Power
      of S1 Technology
    • Cyber Risk
      Partners
      Enlist Pro Response
      and Advisory Teams
    • Technology Alliances Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS Hosted in AWS Regions Around the World
    • Channel Partners Deliver the Right
      Solutions, Together
    Program Overview
Resources
  • Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • White Papers
    View All Resources
  • Blog
    • Cyber Response
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog
  • Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
About
  • About SentinelOne
    • About SentinelOne The Industry Leader in Cybersecurity
    • Investor Relations Financial Information & Events
    • SentinelLABS Threat Research for
      the Modern Threat Hunter
    • Careers The Latest Job Opportunities
    • Press & News Company Announcements
    • Cybersecurity Blog The Latest Cybersecurity Threats, News, & More
    • F1 Racing SentinelOne &
      Aston Martin F1 Team
    • FAQ Get Answers to Our Most Frequently Asked Questions
    • DataSet The Live Data Platform
    • S Foundation Securing a Safer Future for All
    • S Ventures Investing in the Next Generation
      of Security and Data
    • Brand SentinelOne Brand Guidelines
en
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
Get a Demo
S1 Logo Color Light S1 Logo Color
Navigation Arrow Left Back
Navigation Close
Platform
  • Platform Overview
    • Singularity Platform Welcome to Integrated
      Enterprise Security
    • Singularity XDR Native & Open Protection,
      Detection, and Response
    • XDR Ingestion One Home for All
      Security Data
    • How It Works The Singularity XDR Difference
    • Singularity Marketplace One-Click Integrations to Unlock the Power of XDR
  • Surfaces
    • Endpoint Autonomous Prevention, Detection, and Response
    • Cloud Autonomous Runtime Protection for Workloads
    • Identity Autonomous Identity & Credential Protection
  • Platform Packages
    • Singularity Complete The Standard for Enterprise Cybersecurity
    • Singularity Control Organization-Wide
      Protection and Control
    • Singularity Core Cloud-Native NGAV
    • Package Comparison Our Platform at a Glance
  • Platform Products
    • Singularity Cloud Container, VM, and Server Workload Security
    • Singularity Mobile Mobile Threat Defense
    • Singularity Cloud Data Security AI-Powered Threat Detection
    • Singularity RemoteOps Orchestrate Forensics at Scale
    • Singularity Identity Identity Threat Detection
      and Response
    • Singularity CloudFunnel Cloud-to-Cloud Telemetry Streaming
    • Singularity Ranger AD Active Directory Attack Surface Reduction
    • Singularity BinaryVault Automatic File Sample Collection
    • Singularity Ranger Rogue Asset Discovery
    • Singularity Hologram Deception Protection
Why SentinelOne?
  • Why SentinelOne?
    • Why SentinelOne? Cybersecurity Built
      for What’s Next
    • Our Customers Trusted by the World’s Leading Enterprises
    • Industry Recognition Tested and Proven
      by the Experts
    • About Us The Industry Leader in Autonomous Cybersecurity
  • Compare SentinelOne
    • CrowdStrike Cyber Dependent
      on a Crowd
    • McAfee Pale Performance,
      More Maintenance
    • Microsoft Platform Coverage
      That Compromises
    • Trend Micro The Risk of DevOps Disruption
    • Palo Alto Networks Hard to Deploy,
      Harder to Manage
    • Carbon Black Adapt Only as Quickly
      as Your Block Lists
    • Symantec Security Limited
      to Signatures
  • Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
Services
  • Threat Services
    • Vigilance Respond Pro
      MDR + DFIR
      24x7 MDR with Full-Scale Investigation & Response
    • WatchTower Pro
      Threat Hunting
      Dedicated Hunting & Compromise Assessment
    • Vigilance Respond
      MDR
      Dedicated SOC
      Expertise & Analysis
    • WatchTower
      Threat Hunting
      Hunting for Emerging Threat Campaigns
    Services Overview
  • Support, Deployment, & Health
    • Technical Account Management Customer Success with Personalized Service
    • SentinelOne GO Guided Onboarding & Deployment Advisory
    • SentinelOne University Live and On-Demand Training
    • Support Services Tiered Support Options for Every Organization
    • SentinelOne Community Community Login
Partners
  • Our Network
    • Singularity Marketplace Extend the Power
      of S1 Technology
    • Cyber Risk
      Partners
      Enlist Pro Response
      and Advisory Teams
    • Technology Alliances Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS Hosted in AWS Regions Around the World
    • Channel Partners Deliver the Right
      Solutions, Together
    Program Overview
Resources
  • Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • White Papers
    View All Resources
  • Blog
    • Cyber Response
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog
  • Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
About
  • About SentinelOne
    • About SentinelOne The Industry Leader in Cybersecurity
    • Investor Relations Financial Information & Events
    • SentinelLABS Threat Research for
      the Modern Threat Hunter
    • Careers The Latest Job Opportunities
    • Press & News Company Announcements
    • Cybersecurity Blog The Latest Cybersecurity Threats, News, & More
    • F1 Racing SentinelOne &
      Aston Martin F1 Team
    • FAQ Get Answers to Our Most Frequently Asked Questions
    • DataSet The Live Data Platform
    • S Foundation Securing a Safer Future for All
    • S Ventures Investing in the Next Generation
      of Security and Data
    • Brand SentinelOne Brand Guidelines
Get a Demo
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
Experiencing a Breach?
  • 1-855-868-3733
  • Contact
  • Cybersecurity Blog
HACKchat Horizontal RGB WHT 2

Watch conversations with real-life community leaders who are transforming the industry. You can watch live episodes here as well as past episodes. Sign up for email alerts and you'll be reminded about upcoming interviews.


See Leaders

Get Notified!

Check your inbox!

Don’t forget to visit our SentinelLabs website!

Season Three

07/01/21 @ 10:00 AM PDT

Maggie Jauregui

Firmware Security & Mastering Deep Work

Learn More Cta Left Left White
07/08/21 @ 10:00 AM PDT

Tia Hopkins

Being a Tinkerer & Staying Focused On Your North Star

Learn More Cta Left Left White
07/15/21 @ 10:00 AM PDT

Shira Cohen

Threat Hunting by Day, Opera Singer by Night

Learn More Cta Left Left White
07/22/21 @ 10:00 AM PDT

Noushin Shabab

GReAt Security Research

Learn More Cta Left Left White
07/29/21 @ 10:00 AM PDT

Alexandria San Miguel

Next Stop CISO

Learn More Cta Left Left White
08/12/21 @ 10:00 AM PDT

Noelle Murata

So You Want To Start a Security Conference

Learn More Cta Left Left White
Marco 1

Meet Your Host

Marco Figueroa

Marco Figueroa is a Principal Threat Researcher at SentinelLabs whose technical expertise includes reverse engineering, incident handling, threat intelligence, and APT hunting. Previously, Marco spent the last 7 years at Intel as a Sr. Security Researcher.

Maggie Jauregui

Firmware Security & Mastering Deep Work


Maggie Jauregui is an offensive security researcher at Intel’s PSG team, Maggie was a firmware security researcher for Intel's Platform Armoring and Resiliency (PAR) team that focused on UEFI security. Maggie is focused on hardware and firmware security and has presented at conferences such as DEF CON, CanSecWest, DerbyCon, OSFC, and UEFI Plugfest.

In this episode of Hack-Chat, we discuss what it takes to become a security researcher and tackling deep technical work. We also discuss how to maximize your productivity and stop procrastinating with various techniques.

Watch The Episode

Tia Hopkins

Being a Tinkerer & Staying Focused On Your North Star


Tia Hopkins is a Cybersecurity Executive that has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Tia holds two master's degrees in security, a bachelor's in information technology, and several industry certifications. She was recognized by SC Media as a 2019 Reboot Leadership Award recipient in the Outstanding Educator category, as well as The Software Report’s Top 25 Women Leaders in Cybersecurity and Cyber Defense Magazine’s Top 100 Women in Cybersecurity; both in 2020.

In this episode of Hack-Chat Tia discusses how she started in cybersecurity and being a practitioner and discusses her passion for teaching/mentoring.

Watch The Episode

Shira Cohen

Threat Hunting by Day, Opera Singer by Night


Shira Cohen is an experienced Cyber Security Analyst with a demonstrated history of working in the computer and network security industry as well as an Opera Singer.

In this episode of Hack-Chat, Shira explains having a passion for what you do and juggling a dual career in threat hunting and opera. She dives into how she entered cybersecurity and how she had 12 hour days of training at the beginning of her career.

Watch The Episode

Noushin Shabab

GReAt Security Research


Noushin Shabab is a senior security researcher in the Global Research & Analysis Team (GReAT). Her research focuses on investigating advanced cyber criminal activities and targeted attacks with a particular focus on local threats in the Asia Pacific region.

In this episode of Hack-Chat, we dive into how Noushin became passionate about malware while discussing how she approaches her research.

Watch The Episode

Alexandria San Miguel

Next Stop CISO


Alexandria San Miguel is a Motivator, risk-oriented information security professional, skilled in cyber & technology risk, and information security management.

In this episode of Hack-Chat Alexandria, she explains her work ethic, determination, and what it took to get to where she is today. We also discuss her pursuit to one day become a CISO in the near future.

Watch The Episode

Noelle Murata

So You Want To Start a Security Conference


Noelle Murata has held positions in network and systems administration, enterprise technical support, quality assurance, technical writing, and project/program management. Noelle has an extremely diverse background and lends her the ability to learn new things quickly and be pragmatic in context.

In this episode of Hack-Chat, we go into the importance of the Hacker community and what it really takes to start a successful Security Conference on both coasts. She reveals the current state of the conference as well as how the word of mouth spread rapidly to make it a must-attend conference.

Watch The Episode

Season One

HD Moore // The Journey of a Hacker and Entrepreneur

H. D. Moore is a network security expert, open source programmer, and hacker. He is a developer of the Metasploit Framework, the world’s most used penetration testing software suite, and the founder of the Metasploit Project. He has been referred to as “the industry’s most famous white hat hacker,” as well as an overall good dude.

In this episode of Hack Chat, we discuss what it takes to become good at hacking, and delve into his newest business venture—Rumble.

  • 1053375994 300x157 43:00 HD Moore // The Journey of a Hacker and Entrepreneur

    H. D. Moore is a network security expert, open source programmer, and hacker. He is a developer of the Metasploit Framework, the world’s most used penetration testing software suite, and the founder of the Metasploit Project. He has been referred to as “the industry’s most famous white hat hacker,” as well as an overall good dude.

    In this episode of Hack Chat, we discuss what it takes to become good at hacking, and delve into his newest business venture—Rumble.

  • 1071830555 300x157 59:09 JA Guerrero Saade // Hunting for APT’s

    Juan is a Cyber Paleontologist and master storyteller who has published game changing reports like Moonlight Maze, an investigation featured in the spy museum in Washington D.C.. He is formerly of GReAT, Google Chronicle, and the Co-Founder of Stairwell.

    In this episode of Hack Chat, we discuss all things APT, reports that Juan has published in the past, and what it takes to hone your craft to find threat actors.

  • 1094837787 300x157 40:58 Mubix // Keep Asking Questions as a Red Teamer

    Mubix is a Red Teamer who is always looking for a challenge and willing to learn anything to overcome it. Mubix continues to push the limits of his skills, and is one of the most influential people on Twitter discussing everything Red Teaming.

    In this episode of Hack-Chat, we dive into the mindset of learning new tools of the trade and discuss how Mubix continues to elevate his skills.

  • 1094835790 300x157 42:38 Chris Cochran // How To Build Threat Intelligence Programs

    Chris Cochran is a cybersecurity professional, leader, and content creator. Chris has extensive experience building and running strong cybersecurity programs and had a deep history and a passion for security operations, engineering, and leadership.

    In this episode of Hack Chat, we dig deep into the world of threat intelligence and what it takes to demonstrate value to stakeholders.

  • 1094839324 300x157 57:33 Chris Nickerson // The Red Team Grind & Hustle

    Chris Nickerson is an Information Security veteran whose areas of expertise are Red Teaming and Adversarial Modeling. In order to help companies better defend and protect their critical data and key information systems, he has created a blended methodology to assess, implement, and manage information security realistically and effectively.

    In this episode of Hack Chat, we get deep into the work ethic and dedication of Red Teamers. We also discuss the Sunburst supply-chain attack, and get Chris’ perspective into the impact of this attack on Solarwinds and the industry.

  • 1094841078 300x157 35:03 Ronald Eddings // SOARing

    Ronald Eddings is an expert in scaling assets and applications on-prem and in the cloud, and how this can create complexity that leads to misconfigurations and vulnerabilities. As a leader in security architecture, Ronald helps organizations scale security controls while reducing the complexities that analysts and engineers face.

    In this episode of Hack Chat, we cover the importance of DevOps automation and how corporate networks need to begin investing in SOAR.

Season Two

Stok Fredrik | Bug Bounty Hunting Like A Boss

Stok Fredrik is a bug bounty hunter recognized and awarded by: Salesforce, Microsoft, Oath/Verizonmedia, Department of Defense, HackerOne, Dell and many more. STÖK creates educational cybersecurity-related video content for the bug bounty community. Inspiring hackers to level up their BUG BOUNTY game to become better pentesters, bug hunters and redteamers. STÖK also travels the world, hacks some of the most hardened companies out there and vlogs about the bounty life.

In this episode of Hack-Chat we discuss what it takes to become a good bug bounty hunter, we also dive deep on videos he’s created as well as some of the bugs that he looks for in programs.

  • Hack Chat S2E1 300x157 1:08:17 Stok Fredrik | Bug Bounty Hunting Like A Boss

    Stok Fredrik is a bug bounty hunter recognized and awarded by: Salesforce, Microsoft, Oath/Verizonmedia, Department of Defense, HackerOne, Dell and many more. STÖK creates educational cybersecurity-related video content for the bug bounty community. Inspiring hackers to level up their BUG BOUNTY game to become better pentesters, bug hunters and redteamers. STÖK also travels the world, hacks some of the most hardened companies out there and vlogs about the bounty life.

    In this episode of Hack-Chat we discuss what it takes to become a good bug bounty hunter, we also dive deep on videos he’s created as well as some of the bugs that he looks for in programs.

  • Hack Chat S2E2 300x157 45:18 Eva Galperin | Hunting Bad Actors and Eradicating Stalkerware

    Hunting Bad Actors and Eradicating Stalkerware

    Eva Galperin is the Director of Cybersecurity at the EFF and technical advisor for the Freedom of the Press Foundation. She is noted for her extensive work in protecting global privacy and free speech and for her research on malware and nation-state spyware

    In this episode of Hack-Chat Eva discusses how she started in cyber security as well as tracking actors while pitching AV companies to alert users of security threats of stalkerware.

  • Hack Chat S2E3 300x157 1:01:26 Chris Gates | Positivity and Becoming a Red Team Leader

    Chris has extensive experience in network and web application penetration testing as well as other Information Operations experience working as an operator for a DoD Red Team and other Full Scope penetration testing teams (Red Teams).

    In this episode of Hack-Chat we discuss maturing as a red teamer and opportunities manifesting themselves and mental awareness while creating good energy to colleagues and friends.

  • Hack Chat S2E4 300x157 48:10 Runa Sandvik | Passion for Privacy & Threat Intelligence

    Runa Sandvik focuses on defense, contextual mitigations for at-risk groups, and innovative solutions for journalistic security. Her work builds upon experience from her time at The Tor Project, Freedom of the Press Foundation, The New York Times, and working closely with freelancers around the world.

    In this episode of Hack-Chat we dig deep into privacy and Runa’s passion for cyber security and drives her today.

  • Hack Chat S2E5 300x157 53:57 Pedram Amini | Master at Fuzzing and Bootstrapping Companies

    Security researcher, published author, founder, investor, advisor, and hacker of all things. Strong background in reverse engineering and creative problem-solving skills. I’ve presented a variety of research at security conferences such as BlackHat, DefCon, RECon, Ekoparty, Microsoft Bluehat, ShmooCon, ToorCon, Virus Bulletin; and taught numerous sold-out courses on reverse engineering.

    In this episode of Hack-Chat we dive deep into finding bugs, fuzzing and how Pedram started ZDI while also discussing how he’s bootstrapped two companies.

  • Hack Chat S2E6 300x157 1:39:57 Marcus Carey | Keeping it 100

    Marcus Carey is a Navy Cryptologist turned cybersecurity innovator and entrepreneur. He is currently working as an Enterprise Architect in the Office of the CTO at ReliaQuest. He is passionate about creating technology solutions that improve cybersecurity for everyone, while also focusing on creating cloud-based cybersecurity solutions that are low friction and highly effective.

    In this episode of Hack Chat, Marcus joins us to discuss the importance of being yourself, staying true to you, and the difficulties of coming from impoverished neighborhoods while still making your dreams come true through cybersecurity.

Purpose Built to Prevent Tomorrow’s Threats.

Today.

Your most sensitive data lives on the endpoint and in the cloud. Protect what matters most from cyberattacks. Fortify the edges of your network with realtime autonomous protection.
Get a Demo
Company
  • Our Customers
  • Why SentinelOne
  • Platform
  • About
  • Partners
  • Support
  • Careers
  • Legal & Compliance
  • Security & Compliance
  • Contact Us
  • Investor Relations
Resources
  • Blog
  • Labs
  • Hack Chat
  • Press
  • News
  • FAQ
  • Resources
  • Ransomware Anthology
Global Headquarters

444 Castro Street
Suite 400
Mountain View, CA 94041

+1-855-868-3733

[email protected]

Sign Up For Our Newsletter
Thank you! You will now receive our weekly newsletter with all recent blog posts. See you soon!
English
  • English
  • 日本語
  • Deutsch
  • Español
  • Français
  • Italiano
  • Dutch
  • 한국어
©2023 SentinelOne, All Rights Reserved.
Privacy Policy Master Subscription Agreement
Footer Logo
Social Twitter White Social Facebook White Social Linkedin White Social Youtube White