Phillip Wylie Show

Bryson Bort: From Red to Purple: The Evolution of Cybersecurity


Listen Later

About the Guest:

Bryson Bort is a recognized information security expert, founder, and entrepreneur with extensive experience in the cybersecurity field. Bryson is the founder and CEO of Scythe, a cybersecurity company known for creating a platform that enables security teams to build and emulate real-world adversarial campaigns in a safe manner. He has a rich background, having grown up in Germany and the Soviet Union, and served at West Point and as an officer in the Army and Signal Corps. Bryson is also known for his work in defense and intelligence, and he's a prominent figure for his contributions to the information security community. Additionally, he co-founded a nonprofit called the ICS Village dedicated to education and advocacy for critical infrastructure security.

In this thought-provoking episode of "The Philip Wylie Show," the host Phillip Wylie dives into an in-depth conversation with cybersecurity maven Bryson Bort. The audience is welcomed into Bryson's world of entrepreneurship and cybersecurity innovation, with particular emphasis on his journey from military service to founding cutting-edge cybersecurity ventures.

Bryson's impactful narrative charts his transition from his startup Scythe's initial product offering—a platform for creating custom, scalable cyberattack simulations—to driving the cybersecurity industry forward with accessible automated defenses. Bryson shares insights into the psychological barriers in information security, the evolution of cyber threats, and the critical role of post-access attack strategies. Furthermore, the episode shines a light on the operational technology (OT) space, underscoring the pressing need for robust cybersecurity measures amidst crucial infrastructures and the inherent risks of physical harm.

  • Bryson Bort's transition from military service to cybersecurity entrepreneurship highlights the value of real-world offensive security experience in building successful startups.
  • The concept of "Bryson Attack Model" (BAM), which emphasizes the significance of post-access attack phases, reveals limitations in the traditional cybersecurity defenses.
  • The progression from red team tools to a more enterprise-friendly purple teaming approach suggests a shift in cybersecurity practices aiming for collaborative and immediate security enhancements.
  • Industrial Control Systems (ICS) and OT cybersecurity represent a field of critical importance with unique challenges, including the need for balancing safety with potential cyber threats.
  • Bryson Bort discusses the importance of drawing wisdom from cybersecurity's past to inform future defenses, hinting at the release of a detailed paper on developing a true cyber warfare capability.

    • "The first is reconnaissance [...] the second step is I break in. Initial access [...] That's the third phase, the post access." -Bryson Bort
    • "We built our initial platform in C Sharp. No assembly [...] Red team operators aren't developers." -Bryson Bort
    • "I describe being a startup founder as you are the CEO and you're the janitor." -Bryson Bort
    • "Going back to your question earlier, what does the real thing look like? I think that will also give a lot more detail that I'll be comfortable sharing because I'll have time to really think with him through what we're willing to share publicly." -Bryson Bort

    • Socials and Resources:

      https://www.linkedin.com/in/brysonbort/
      https://www.linkedin.com/company/scythe_io/
      https://www.linkedin.com/company/icsvillage/
      https://twitter.com/brysonbort
      https://twitter.com/scythe_io
      https://twitter.com/ICS_Village
      https://scythe.io/


      ...more
      View all episodesView all episodes
      Download on the App Store

      Phillip Wylie ShowBy Phillip Wylie

      • 4.9
      • 4.9
      • 4.9
      • 4.9
      • 4.9

      4.9

      17 ratings


      More shows like Phillip Wylie Show

      View all
      SpyCast by SpyCast

      SpyCast

      1,511 Listeners

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

      366 Listeners

      Hacked by Hacked

      Hacked

      183 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,009 Listeners

      Smashing Security by Graham Cluley & Carole Theriault

      Smashing Security

      312 Listeners

      Click Here by Recorded Future News

      Click Here

      415 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      7,913 Listeners

      Modern Wisdom by Chris Williamson

      Modern Wisdom

      3,815 Listeners

      CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

      CISO Series Podcast

      189 Listeners

      My First Million by Hubspot Media

      My First Million

      2,624 Listeners

      All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

      All-In with Chamath, Jason, Sacks & Friedberg

      9,236 Listeners

      Cyber Security Headlines by CISO Series

      Cyber Security Headlines

      127 Listeners

      Risky Bulletin by risky.biz

      Risky Bulletin

      43 Listeners

      Hacker And The Fed by Chris Tarbell & Hector Monsegur

      Hacker And The Fed

      167 Listeners

      The Peter Zeihan Podcast Series by Peter Zeihan

      The Peter Zeihan Podcast Series

      401 Listeners