Phillip Wylie Show

Bryson Bort: From Red to Purple: The Evolution of Cybersecurity


Listen Later

About the Guest:

Bryson Bort is a recognized information security expert, founder, and entrepreneur with extensive experience in the cybersecurity field. Bryson is the founder and CEO of Scythe, a cybersecurity company known for creating a platform that enables security teams to build and emulate real-world adversarial campaigns in a safe manner. He has a rich background, having grown up in Germany and the Soviet Union, and served at West Point and as an officer in the Army and Signal Corps. Bryson is also known for his work in defense and intelligence, and he's a prominent figure for his contributions to the information security community. Additionally, he co-founded a nonprofit called the ICS Village dedicated to education and advocacy for critical infrastructure security.

In this thought-provoking episode of "The Philip Wylie Show," the host Phillip Wylie dives into an in-depth conversation with cybersecurity maven Bryson Bort. The audience is welcomed into Bryson's world of entrepreneurship and cybersecurity innovation, with particular emphasis on his journey from military service to founding cutting-edge cybersecurity ventures.

Bryson's impactful narrative charts his transition from his startup Scythe's initial product offering—a platform for creating custom, scalable cyberattack simulations—to driving the cybersecurity industry forward with accessible automated defenses. Bryson shares insights into the psychological barriers in information security, the evolution of cyber threats, and the critical role of post-access attack strategies. Furthermore, the episode shines a light on the operational technology (OT) space, underscoring the pressing need for robust cybersecurity measures amidst crucial infrastructures and the inherent risks of physical harm.

  • Bryson Bort's transition from military service to cybersecurity entrepreneurship highlights the value of real-world offensive security experience in building successful startups.
  • The concept of "Bryson Attack Model" (BAM), which emphasizes the significance of post-access attack phases, reveals limitations in the traditional cybersecurity defenses.
  • The progression from red team tools to a more enterprise-friendly purple teaming approach suggests a shift in cybersecurity practices aiming for collaborative and immediate security enhancements.
  • Industrial Control Systems (ICS) and OT cybersecurity represent a field of critical importance with unique challenges, including the need for balancing safety with potential cyber threats.
  • Bryson Bort discusses the importance of drawing wisdom from cybersecurity's past to inform future defenses, hinting at the release of a detailed paper on developing a true cyber warfare capability.

    • "The first is reconnaissance [...] the second step is I break in. Initial access [...] That's the third phase, the post access." -Bryson Bort
    • "We built our initial platform in C Sharp. No assembly [...] Red team operators aren't developers." -Bryson Bort
    • "I describe being a startup founder as you are the CEO and you're the janitor." -Bryson Bort
    • "Going back to your question earlier, what does the real thing look like? I think that will also give a lot more detail that I'll be comfortable sharing because I'll have time to really think with him through what we're willing to share publicly." -Bryson Bort

    • Socials and Resources:

      https://www.linkedin.com/in/brysonbort/
      https://www.linkedin.com/company/scythe_io/
      https://www.linkedin.com/company/icsvillage/
      https://twitter.com/brysonbort
      https://twitter.com/scythe_io
      https://twitter.com/ICS_Village
      https://scythe.io/


      ...more
      View all episodesView all episodes
      Download on the App Store

      Phillip Wylie ShowBy Phillip Wylie

      • 4.9
      • 4.9
      • 4.9
      • 4.9
      • 4.9

      4.9

      18 ratings


      More shows like Phillip Wylie Show

      View all
      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

      369 Listeners

      Risky Business by Patrick Gray

      Risky Business

      374 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      637 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,016 Listeners

      Smashing Security by Graham Cluley

      Smashing Security

      322 Listeners

      Click Here by Recorded Future News

      Click Here

      416 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      8,010 Listeners

      Cybersecurity Today by Jim Love

      Cybersecurity Today

      175 Listeners

      CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

      CISO Series Podcast

      188 Listeners

      Talkin' About [Infosec] News, Powered by Black Hills Information Security by Black Hills Information Security

      Talkin' About [Infosec] News, Powered by Black Hills Information Security

      93 Listeners

      All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

      All-In with Chamath, Jason, Sacks & Friedberg

      9,828 Listeners

      Risky Bulletin by risky.biz

      Risky Bulletin

      44 Listeners

      Hacker And The Fed by Chris Tarbell & Hector Monsegur

      Hacker And The Fed

      168 Listeners

      Critical Thinking - Bug Bounty Podcast by Justin Gardner (Rhynorater) & Joseph Thacker (Rez0)

      Critical Thinking - Bug Bounty Podcast

      55 Listeners

      Simply Offensive by Simply Cyber Media Group

      Simply Offensive

      2 Listeners