Phillip Wylie Show

Bryson Bort: From Red to Purple: The Evolution of Cybersecurity


Listen Later

About the Guest:

Bryson Bort is a recognized information security expert, founder, and entrepreneur with extensive experience in the cybersecurity field. Bryson is the founder and CEO of Scythe, a cybersecurity company known for creating a platform that enables security teams to build and emulate real-world adversarial campaigns in a safe manner. He has a rich background, having grown up in Germany and the Soviet Union, and served at West Point and as an officer in the Army and Signal Corps. Bryson is also known for his work in defense and intelligence, and he's a prominent figure for his contributions to the information security community. Additionally, he co-founded a nonprofit called the ICS Village dedicated to education and advocacy for critical infrastructure security.

In this thought-provoking episode of "The Philip Wylie Show," the host Phillip Wylie dives into an in-depth conversation with cybersecurity maven Bryson Bort. The audience is welcomed into Bryson's world of entrepreneurship and cybersecurity innovation, with particular emphasis on his journey from military service to founding cutting-edge cybersecurity ventures.

Bryson's impactful narrative charts his transition from his startup Scythe's initial product offering—a platform for creating custom, scalable cyberattack simulations—to driving the cybersecurity industry forward with accessible automated defenses. Bryson shares insights into the psychological barriers in information security, the evolution of cyber threats, and the critical role of post-access attack strategies. Furthermore, the episode shines a light on the operational technology (OT) space, underscoring the pressing need for robust cybersecurity measures amidst crucial infrastructures and the inherent risks of physical harm.

  • Bryson Bort's transition from military service to cybersecurity entrepreneurship highlights the value of real-world offensive security experience in building successful startups.
  • The concept of "Bryson Attack Model" (BAM), which emphasizes the significance of post-access attack phases, reveals limitations in the traditional cybersecurity defenses.
  • The progression from red team tools to a more enterprise-friendly purple teaming approach suggests a shift in cybersecurity practices aiming for collaborative and immediate security enhancements.
  • Industrial Control Systems (ICS) and OT cybersecurity represent a field of critical importance with unique challenges, including the need for balancing safety with potential cyber threats.
  • Bryson Bort discusses the importance of drawing wisdom from cybersecurity's past to inform future defenses, hinting at the release of a detailed paper on developing a true cyber warfare capability.

    • "The first is reconnaissance [...] the second step is I break in. Initial access [...] That's the third phase, the post access." -Bryson Bort
    • "We built our initial platform in C Sharp. No assembly [...] Red team operators aren't developers." -Bryson Bort
    • "I describe being a startup founder as you are the CEO and you're the janitor." -Bryson Bort
    • "Going back to your question earlier, what does the real thing look like? I think that will also give a lot more detail that I'll be comfortable sharing because I'll have time to really think with him through what we're willing to share publicly." -Bryson Bort

    • Socials and Resources:

      https://www.linkedin.com/in/brysonbort/
      https://www.linkedin.com/company/scythe_io/
      https://www.linkedin.com/company/icsvillage/
      https://twitter.com/brysonbort
      https://twitter.com/scythe_io
      https://twitter.com/ICS_Village
      https://scythe.io/


      ...more
      View all episodesView all episodes
      Download on the App Store

      Phillip Wylie ShowBy Phillip Wylie

      • 4.9
      • 4.9
      • 4.9
      • 4.9
      • 4.9

      4.9

      18 ratings


      More shows like Phillip Wylie Show

      View all
      The Social-Engineer Podcast by Social-Engineer, LLC

      The Social-Engineer Podcast

      150 Listeners

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

      Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

      373 Listeners

      Risky Business by Patrick Gray

      Risky Business

      374 Listeners

      Down the Security Rabbithole Podcast (DtSR) by Rafal (Wh1t3Rabbit) Los

      Down the Security Rabbithole Podcast (DtSR)

      97 Listeners

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

      SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

      653 Listeners

      CyberWire Daily by N2K Networks

      CyberWire Daily

      1,022 Listeners

      Click Here by Recorded Future News

      Click Here

      418 Listeners

      Cleared Hot by Andy Stumpf

      Cleared Hot

      10,933 Listeners

      Darknet Diaries by Jack Rhysider

      Darknet Diaries

      8,039 Listeners

      Talkin' Bout [Infosec] News by Black Hills Information Security

      Talkin' Bout [Infosec] News

      92 Listeners

      All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

      All-In with Chamath, Jason, Sacks & Friedberg

      9,927 Listeners

      The Jack Carr Channel by Jack Carr

      The Jack Carr Channel

      53 Listeners

      Risky Bulletin by risky.biz

      Risky Bulletin

      44 Listeners

      Simply Defensive by Simply Cyber Media Group

      Simply Defensive

      2 Listeners

      Simply Offensive by Simply Cyber Media Group

      Simply Offensive

      3 Listeners