
Insights from recent episode analysis
Audience Interest
Podcast Focus
Publishing Consistency
Platform Reach
Insights are generated by CastFox AI using publicly available data, episode content, and proprietary models.
Most discussed topics
Brands & references
Total monthly reach
Estimated from 3 chart positions in 3 markets.
By chart position
- 🇨🇴CO · Technology#803K to 10K
- 🇳🇿NZ · Technology#131500 to 3K
- 🇮🇪IE · Technology#168500 to 3K
- Per-Episode Audience
Est. listeners per new episode within ~30 days
2K to 8K🎙 Weekly cadence·64 episodes·Last published 3mo ago - Monthly Reach
Unique listeners across all episodes (30 days)
4K to 16K🇨🇴63%🇳🇿19%🇮🇪19% - Active Followers
Loyal subscribers who consistently listen
1.2K to 4.8K
Market Insights
Platform Distribution
Reach across major podcast platforms, updated hourly
Total Followers
—
Total Plays
—
Total Reviews
—
* Data sourced directly from platform APIs and aggregated hourly across all major podcast directories.
On the show
From 10 epsHost
Recent guests
Recent episodes
The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle
Feb 9, 2026
48m 55s
Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam
Jan 5, 2026
1h 36m 37s
Leading by Example: Confidence and Responsibility in Cybersecurity with Zak Stufflebeam
Aug 19, 2025
1h 06m 23s
From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard
Jun 27, 2025
52m 21s
Redefining Security Operations: Lessons in AI Integration with James Spiteri
Jun 12, 2025
1h 06m 46s
Social Links & Contact
Official channels & resources
Official Website
Login
RSS Feed
Login
| Date | Episode | Topics | Guests | Brands | Places | Keywords | Sponsor | Length | |
|---|---|---|---|---|---|---|---|---|---|
| 2/9/26 | ![]() The 2 AM Call: A Ransomware Negotiator's Playbook with Wade Gettle✨ | ransomwarenegotiation+3 | Wade Gettle | SANS Institute | — | ransomwarenegotiator+3 | — | 48m 55s | |
| 1/5/26 | ![]() Infiltration Alert! How to Catch Fake IT Employees in Your Network with Zak Stufflebeam✨ | cybersecurityIT employees+3 | Zak Stufflebeam | SANS Institute | — | fake IT employeesVPN activity+3 | — | 1h 36m 37s | |
| 8/19/25 | ![]() Leading by Example: Confidence and Responsibility in Cybersecurity with Zak Stufflebeam✨ | leadershipcybersecurity+4 | Zak Stufflebeam | SANS Instituteinsurance company | — | cybersecurityleadership+5 | — | 1h 06m 23s | |
| 6/27/25 | ![]() From the SANS Cyber Leaders Podcast: Fighting Back with John Hubbard✨ | cybersecuritythreat landscape+3 | James LyneCiaran Martin | SANS Cyber Leaders PodcastSANS Institute | — | cybersecurity operationsthreat detection+3 | — | 52m 21s | |
| 6/12/25 | ![]() Redefining Security Operations: Lessons in AI Integration with James Spiteri✨ | AI integrationSecurity Operations Center+3 | James Spiteri | Elastic | — | AISOC+4 | — | 1h 06m 46s | |
| 4/9/25 | ![]() From Special Forces to Cybersecurity: Rich Greene on Communication and Persuasion in Infosec✨ | cybersecuritycommunication+3 | Rich Greene | SANS Institute | United StatesArmy | cyber defensemilitary communication+4 | — | 47m 15s | |
| 2/18/25 | ![]() SOC Dashboards Done Right with Ryan Thompson✨ | SOC dashboardscybersecurity+3 | Ryan Thompson | ElasticAlert Logic+1 | — | SOC dashboardscyber defense+3 | — | 1h 03m 02s | |
| 1/1/25 | ![]() Success Simplified - The 3 Step Process for Hitting Your Career Goals in 2025 with John Hubbard✨ | career goalsproductivity+3 | John Hubbard | — | — | career goalsproductivity tips+3 | — | 29m 58s | |
| 12/2/24 | ![]() How Phishing Resistant Credentials Work with Mark Morowczynski and Tarek Dawoud✨ | phishing resistant credentialsmulti-factor authentication+3 | Mark MorowczynskiTarek Dawoud | Microsoft | — | phishingcredentials+3 | — | 54m 03s | |
| 10/9/24 | ![]() How GenAI is Changing Your SOC for the Better with Seth Misenar✨ | GenAIsecurity operations+5 | Seth Misenar | SANS Institute | — | GenAILLM+6 | — | 1h 35m 04s | |
Want analysis for the episodes below?Free for Pro Submit a request, we'll have your selected episodes analyzed within an hour. Free, at no cost to you, for Pro users. | |||||||||
| 10/9/24 | ![]() From Clues to Containment - Unraveling A Gift Card Fraud Scheme with Mark Jeanmougin | In this episode, we take you behind the scenes of a complex gift card fraud investigation. Join host John Hubbard and guest Mark Jeanmougin as they explore the intricate details of uncovering and combating a clever case of cyber fraud. In this episode Mark discusses how the incident was identified, investigated, contained, and what lessons were learned along the way. Episode Links: - Mark's LinkedIn Profile: https://www.linkedin.com/in/markjx/ - Mark's Teaching Schedule: https://www.sans.org/... | 36m 13s | ||||||
| 8/3/23 | ![]() Bonus Episode: What does it take to author a cybersecurity book? | Have you ever wondered what it takes to write and publish an information security book? In this special bonus episode following season 4, John discusses with Kathryn, Ingrid, and Carson the challenges and rewards of self-publishing, and the kind of effort that goes into producing a book like "11 Strategies of a World-Class Cybersecurity Operations Center". This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber Security Operations ... | 1h 31m 06s | ||||||
| 7/18/23 | ![]() Strategy 11: Turn up the Volume by Expanding SOC Functionality | "This final chapter of the book is no simple closer! "Turn Up the Volume by Expanding SOC Functionality" covers testing that your SOC is functioning as intended through activities such as Threat Hunting, Red and Purple Teaming, Adversary Emulation, Breach and Attack Simulation, tabletop exercises and more. There's even a discussion of cyber deception types and tactics, and how it can be used to further frustrate attackers. Join John, Kathryn, Ingrid, and Carson in this final chapter episode f... | 1h 26m 38s | ||||||
| 7/10/23 | ![]() Strategy 10: Measure Performance to Improve Performance | "Metrics, is there any more confusing and contentious topic in cybersecurity? In this episode the authors cover their advice and approach to measuring your team so that issues can be quickly identified and performance can continuously improve! This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber Security Operations Center. Each episode John will break down a chapter of the book with the book’s authors Kathryn Knerler, Ingrid Par... | 52m 46s | ||||||
| 7/5/23 | ![]() Strategy 9: Communicate Clearly, Collaborate Often, Share Generously | "Research has shown that communication is one of the most important factors for success in security incident response teams. In this chapter, the authors discuss the critical types of information that must be shared within the SOC, with the constituency, and with the greater cybersecurity community. SANS Cyber Defense Discord Invite - sansurl.com/cyber-defense-discord This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber S... | 1h 03m 36s | ||||||
| 6/26/23 | ![]() Strategy 8: Leverage Tools and Support Analyst Workflow | Tool choice can be a make-or-break decision for security analysts, driving whether getting work done is a struggle, or an efficient, stress-free experience. How can we select the right tools for the job? Which tools are most important? Answers to these questions and more are in this week's episode of Blueprint! This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber Security Operations Center. Each episode John will break down a ch... | 1h 25m 38s | ||||||
| 6/22/23 | ![]() Blueprint Live at the SANS Blue Team Summit 2023 | In this special live recording from the SANS Blue Team Summit 2023, Kathryn Knerler, Ingrid Parker, and Carson Zimmerman joined John Hubbard they share their insights and expertise with attendees by answering their pressing questions. From discussing the most effective strategies for building a successful SOC to sharing tips on how to stay ahead of emerging cyber threats, our guests provide invaluable advice for those who work in a security operations center (SOC). If you're looking to take y... | 1h 04m 43s | ||||||
| 6/19/23 | ![]() Strategy 7: Select and Collect the Right Data | There's no denying that the average security team is completely overwhelmed with options for data to collect. With a deluge of endpoint, network, and cloud data sources to collect, how to do we identify and collect the most useful data sources? That's the topic of this episode. Join Kathryn, Ingrid, Carson, and John in this episode for a discussion on tactical data collection that will ensure your team doesn't miss the signs of an impending incident! This special season of the Blueprint Podc... | 1h 03m 16s | ||||||
| 6/12/23 | ![]() Strategy 6: Illuminate Adversaries with Cyber Threat Intelligence | Every security team has limited budget and time, how do you know where to focus? Cyber Threat Intelligence provides those answers! In this episode, Ingrid, Carson and Kathryn describe how we can use CTI to focus our defensive efforts to understand our most likely attacks and attackers and move towards prioritizing what truly matters. This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber Security Operations Center. Each episode Jo... | 57m 45s | ||||||
| 6/5/23 | ![]() Strategy 5: Prioritize Incident Response | No security team is perfect, so in this episode, authors Carson, Ingrid, and Kathryn discuss what it takes to prepare for fast, effective incident response capability. Covering preparation, planning and execution, Strategy 5 will teach your team how to jump into action at the earliest sign of problems. This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber Security Operations Center. Each episode John will break down a chapter of ... | 1h 25m 21s | ||||||
| 5/29/23 | ![]() Strategy 4: Hire AND Grow Quality Staff | In this episode we dive deep on the "People" factor of the SOC. Who should you hire, what skills should you hire for, what backgrounds are most likely to lead to success for your team? We also get into what happens after the hire - training, growth, and supporting your team in their skill and career development. This one is a must-listen for all the managers out there. We're all trying to build the highest skilled, most supportive team with low turnover, and the tips our authors bring to this... | 1h 13m 31s | ||||||
| 5/22/23 | ![]() Strategy 3: Build a SOC Structure to Match Your Organizational Needs | In this episode we discuss how to decide on the right org structure and capabilities of your SOC. This includes questions like tiered vs. tierless models, which capabilities the SOC should focus on, centralized vs. distributed SOCs, outsourcing of duties and staff augmentation considerations, and also where the SOC might sit in the larger chart of your organization. Every SOC needs to be tailored to best meet the mission, and chapter 3 - "Build a SOC Structure to Match Your Organizational Nee... | 1h 12m 00s | ||||||
| 5/15/23 | ![]() Strategy 2: Give the SOC the Authority to Do Its Job | Though a SOC is responsible for protecting your organization's assets, it is not the owner of those systems. If the SOC is not established with a clear charter and authority to act, it may quickly become difficult to be effective. Who should the SOC report to, what should be in a SOC charter, and how can we make these tough decisions? Those are the questions covered in this episode of our special "11 Strategies" season. This episode covers chapter 2 of the book - "Give the SOC the Authority t... | 36m 51s | ||||||
| 5/8/23 | ![]() Strategy 1: Know What You Are Protecting and Why | As the saying goes, "If you don't know where you're going, any road will take you there!" - an approach that is disastrous to a SOC. In order to succeed, the SOC must have a clear understanding of where they are going, how they're going to get there, and why. In this episode of our "11 Strategies" season we discuss chapter 1 of the book - "Know What You're Protecting and Why". Understanding your organization and the environment the SOC must perform in forms the foundation of all security team... | 1h 02m 10s | ||||||
| 5/8/23 | ![]() 11 Strategies of a World-Class Security Operations Center: Fundamentals | Welcome to a brand new season of Blueprint! In this intro episode we discuss "Fundamentals" chapter of the "11 Strategies of a World Class Cybersecurity Operations Center" with the authors. We get into the motivation behind updating the book and why its lessons are more important than ever in 2023. This chapter includes discussion of the functions of a SOC, basics of workflow, CTI and contextual data sources, and why ops tempo and speed is a critical factor in SOC success. This special seaso... | 55m 16s | ||||||
Showing 25 of 64
Sponsor Intelligence
Sign in to see which brands sponsor this podcast, their ad offers, and promo codes.
Chart Positions
3 placements across 3 markets.
Chart Positions
3 placements across 3 markets.















