Logo
    Search

    Ep 28: Unit 8200

    en-usDecember 15, 2018

    Podcast Summary

    • Israel's Cyber-Security Innovation and InvestmentIsrael's investment in cyber-security technology and innovation, including CyberSpark and Unit 8200, has made it a leader in the field with more scientists and technicians per capita and a higher percentage of online users than the US.

      Israel, a small country in the Middle East, has become a leader in cyber-security due to its high-tech innovation and investment in technology. The country faces constant attacks and needs to stay technologically advanced or risk being taken over. Israel's Iron Dome is an example of using technology to defend the attacks. Israel has more scientists and technicians per capita than the US, a higher smartphone penetration percentage, and a larger percent of people online than the US. CyberSpark is a unique complex that includes several buildings specifically built for cyber-security companies, a university, and the Israeli Computer Emergency Readiness Team. Israel's intelligence-collection agency, Unit 8200, is located in this complex.

    • Unit 8200: Israel's Secret Intelligence-Collection AgencyUnit 8200 was started by a group of people using surplus spy gear from the US, and it primarily uses computers and electronics to save lives and prevent terror attacks by spying on its enemies and listening to their communications.

      Unit 8200 is a secret Israeli intelligence-collection agency that primarily uses computers and electronics to gather information and prevent terror attacks. It was started in the 1950s by a small group of people using surplus spy gear from the US for bugging phone lines and other covert communications. The name Unit 8200 was given to it during the 1973 Yom Kippur War after one of its intelligence officers was captured by Syria, exposing a ton of information about this secret unit. Since the world became more connected, the information about Unit 8200 is publically known. The agency's primary mission is to save lives and prevent attacks by spying on its enemies and listening to their communications with the help of computers and electronics.

    • The IDF's Unique Personality Test for Military RecruitmentThe Israeli military's test at 17 years old identifies personality types that are either obedient or challenge the status quo. Both types are important, but the most elite units seek out those who exhibit the latter trait for better innovation.

      In Israel, a test is given to everyone at 17 years old, one year before joining the military which aims to figure out which students are rosh katan and which are rosh gadol. Rosh katan are obedient and follow direct orders, while rosh gadol often challenge the status quo and encourage reinventing the way everything is done. Both personality types are important in the military. Shira, who exhibited rosh gadol, was given more tests, finally qualifying her for the most elite units as Unit 8200 specifically seeks out those with rosh gadol. The IDF reviews all the exams and chooses the best of the best to be put in the most elite units. The process includes a series of interviews, similar to questions asked during job interviews.

    • Elite Intelligence Training at Unit 8200Unit 8200 selects only the top 1% candidates and provides specialized training to quickly transform them into valuable assets for intelligence-gathering. The military knows how to train people effectively by recruiting the right people and providing intense training.

      Unit 8200 only selects the top 1% candidates and provides very intense and specialized training to teenagers and high school graduates in order to quickly make them valuable assets to one of the most elite intelligence-gathering units in the world. Shira was not initially selected by Unit 8200 but she later became an officer and worked in charge of online intelligence for combat troops in the battlefield. Shira later joined 8200's central production center and quickly caught up with the training. The military and intelligence specifically knows how to quickly train people and make them professionals on a certain area. The art of training starts by recruiting the right people.

    • Intense Training Program of Unit 8200 for Intelligence-GatheringUnit 8200 soldiers are trained to be self-sufficient with various equipment, internal networks, and software. They must identify necessary information from foreign language documents and ensure the security of their troop's communication while breaking enemy transmissions.

      Unit 8200 of Israeli army provides rigorous training to its soldiers for intelligence-gathering. The training program involves teaching the soldiers to use various equipment, internal networks, and software to find answers to their tasks. The soldiers are trained to be self-sufficient and must learn how to perform well in high-pressure situations. The training program also includes tasks with limited resources and time to prepare the soldiers for potential real-life situations. The soldiers in Unit 8200 must have excellent comprehension skills to quickly identify the necessary information from foreign language documents. They are also trained in code-making and code-breaking to ensure the security of their own troop's communications while trying to break enemy transmissions.

    • The Importance of Cyber-Intelligence Gathering in WarfareIn modern warfare, cyber-intelligence gathering is crucial to completing missions. Unit 8200's success can be attributed to their highly skilled members who achieve tasks quicker than data scientists.

      In the modern world, military combat can occur in the cyber-domain, leading to the need to gather vital information by hacking into enemy networks. The pressure to succeed is enormous, as often the missions are life or death, and failure can result in people dying. Unit 8200 is known for infiltrating terrorist cells by accessing their communications and gathering intelligence. They were also rumoured to have used electronic warfare to disable Syria's air defense system and carry out a successful mission. Members of the unit are highly skilled, making the impossible possible and completing tasks that a data scientist may take a year to do, in just one day.

    • Cyber-warfare replacing conventional warfareUnit 8200 of Israel is shifting towards using cyber-weapons in battles instead of deploying combat troops. However, the extensive surveillance on Palestinians by the unit has been criticized for invading innocent lives and mimicking blackmail.

      Unit 8200 of Israel has realized that some battles are better fought online using cyber-weapons than sending combat troops into battle. Disruption and sabotage are the new weapons in the world in general. Also, same tools that terrorist organizations like ISIS use can be used against them with great effectiveness. However, the pervasive spying on Palestinians by Unit 8200 has been criticized by many and some former members of the unit have even written a public letter calling out these actions. They felt that this kind of surveillance was just going too far and tapping into lives of innocent Palestinians to threaten them to give up information was just too much, and is similar to blackmail. In addition, Unit 8200 doesn't just comprise of kids as there are a lot of senior officials calling the shots.

    • Encouraging Innovation and Ownership in the IDFIn the IDF, troops are empowered to understand their tasks fully, recommend new and better ways, and develop new equipment and technologies to constantly improve their mission.

      In Unit 8200, troops are encouraged to not just blindly follow orders but to understand the concept of their task and recommend a better way if they see a compelling reason. Officers need to trust and listen to their troops to make changes in the mission, giving each troop a sense of ownership. Talpiot Program is the most advanced and intense technical training in the IDF, where members train alongside combat troops and develop new equipment and technologies to make the IDF better. Constant reinvention of everything in the IDF helps them become and maintain their elite status.

    • Unit 8200: From Army Unit to Cybersecurity Startup FactoryUnit 8200's training programs create a pool of skilled cybersecurity professionals who go on to become entrepreneurs and executives, helping protect our way of life in the digital age.

      Unit 8200 and the NSA are in the same league in terms of quality of work and technology sophistication, but the US has more resources due to their superpower status. 8200 members make a risky decision as an entrepreneur, which is less stressful for them than making a risky decision on a live battlefield. The army unit becomes a factory for creating start-up founders and executives in cybersecurity that help protect our way of life in the digital age. The training that members receive in 8200 gives them perspective, education, and experience by the time they leave. Many go on to become entrepreneurs, executives in companies, or even pursue careers in medicine or architecture. This constant churn has enabled the IDF to use it to their advantage, and yearly reunions help to maintain connections with former soldiers.

    • Israel's Cybersecurity Superiority: Innovation and MilitaryIsrael's investment in cybersecurity has not only made them a top-ranked cyber-power but has also boosted their economy. Former soldiers from Israeli intelligence unit 8200 are working for top tech companies globally, giving them a powerful advantage in conflicts.

      Israel's investment in cybersecurity has paid off in spades. They have become one of the top-ranked cyber-powers of the world, with a thriving start-up scene that boosts their GDP. The innovation gets absorbed back into the IDF, making their military even stronger and giving them a powerful advantage in conflicts. Former soldiers from the elite Israeli intelligence unit, 8200, are working for many tech giants around the world while maintaining strong ties with their fellow soldiers. However, this raises questions about how they handle potential conflicts of interest. Regardless, cybersecurity is becoming increasingly crucial in the modern world and will serve as an essential basis for human development and economic growth in this century.

    Recent Episodes from Darknet Diaries

    147: Tornado

    147: Tornado

    In this episode, Geoff White (https://x.com/geoffwhite247) tells us what happened to Axie Infinity and Tornado cash. It’s a digital heist of epic proportions that changes everything.

    This story comes from part of Geoff’s book “Rinsed” which goes into the world of money laundering. Get yours here https://amzn.to/3VJs7pb.

    Darknet Diaries
    en-usJuly 02, 2024

    146: ANOM

    146: ANOM

    In this episode, Joseph Cox (https://x.com/josephfcox) tells us the story of anom. A secure phone made by criminals, for criminals.

    This story comes from part of Joseph’s book “Dark Wire” which you should definitely read. Get yours here https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691.

    Darknet Diaries
    en-usJune 04, 2024

    145: Shannen

    145: Shannen
    Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    144: Rachel

    144: Rachel
    Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    143: Jim Hates Scams

    143: Jim Hates Scams
    Jim Browning has dedicated himself to combatting scammers, taking a proactive stance by infiltrating their computer systems. Through his efforts, he not only disrupts these fraudulent operations but also shares his findings publicly on YouTube, shedding light on the intricacies of scam networks. His work uncovers a myriad of intriguing insights into the digital underworld, which he articulately discusses, offering viewers a behind-the-scenes look at his methods for fighting back against scammers. Jim’s YouTube channel: https://www.youtube.com/c/JimBrowning Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. This episode is sponsored by Intruder. Growing attack surfaces, dynamic cloud environments, and the constant stream of new vulnerabilities stressing you out? Intruder is here to help you cut through the chaos of vulnerability management with ease. Join the thousands of companies who are using Intruder to find and fix what matters most. Sign up to Intruder today and get 20% off your first 3 months. Visit intruder.io/darknet. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    142: Axact

    142: Axact
    Axact sells fake diplomas and degrees. What could go wrong with this business plan? Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    141: The Pig Butcher

    141: The Pig Butcher
    The #1 crime which results in the biggest financial loss is BEC fraud. The #2 crime is pig butchering. Ronnie Tokazowski https://twitter.com/iHeartMalware walks us through this wild world. Sponsors Support for this episode comes from NetSuite. NetSuite gives you visibility and control of your financials, planning, budgeting, and of course - inventory - so you can manage risk, get reliable forecasts, and improve margins. NetSuite helps you identify rising costs, automate your manual business processes, and see where to save money. KNOW your numbers. KNOW your business. And get to KNOW how NetSuite can be the source of truth for your entire company. Visit www.netsuite.com/darknet to learn more. Support for this show comes from Drata. Drata streamlines your SOC 2, ISO 27001, PCI DSS, HIPAA, GDPR & many other compliance frameworks, and provides 24-hour continuous control monitoring so you focus on scaling securely. Listeners of Darknet Diaries can get 10% off Drata and waived implementation fees at drata.com/darknetdiaries. This show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify’s single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    139: D3f4ult

    139: D3f4ult
    This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn’t be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you’re looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

    138: The Mimics of Punjab

    138: The Mimics of Punjab
    This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi’s YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner’s Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It’s good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they’ll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthen your infrastructure from the ground up with a zero trust posture. ThreatLocker’s Allowlisting gives you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provides zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Related Episodes

    Sponsored: John Ainsworth on digital trust

    Sponsored: John Ainsworth on digital trust

    When social distancing guidelines went into effect across the United States, credit unions responded by closing or limiting access to lobbies and reducing the number of employees working in branches.

    As a result, many credit unions became digital-first entities almost overnight—encouraging members to use virtual channels to access their accounts and services. In this environment, the concept of digital trust has come to the forefront for many credit unions.

    John Ainsworth, president and chief executive officer of CULedger, joins the CUNA News Podcast to discuss building digital trust with members, implementing enhanced security features like decentralized identities, and anticipating how these technologies will continue to evolve.

    Ainsworth also explains how joining CULedger's MemberPass Trust Registry™ and getting familiar with new guidance from the Federal Financial Institutions Examination Council are good first steps for credit unions to start building secure, trusted digital relationships with members.

    This podcast is sponsored by CULedger.

    🔴 December 14's Top Cyber News NOW! - Ep 515

    🔴 December 14's Top Cyber News NOW! - Ep 515

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.

    Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance 
    https://barricadecyber.com.

    Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Assessments!
    https://panoptcy.com/

    Check out John Strand's Pay What You Can Antisyphon Training: 
    https://simplycyber.hopp.to/antisyphontraining

    Gerald’s practical skills course with no prerequisites - GRC Analyst Master Class - https://simplycyber.teachable.com

    💥Get 30% off ITPro from ACI Learning with coupon code “SIMPLYCYBER30” for Binge-worthy cybersecurity education! https://go.itpro.tv/simplycyber

    Join the Simply Cyber Discord  https://SimplyCyber.io/Discord

    Podcast in stream is from https://cisoseries.com.

    🔴 June 5's Top Cyber News NOW! - Ep 380

    🔴 June 5's Top Cyber News NOW! - Ep 380

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.

    Check out Barricade Cyber if you need incident response, ransomware protection, or business recovery assistance
    https://barricadecyber.com.

    Build an evidence-based and data-driven cyber security program with Panoptcy's Quantified Risk Assessments!
    https://panoptcy.com/

    Gerald’s practical skills course with no prerequisites - GRC Analyst Master Class - https://simplycyber.teachable.com

    💥Get 30% off ITPro from ACI Learning with coupon code “SIMPLYCYBER30” Binge-worthy cybersecurity education ! https://go.itpro.tv/simplycyber

    Join the Simply Cyber Discord  https://SimplyCyber.io/Discord

    Podcast in stream is from cisoseries.com.

    🔴 December 27's Top Cyber News NOW! - Ep 523

    🔴 December 27's Top Cyber News NOW! - Ep 523

    The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.

    Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance 
    https://barricadecyber.com.

    Build an evidence-based, data-driven cyber security program with Panoptcy's Quantified Risk Assessments!
    https://panoptcy.com/

    Check out John Strand's Pay What You Can Antisyphon Training: 
    https://simplycyber.hopp.to/antisyphontraining

    https://simplycyber.hopp.to/antisyphontraining
    ADCD: https://bit.ly/ADCD-JohnStrand
    SOC Core Skills. https://bit.ly/SOCCoreSkills-JohnStrand

    Gerald’s practical skills course with no prerequisites - GRC Analyst Master Class - https://simplycyber.teachable.com

    💥Get 30% off ITPro from ACI Learning with coupon code “SIMPLYCYBER30” for Binge-worthy cybersecurity education! https://go.itpro.tv/simplycyber

    Join the Simply Cyber Discord  https://SimplyCyber.io/Discord

    Podcast in stream is from https://cisoseries.com.

    How to Avoid C-Suite Cyber Chaos 🌪️ (Like a Boss)

    How to Avoid C-Suite Cyber Chaos 🌪️ (Like a Boss)

    Is the CISO liable for cybersecurity compromises? Do they even own that liability or are they just an advisor to the business?

    Curious questions, even more curious discussion.

    Legal liability and decisions being made at the board level concerning cybersecurity are becoming quite pronounced.

    We just saw where the ex-Uber CSO is being charged with two felonies for his handling of a cybersecurity incident a few years back.

    Get daily cyber threat briefings with Simply Cyber every weekday. https://simplycyber.io/streams for all the details.

    Simply Cyber's mission is to help purpose driven professionals make and and take a cybersecurity career further, faster.

    📱 Social Media
    LinkedIn:  https://www.linkedin.com/in/geraldauger
    Twitter:  https://twitter.com/Gerald_Auger
    YouTube:  https://www.youtube.com/c/GeraldAuger
    Discord:  https://SimplyCyber.io/discord

    🔥 My Curated Website of Free Cyber Resources
    https://SimplyCyber.io

    Gerald’s practical skills course with no prerequisites
    GRC Analyst Master Class - https://academy.tcm-sec.com/p/grchttps://academy.tcm-sec.com/p/grc