PodcastsRank #31037
Artwork for Secure Networks: Endace Packet Forensics Files

Secure Networks: Endace Packet Forensics Files

TechnologyPodcastsBusinessEN-USunited-states
Rating unavailable
"Secure Networks: Endace Packet Forensics Files" features interviews with leading cybersecurity and networking experts from companies such as Cisco, Darktrace, Palo Alto Networks, and others. It focuses on the issues that Security, Network Operations and DevOps teams face in securing and managing their networks and applications and provides insights into best practices and future developments.
Top 62.1% by pitch volume (Rank #31037 of 50,000)Data updated Feb 10, 2026

Key Facts

Publishes
N/A
Episodes
62
Founded
N/A
Category
Technology
Number of listeners
Private
Hidden on public pages

Listen to this Podcast

Pitch this podcast
Get the guest pitch kit.
Book a quick demo to unlock the outreach details you actually need before you hit send.
  • Verified contact + outreach fields
  • Exact listener estimates (not just bands)
  • Reply rate + response timing signals
10 minutes. Friendly walkthrough. No pressure.
Book a demo
Public snapshot
Audience: Under 4K / month
Canonical: https://podpitch.com/podcasts/secure-networks-endace-packet-forensics-files
Reply rate: Under 2%

Latest Episodes

Back to top

Episode 64: Steve Fink, CTO and CISO at Secure Yeti

Fri Nov 07 2025

Listen

In this episode of the @Endace, Packet Forensic Files, Michael Morris chats with Steve Fink, CTO and CISO of Secure Yeti and architect of the SOCs for Black Hat, RSA Conference, and Cisco Live, for an in-depth look at building effective Security Operations Centers (SOCs).  With 26 years of cybersecurity experience, Fink shares strategies for leveraging packet data, integrating AI for automation, fostering vendor collaboration, and ensuring scalability and resilience.  This expert-led discussion is a must-watch for cybersecurity professionals who want to learn how to optimize threat detection and avoid data swamps . ABOUT ENDACE  ***************** Endace (https://www.endace.com) is a world leader in high-performance packet capture solutions for cybersecurity, network and application performance.  EndaceProbes are deployed on some of the world's largest, fastest and most critical networks. EndaceProbe models are available for on-premise, private cloud and public cloud deployments - delivering complete hybrid cloud visibility from a single pane-of-glass. Endace’s open EndaceProbe Analytics appliances (https://www.endace.com/endaceprobe) can be deployed in on-premise locations and can also host third-party security and performance monitoring solutions while simultaneously recording a 100% accurate history of network activity. CHAPTERS 01:24 Why is your nickname 'Fink' and not Steve? 02:17 What foundational, architectural principles are essential when designing a next-gen SOC? 05:43 How do you approach scalability & modularity in NOC/SOC design to accommodate future growth? 08:57 How have you evolved to integrate cloud native technology or hybrid environments into your SOC and what were the challenges? 12:04 What role does packet data and centralized logging play in your SOC design and how do you ensure efficient data ingestion and retrieval? 14:45 How do you architect SOC to support real time threat detection and response across geographically distributed global infrastructures? 17:55 What strategies do you use for disaster recovery? 20:35 How do you incorporate AI, ML and automation capabilities into your SOC architecture to enhance threat hunting? 23:02 What are your best practices for integrating third-party tools?

More

In this episode of the @Endace, Packet Forensic Files, Michael Morris chats with Steve Fink, CTO and CISO of Secure Yeti and architect of the SOCs for Black Hat, RSA Conference, and Cisco Live, for an in-depth look at building effective Security Operations Centers (SOCs).  With 26 years of cybersecurity experience, Fink shares strategies for leveraging packet data, integrating AI for automation, fostering vendor collaboration, and ensuring scalability and resilience.  This expert-led discussion is a must-watch for cybersecurity professionals who want to learn how to optimize threat detection and avoid data swamps . ABOUT ENDACE  ***************** Endace (https://www.endace.com) is a world leader in high-performance packet capture solutions for cybersecurity, network and application performance.  EndaceProbes are deployed on some of the world's largest, fastest and most critical networks. EndaceProbe models are available for on-premise, private cloud and public cloud deployments - delivering complete hybrid cloud visibility from a single pane-of-glass. Endace’s open EndaceProbe Analytics appliances (https://www.endace.com/endaceprobe) can be deployed in on-premise locations and can also host third-party security and performance monitoring solutions while simultaneously recording a 100% accurate history of network activity. CHAPTERS 01:24 Why is your nickname 'Fink' and not Steve? 02:17 What foundational, architectural principles are essential when designing a next-gen SOC? 05:43 How do you approach scalability & modularity in NOC/SOC design to accommodate future growth? 08:57 How have you evolved to integrate cloud native technology or hybrid environments into your SOC and what were the challenges? 12:04 What role does packet data and centralized logging play in your SOC design and how do you ensure efficient data ingestion and retrieval? 14:45 How do you architect SOC to support real time threat detection and response across geographically distributed global infrastructures? 17:55 What strategies do you use for disaster recovery? 20:35 How do you incorporate AI, ML and automation capabilities into your SOC architecture to enhance threat hunting? 23:02 What are your best practices for integrating third-party tools?

Key Metrics

Back to top
Pitches sent
10
From PodPitch users
Rank
#31037
Top 62.1% by pitch volume (Rank #31037 of 50,000)
Average rating
N/A
Ratings count may be unavailable
Reviews
N/A
Written reviews (when available)
Publish cadence
N/A
Episode count
62
Data updated
Feb 10, 2026
Social followers
735

Public Snapshot

Back to top
Country
United States
Language
EN-US
Language (ISO)
Release cadence
N/A
Latest episode date
Fri Nov 07 2025

Audience & Outreach (Public)

Back to top
Audience range
Under 4K / month
Public band
Reply rate band
Under 2%
Public band
Response time band
Private
Hidden on public pages
Replies received
Private
Hidden on public pages

Public ranges are rounded for privacy. Unlock the full report for exact values.

Presence & Signals

Back to top
Social followers
735
Contact available
Yes
Masked on public pages
Sponsors detected
Yes
Guest format
No

Social links

No public profiles listed.

Demo to Unlock Full Outreach Intelligence

We publicly share enough context for discovery. For actionable outreach data, unlock the private blocks below.

Audience & Growth
Demo to unlock
Monthly listeners49,360
Reply rate18.2%
Avg response4.1 days
See audience size and growth. Demo to unlock.
Contact preview
m***@hidden
Get verified host contact details. Demo to unlock.
Sponsor signals
Demo to unlock
Sponsor mentionsLikely
Ad-read historyAvailable
View sponsorship signals and ad read history. Demo to unlock.
Book a demo

How To Pitch Secure Networks: Endace Packet Forensics Files

Back to top

Want to get booked on podcasts like this?

Become the guest your future customers already trust.

PodPitch helps you find shows, draft personalized pitches, and hit send faster. We share enough public context for discovery; for actionable outreach data, unlock the private blocks.

  • Identify shows that match your audience and offer.
  • Write pitches in your voice (nothing sends without you).
  • Move from “maybe later” to booked interviews faster.
  • Unlock deeper outreach intelligence with a quick demo.

This show is Rank #31037 by pitch volume, with 10 pitches sent by PodPitch users.

Book a demoBrowse more shows10 minutes. Friendly walkthrough. No pressure.
Rating unavailable
RatingsN/A
Written reviewsN/A

We summarize public review counts here; full review text aggregation is not shown on PodPitch yet.

Frequently Asked Questions About Secure Networks: Endace Packet Forensics Files

Back to top

What is Secure Networks: Endace Packet Forensics Files about?

"Secure Networks: Endace Packet Forensics Files" features interviews with leading cybersecurity and networking experts from companies such as Cisco, Darktrace, Palo Alto Networks, and others. It focuses on the issues that Security, Network Operations and DevOps teams face in securing and managing their networks and applications and provides insights into best practices and future developments.

How often does Secure Networks: Endace Packet Forensics Files publish new episodes?

Secure Networks: Endace Packet Forensics Files publishes on a variable schedule.

How many listeners does Secure Networks: Endace Packet Forensics Files get?

PodPitch shows a public audience band (like "Under 4K / month"). Book a demo to unlock exact audience estimates and how we calculate them.

How can I pitch Secure Networks: Endace Packet Forensics Files?

Use PodPitch to access verified outreach details and pitch recommendations for Secure Networks: Endace Packet Forensics Files. Start at https://podpitch.com/try/1.

Which podcasts are similar to Secure Networks: Endace Packet Forensics Files?

This page includes internal links to similar podcasts. You can also browse the full directory at https://podpitch.com/podcasts.

How do I contact Secure Networks: Endace Packet Forensics Files?

Public pages only show a masked contact preview. Book a demo to unlock verified email and outreach fields.

Quick favor for your future self: want podcast bookings without the extra mental load? PodPitch helps you find shows, draft personalized pitches, and hit send faster.