Spencer McClain

Spencer is a former penetration tester with 10+ years of experience in cyber security. From Nebraska, currently living in Upstate New York. He has held roles at The Center for Internet Security — MS-ISAC, Cybereason, and Offensive Security. He specializes in threat emulation and helping organizations adopt a post-breach mentality.
More by Spencer McClain
WP_Query Object
(
    [query] => Array
        (
            [post_type] => Array
                (
                    [0] => post
                    [1] => webinars
                )

            [posts_per_page] => -1
            [post_status] => publish
            [meta_query] => Array
                (
                    [relation] => OR
                    [0] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                        )

                )

        )

    [query_vars] => Array
        (
            [post_type] => Array
                (
                    [0] => post
                    [1] => webinars
                )

            [posts_per_page] => -1
            [post_status] => publish
            [meta_query] => Array
                (
                    [relation] => OR
                    [0] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                        )

                )

            [error] => 
            [m] => 
            [p] => 0
            [post_parent] => 
            [subpost] => 
            [subpost_id] => 
            [attachment] => 
            [attachment_id] => 0
            [name] => 
            [pagename] => 
            [page_id] => 0
            [second] => 
            [minute] => 
            [hour] => 
            [day] => 0
            [monthnum] => 0
            [year] => 0
            [w] => 0
            [category_name] => 
            [tag] => 
            [cat] => 
            [tag_id] => 
            [author] => 
            [author_name] => 
            [feed] => 
            [tb] => 
            [paged] => 0
            [meta_key] => 
            [meta_value] => 
            [preview] => 
            [s] => 
            [sentence] => 
            [title] => 
            [fields] => 
            [menu_order] => 
            [embed] => 
            [category__in] => Array
                (
                )

            [category__not_in] => Array
                (
                )

            [category__and] => Array
                (
                )

            [post__in] => Array
                (
                )

            [post__not_in] => Array
                (
                )

            [post_name__in] => Array
                (
                )

            [tag__in] => Array
                (
                )

            [tag__not_in] => Array
                (
                )

            [tag__and] => Array
                (
                )

            [tag_slug__in] => Array
                (
                )

            [tag_slug__and] => Array
                (
                )

            [post_parent__in] => Array
                (
                )

            [post_parent__not_in] => Array
                (
                )

            [author__in] => Array
                (
                )

            [author__not_in] => Array
                (
                )

            [search_columns] => Array
                (
                )

            [ignore_sticky_posts] => 
            [suppress_filters] => 
            [cache_results] => 1
            [update_post_term_cache] => 1
            [update_menu_item_cache] => 
            [lazy_load_term_meta] => 1
            [update_post_meta_cache] => 1
            [nopaging] => 1
            [comments_per_page] => 50
            [no_found_rows] => 
            [order] => DESC
        )

    [tax_query] => WP_Tax_Query Object
        (
            [queries] => Array
                (
                )

            [relation] => AND
            [table_aliases:protected] => Array
                (
                )

            [queried_terms] => Array
                (
                )

            [primary_table] => wp_posts
            [primary_id_column] => ID
        )

    [meta_query] => WP_Meta_Query Object
        (
            [queries] => Array
                (
                    [0] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                        )

                    [relation] => OR
                )

            [relation] => OR
            [meta_table] => wp_postmeta
            [meta_id_column] => post_id
            [primary_table] => wp_posts
            [primary_id_column] => ID
            [table_aliases:protected] => Array
                (
                    [0] => wp_postmeta
                )

            [clauses:protected] => Array
                (
                    [wp_postmeta] => Array
                        (
                            [key] => new_authors
                            [value] => "152"
                            [compare] => LIKE
                            [compare_key] => =
                            [alias] => wp_postmeta
                            [cast] => CHAR
                        )

                    [wp_postmeta-1] => Array
                        (
                            [key] => new_presenters
                            [value] => "152"
                            [compare] => LIKE
                            [compare_key] => =
                            [alias] => wp_postmeta
                            [cast] => CHAR
                        )

                )

            [has_or_relation:protected] => 1
        )

    [date_query] => 
    [request] => SELECT   wp_posts.ID
					 FROM wp_posts  INNER JOIN wp_postmeta ON ( wp_posts.ID = wp_postmeta.post_id )
					 WHERE 1=1  AND ( 
  ( wp_postmeta.meta_key = 'new_authors' AND wp_postmeta.meta_value LIKE '{93b665d5ab6bf637ae16024a4fa4dc91978e12648144d0264b09e1a29381e9bb}\"152\"{93b665d5ab6bf637ae16024a4fa4dc91978e12648144d0264b09e1a29381e9bb}' ) 
  OR 
  ( wp_postmeta.meta_key = 'new_presenters' AND wp_postmeta.meta_value LIKE '{93b665d5ab6bf637ae16024a4fa4dc91978e12648144d0264b09e1a29381e9bb}\"152\"{93b665d5ab6bf637ae16024a4fa4dc91978e12648144d0264b09e1a29381e9bb}' )
) AND wp_posts.post_type IN ('post', 'webinars') AND ((wp_posts.post_status = 'publish'))
					 GROUP BY wp_posts.ID
					 ORDER BY wp_posts.post_date DESC
					 
    [posts] => Array
        (
            [0] => WP_Post Object
                (
                    [ID] => 32127
                    [post_author] => 53
                    [post_date] => 2024-03-15 16:05:08
                    [post_date_gmt] => 2024-03-15 21:05:08
                    [post_content] => 




Security validation tools are gaining traction as organizations increasingly look to test their security controls against real-world threat vectors. 

According to Gartner, through 2026, more than 40% of organizations, including two-thirds of midsize enterprises, will rely on consolidated platforms to run cybersecurity validation assessments. Breach and attack simulation tools are being used for this purpose.  

See how NetSPI BAS helps customers consolidate their cybersecurity validation assessments. During this webinar we'll cover:

  1. How to build custom plays that can be used to create unique tests specific to your environment. 
  2. Addressing time and resource constraints and setting your SOC team up for success 
  3. Confirming security readiness and security posture 

Watch the webinar and learn more about NetSPI’s proactive security solutions.

[post_title] => Product Pulse: Breach and Attack Custom Plays for Your SOC [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-custom-plays-for-soc [to_ping] => [pinged] => [post_modified] => 2024-04-03 12:21:00 [post_modified_gmt] => 2024-04-03 17:21:00 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=32127 [menu_order] => 1 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) [1] => WP_Post Object ( [ID] => 31195 [post_author] => 53 [post_date] => 2023-11-13 09:32:23 [post_date_gmt] => 2023-11-13 15:32:23 [post_content] =>

Ransomware remains one of the greatest global cyber threats. Frequency, sophistication, costs, and impact are all on the rise – and show no signs of slowing. 

With millions of dollars spent on detective controls every year, why are we still struggling to effectively detect ransomware attacks? 

Recent advancements with breach and attack simulation (BAS) technologies unveil an opportunity to answer this question head-on. Join NetSPI BAS lead Derek Wilson and Solutions Architect Spencer McClain to explore how to use BAS to improve ransomware detections.  

During this webinar, they’ll demo NetSPI’s BAS platform and answer your questions, including:  

  • What does a ransomware simulation look like? 
  • How can I use BAS to set my SOC up for success against ransomware? 
  • How can I use attack simulations to support incident response tabletops? 

Watch today to get a deeper look at how to use NetSPI’s award-winning BAS platform to improve your ransomware readiness.

[post_title] => Product Pulse: How to Use Breach and Attack Simulation (BAS) to Improve Ransomware Detection  [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-simulation-for-ransomware-detection [to_ping] => [pinged] => [post_modified] => 2023-12-05 11:36:42 [post_modified_gmt] => 2023-12-05 17:36:42 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=31195 [menu_order] => 7 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) [2] => WP_Post Object ( [ID] => 30303 [post_author] => 53 [post_date] => 2023-06-07 12:27:26 [post_date_gmt] => 2023-06-07 17:27:26 [post_content] =>

Join Spencer McClain, Solutions Architect at NetSPI, as he guides you through a Breach and Attack Simulation (BAS) platform demo. See how NetSPI's BAS can revolutionize your company’s cybersecurity program, support security operations teams, and improve your detective controls. 

During this 30-minute session, we will: 

  • Demonstrate NetSPI’s BAS platform capabilities 
  • Highlight cutting-edge new platform features 
  • Explore common BAS use cases  
  • Dive into customer success stories  
[post_title] => Product Pulse: Demo of Breach and Attack Simulation (BAS)  [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-simulation-live-demo [to_ping] => [pinged] => [post_modified] => 2023-09-21 14:01:31 [post_modified_gmt] => 2023-09-21 19:01:31 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=30303 [menu_order] => 22 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) ) [post_count] => 3 [current_post] => -1 [before_loop] => 1 [in_the_loop] => [post] => WP_Post Object ( [ID] => 32127 [post_author] => 53 [post_date] => 2024-03-15 16:05:08 [post_date_gmt] => 2024-03-15 21:05:08 [post_content] =>

Security validation tools are gaining traction as organizations increasingly look to test their security controls against real-world threat vectors. 

According to Gartner, through 2026, more than 40% of organizations, including two-thirds of midsize enterprises, will rely on consolidated platforms to run cybersecurity validation assessments. Breach and attack simulation tools are being used for this purpose.  

See how NetSPI BAS helps customers consolidate their cybersecurity validation assessments. During this webinar we'll cover:

  1. How to build custom plays that can be used to create unique tests specific to your environment. 
  2. Addressing time and resource constraints and setting your SOC team up for success 
  3. Confirming security readiness and security posture 

Watch the webinar and learn more about NetSPI’s proactive security solutions.

[post_title] => Product Pulse: Breach and Attack Custom Plays for Your SOC [post_excerpt] => [post_status] => publish [comment_status] => closed [ping_status] => closed [post_password] => [post_name] => breach-and-attack-custom-plays-for-soc [to_ping] => [pinged] => [post_modified] => 2024-04-03 12:21:00 [post_modified_gmt] => 2024-04-03 17:21:00 [post_content_filtered] => [post_parent] => 0 [guid] => https://www.netspi.com/?post_type=webinars&p=32127 [menu_order] => 1 [post_type] => webinars [post_mime_type] => [comment_count] => 0 [filter] => raw ) [comment_count] => 0 [current_comment] => -1 [found_posts] => 3 [max_num_pages] => 0 [max_num_comment_pages] => 0 [is_single] => [is_preview] => [is_page] => [is_archive] => [is_date] => [is_year] => [is_month] => [is_day] => [is_time] => [is_author] => [is_category] => [is_tag] => [is_tax] => [is_search] => [is_feed] => [is_comment_feed] => [is_trackback] => [is_home] => 1 [is_privacy_policy] => [is_404] => [is_embed] => [is_paged] => [is_admin] => [is_attachment] => [is_singular] => [is_robots] => [is_favicon] => [is_posts_page] => [is_post_type_archive] => [query_vars_hash:WP_Query:private] => 6d03c511e6a2f99f99711f609a50898b [query_vars_changed:WP_Query:private] => [thumbnails_cached] => [allow_query_attachment_by_filename:protected] => [stopwords:WP_Query:private] => [compat_fields:WP_Query:private] => Array ( [0] => query_vars_hash [1] => query_vars_changed ) [compat_methods:WP_Query:private] => Array ( [0] => init_query_flags [1] => parse_tax_query ) )

Discover how the NetSPI BAS solution helps organizations validate the efficacy of existing security controls and understand their Security Posture and Readiness.

X