>Download Cocktail Book_
Print or save as PDF - Your complete guide to BarCode cocktails
// Print Your Copy
Click the button below to open the print dialog. Select "Save as PDF" as your destination to download a PDF version of the complete cocktail book.
Tip: For best results, use Chrome or Edge and select "Save as PDF" in the print dialog.
125 cocktail recipes across 44 pages.
Sample Page Layout
Kamikaze
Kamikaze
Joshua Feldman
Security Professional
Ingredients
- 1½ ozVodka
- 1 ozTriple Sec
- 1 ozLime Juice
Instructions
- 1.Add the vodka, triple sec and lime juice to a shaker with ice.
- 2.Shake thoroughly until well-chilled.
- 3.Strain into glass.
Key Takeaways
- ▸Security awareness starts with understanding basic principles
- ▸Building a security culture requires consistent effort
- ▸Every professional can contribute to organizational security
Blue Monday
Blue Monday
Troy Hunt
Creator of Have I Been Pwned
Ingredients
- 1½ ozVodka
- ¾ ozBlue Curacao
- ½ ozTriple Sec
- ½ ozDry Vermouth
- 2 dashesOrange Bitters
Instructions
- 1.Shake all ingredients with ice.
- 2.Fine strain into a chilled glass.
Key Takeaways
- ▸Data breaches affect billions of people worldwide
- ▸Password reuse is one of the biggest security risks
- ▸Breach notification services empower users to take action
Next-Gen Fireball
Next-Gen Fireball
Gabriel Doncel and Scott Darkow
Security Professionals
Ingredients
- 1 pintCold Apple Cider Beer
- 1 shotFireball
Instructions
- 1.Combine into pint glass and enjoy.
Key Takeaways
- ▸Next-gen security requires proactive threat hunting
- ▸Automation enhances security team capabilities
- ▸Collaboration between teams improves security posture
BARCODE
COCKTAIL BOOK
125 Signature Recipes
From the BarCode Security Podcast
Kamikaze
Kamikaze
Joshua Feldman
Security Professional
Ingredients
- 1½ ozVodka
- 1 ozTriple Sec
- 1 ozLime Juice
Instructions
- 1.Add the vodka, triple sec and lime juice to a shaker with ice.
- 2.Shake thoroughly until well-chilled.
- 3.Strain into glass.
Key Takeaways
- ▸Security awareness starts with understanding basic principles
- ▸Building a security culture requires consistent effort
- ▸Every professional can contribute to organizational security
Blue Monday
Blue Monday
Troy Hunt
Creator of Have I Been Pwned
Ingredients
- 1½ ozVodka
- ¾ ozBlue Curacao
- ½ ozTriple Sec
- ½ ozDry Vermouth
- 2 dashesOrange Bitters
Instructions
- 1.Shake all ingredients with ice.
- 2.Fine strain into a chilled glass.
Key Takeaways
- ▸Data breaches affect billions of people worldwide
- ▸Password reuse is one of the biggest security risks
- ▸Breach notification services empower users to take action
Next-Gen Fireball
Next-Gen Fireball
Gabriel Doncel and Scott Darkow
Security Professionals
Ingredients
- 1 pintCold Apple Cider Beer
- 1 shotFireball
Instructions
- 1.Combine into pint glass and enjoy.
Key Takeaways
- ▸Next-gen security requires proactive threat hunting
- ▸Automation enhances security team capabilities
- ▸Collaboration between teams improves security posture
Sapphire Alpine
Sapphire Alpine
Stan Ivanov
Security Professional
Ingredients
- 1 ozGin
- 1 ozBlue Curacao
- 1 ozPeach Schnapps
Instructions
- 1.Combine all ingredients in a shaker with ice.
- 2.Shake well.
- 3.Pour into a chilled glass.
Key Takeaways
- ▸Global security requires understanding regional differences
- ▸Building international security teams requires cultural awareness
- ▸Compliance requirements vary by jurisdiction
Dracula Margarita
Dracula Margarita
Ira Winkler
Security Author & Consultant
Ingredients
- 1 ozTequila
- ½ ozTriple Sec
- TopRed Wine
Instructions
- 1.Fill glass with ice.
- 2.Add tequila and triple sec.
- 3.Top with red wine.
Key Takeaways
- ▸Social engineering remains the most effective attack vector
- ▸Security awareness training must be ongoing
- ▸Corporate espionage is a real and present threat
The Anomaly
The Anomaly
Przemek Chojecki
Security Researcher
Ingredients
- 4 ozPeanut Butter Whiskey
- 1½ ozCranberry Juice
Instructions
- 1.Combine all ingredients.
- 2.Pour over ice into whiskey glass.
Key Takeaways
- ▸Anomaly detection requires understanding normal behavior
- ▸Machine learning enhances threat detection capabilities
- ▸False positives remain a challenge in security monitoring
The Painkiller
The Painkiller
Stephen Adams
Security Professional
Ingredients
- 2 ozRum
- 4 ozPineapple Juice
- 1 ozCream of Coconut
Instructions
- 1.Mix all components together.
- 2.Pour over crushed ice.
Key Takeaways
- ▸Incident response planning is essential before breaches occur
- ▸Clear communication during incidents reduces damage
- ▸Post-incident analysis improves future responses
The Blitzen
The Blitzen
Bruce Schneier
Security Technologist & Author
Ingredients
- 1 ozCinnamon Whiskey
- 1 ozRum Chata
- 1 ozKahlua
Instructions
- 1.Combine components and shake.
- 2.Pour over ice.
- 3.Optionally rim the glass with cinnamon cereal.
Key Takeaways
- ▸Security is a process, not a product
- ▸Cryptography underpins modern digital security
- ▸Privacy and security are complementary, not opposing
Manhattan
Manhattan
Ron Gula
CEO, Gula Tech Adventures
Ingredients
- 2 ozBourbon
- 1 ozSweet Vermouth
- 1-2 dashesOrange Bitters
Instructions
- 1.Stir all components well in a chilled glass.
- 2.Strain into a rocks glass.
Key Takeaways
- ▸Vulnerability management is foundational to security
- ▸Security entrepreneurship requires both technical and business skills
- ▸Investing in security startups accelerates innovation
Whiskey Sour
Whiskey Sour
A.J. Nash
Threat Intelligence Expert
Ingredients
- 2 ozBourbon
- 1 ozLemon Juice
- 1 tspSugar
Instructions
- 1.Combine components in a cocktail shaker and shake.
- 2.Add ice and shake again.
- 3.Strain over ice in a rocks glass.
Key Takeaways
- ▸Threat intelligence informs proactive defense strategies
- ▸Context transforms data into actionable intelligence
- ▸Intelligence sharing benefits the entire community
Long Island IoT
Long Island IoT
Grayson Milbourne
IoT Security Expert
Ingredients
- ½ ozVodka
- ½ ozRum
- ½ ozGin
- ½ ozTequila
- ½ ozTriple Sec
- 1 ozSweet and Sour Mix
- TopCola
Instructions
- 1.Add all components into a shaker.
- 2.Shake vigorously.
- 3.Pour into a glass of ice.
- 4.Top off with cola.
Key Takeaways
- ▸IoT devices dramatically expand the attack surface
- ▸Default credentials remain a major IoT vulnerability
- ▸Network segmentation helps contain IoT risks
The Getaway
The Getaway
HD Moore
Creator of Metasploit
Ingredients
- 1½ ozTequila
- ½ ozTriple Sec
- ½ ozLemon Juice
- TopGinger Ale
Instructions
- 1.Add all components into a shaker.
- 2.Shake vigorously.
- 3.Pour into a glass of ice.
- 4.Top off with ginger ale.
Key Takeaways
- ▸Offensive tools help defenders understand vulnerabilities
- ▸Open source security tools democratize security testing
- ▸Responsible disclosure improves overall security
Negroni
Negroni
Phillip Wylie
Offensive Security Instructor
Ingredients
- 1 ozGin
- 1 ozCampari
- 1 ozRed Vermouth
Instructions
- 1.Combine all ingredients in an old-fashioned glass with ice cubes.
- 2.Stir using a mixing spoon.
- 3.Garnish with orange slice.
Key Takeaways
- ▸Offensive security skills require continuous practice
- ▸Ethical hacking helps organizations find vulnerabilities first
- ▸Security certifications validate practical skills
The Infection
The Infection
Ted Harrington
Security Consultant & Author
Ingredients
- 1 ozGin
- 1 ozMidori
- Equal partsGrape Juice
- Equal partsClub Soda
Instructions
- 1.Add gin and Midori to a shaker with ice.
- 2.Fill with equal parts grape juice and club soda.
- 3.Shake and strain over ice in a glass.
Key Takeaways
- ▸Security testing should be integrated into development
- ▸Application vulnerabilities are a leading attack vector
- ▸Secure coding practices prevent common vulnerabilities
Death Flip
Death Flip
Alexandre Blanc
Security Professional
Ingredients
- 1 ozBlanco Tequila
- ½ ozJagermeister
- ½ ozYellow Chartreuse
- 1 dashSimple Syrup
- 1 wholeEgg (White & Yolk)
Instructions
- 1.Add ingredients to tin (avoid getting egg shell in cocktail).
- 2.Add shaking ice.
- 3.Shake 8-10 seconds.
- 4.Strain into chilled glass.
Key Takeaways
- ▸Advanced threats require sophisticated defenses
- ▸Security teams must continuously evolve their skills
- ▸Threat landscape changes demand adaptive strategies
Skylab
Skylab
Ashish Rajan
Cloud Security Expert
Ingredients
- 1 ozVodka
- 1 ozRum
- ½ ozPeach Liqueur
- ½ ozBlue Curacao
- SplashPineapple Juice
- SplashOrange Juice
- SplashSprite
Instructions
- 1.Pour all ingredients into a shaker filled with ice.
- 2.Shake well.
- 3.Strain into a chilled glass.
Key Takeaways
- ▸Cloud security requires understanding shared responsibility
- ▸Misconfigurations are a leading cause of cloud breaches
- ▸Identity and access management is crucial in the cloud
Gin Rickey
Gin Rickey
Scott Kuffer
Security Professional
Ingredients
- 2 ozGin
- ½ ozFresh Lime Juice
- TopClub Soda
Instructions
- 1.Fill glass with ice.
- 2.Add gin and lime juice.
- 3.Top with club soda.
Key Takeaways
- ▸Security operations require clear processes
- ▸Scaling security programs demands automation
- ▸Metrics help demonstrate security value
Divatini
Divatini
Debbie Reynolds
Data Privacy Expert
Ingredients
- 1 ozLimoncello
- 1 ozVodka
- ½ ozGrapefruit Juice
- ½ ozCranberry Juice
- ½ ozLemon Juice
Instructions
- 1.Fill a cocktail shaker with ice.
- 2.Add all components and shake vigorously.
- 3.Strain into a martini glass.
Key Takeaways
- ▸Privacy and security are interconnected disciplines
- ▸Regulatory compliance requires ongoing attention
- ▸Data minimization reduces privacy risks
Crypto Cocktail
Crypto Cocktail
Purandar Das
Data Security Expert
Ingredients
- 2 ozSouthern Comfort
- 2 ozVodka
- 6 ozOrange Juice
Instructions
- 1.Combine the liqueur, vodka and orange juice in a highball glass with ice cubes.
- 2.Stir using a mixing spoon.
- 3.Optionally garnish with an orange zest.
Key Takeaways
- ▸Encryption is essential for protecting data at rest and in transit
- ▸Key management is often harder than encryption itself
- ▸Cryptographic standards must be regularly updated
H2O
H2O
Naomi Buckwalter
Security Career Coach
Ingredients
- FillIce
- FillWater
Instructions
- 1.Fill a 16 oz glass with ice.
- 2.Pour water into glass.
Key Takeaways
- ▸Security careers can start from many different backgrounds
- ▸Mentorship accelerates professional development
- ▸Networking opens doors in the security community
Vitamin C
Vitamin C
Anahi Santiago
Healthcare Security Leader
Ingredients
- ½ cupIce
- 2 ozOrange Vodka
- 2 ozOrange Juice
- 1 can (8.4oz)Red Bull
Instructions
- 1.Add ice to a pint glass.
- 2.Pour in the vodka and orange juice.
- 3.Crack open the Red Bull and quickly turn it over and place on top of ice.
- 4.Add a straw and enjoy immediately.
Key Takeaways
- ▸Healthcare data requires special protection measures
- ▸Medical device security is increasingly critical
- ▸HIPAA compliance is a baseline, not a ceiling
Radioactive
Radioactive
Jim Manico
Application Security Expert
Ingredients
- 2 ozCoconut Rum
- 2 ozMelon Liqueur
- 3 ozPineapple Juice
Instructions
- 1.In a shaking glass with ice, combine coconut rum, melon liqueur, and pineapple juice.
- 2.Shake well.
- 3.Strain into a highball with ice.
Key Takeaways
- ▸Secure coding practices prevent common vulnerabilities
- ▸OWASP resources help developers build secure applications
- ▸Input validation is a critical defense mechanism
Midnight Stinger
Midnight Stinger
Tony Reinert
Security Professional
Ingredients
- 1 ozBourbon
- 1 ozFernet Branca
- ¾ ozLemon Juice
- ¾ ozSimple Syrup
Instructions
- 1.Add all ingredients to a shaking tin with ice.
- 2.Shake well.
- 3.Strain over ice into a rocks glass.
Key Takeaways
- ▸Security operations require 24/7 vigilance
- ▸Incident playbooks improve response consistency
- ▸Team resilience prevents burnout
Carnivore
Carnivore
Nato Riley
Security Professional
Ingredients
- 1 ozScotch Whiskey
- 5 ozClub Soda
- 1 dashLemon Juice
Instructions
- 1.Combine the Scotch whiskey, club soda and lemon juice in an old-fashioned glass with ice cubes.
- 2.Stir using a mixing spoon.
- 3.Garnish with a lemon zest.
Key Takeaways
- ▸Effective monitoring requires comprehensive visibility
- ▸Threat detection combines technology and expertise
- ▸Log analysis reveals attack patterns
Hpnosia
Hpnosia
Jenny Radcliffe
The People Hacker
Ingredients
- 2 ozHpnotiq
- 2 ozChampagne
Instructions
- 1.Pour chilled Hpnotiq and Champagne into a Champagne flute.
Key Takeaways
- ▸Social engineering exploits human psychology
- ▸Physical security is often overlooked
- ▸Building rapport is a key social engineering technique
Mojito
Mojito
Rohan Light
Security Professional
Ingredients
- 1½ ozWhite Rum
- 2 ozClub Soda
- HandfulFresh Mint
- SeveralLime Slices
- To tasteSugar
Instructions
- 1.In a highball glass, place a handful of mint leaves and 3-4 lime slices.
- 2.Crush using a muddler.
- 3.Add sugar, white rum and ice cubes.
- 4.Top with club soda.
- 5.Stir with mixing spoon.
Key Takeaways
- ▸Security architecture requires holistic thinking
- ▸Secure design prevents costly remediation later
- ▸Defense in depth provides multiple layers of protection
Rye Bandit
Rye Bandit
Adam Levin
Identity Theft Expert
Ingredients
- 2 ozBourbon
- 1 ozAmaro Delle Sirene
- 1 ozLuna Amara Bitter
Instructions
- 1.Add all ingredients in a mixing glass with ice and stir.
- 2.Pour into a rocks glass over ice.
- 3.Optionally garnish with an orange twist.
Key Takeaways
- ▸Identity theft can happen to anyone
- ▸Credit monitoring provides early warning of fraud
- ▸Strong authentication protects online accounts
Godfather
Godfather
Dr. Eric Cole
Cybersecurity Expert & Author
Ingredients
- 2 ozAmerican Whiskey
- 1 ozAlmond Liqueur
Instructions
- 1.Combine whiskey and almond liqueur in an old-fashioned glass with ice cubes.
- 2.Stir with a mixing spoon.
Key Takeaways
- ▸Security leadership requires business acumen
- ▸Risk management aligns security with business objectives
- ▸Executive communication is essential for security leaders
The King
The King
Graham Cluley
Security Blogger & Podcaster
Ingredients
- 3 ozCrown Black
- 4 ozCola
Instructions
- 1.Pour the Crown Black to an ice-filled highball glass.
- 2.Add in the cola and stir.
- 3.Garnish with lime if you wish.
Key Takeaways
- ▸Security communication must be accessible to all
- ▸Media coverage shapes public perception of security
- ▸Historical incidents teach valuable lessons
Grand Mule
Grand Mule
Joe Grand
Hardware Hacker & Engineer
Ingredients
- ½ ozFresh Lime Juice
- 4 ozGinger Kombucha
- FillCrushed Ice
Instructions
- 1.Fill a mule mug with crushed ice.
- 2.Pour in lime juice.
- 3.Top with Ginger Kombucha and stir with long cocktail spoon.
- 4.For alcoholic version, add 2 oz vodka.
Key Takeaways
- ▸Hardware security is often overlooked
- ▸Physical access enables powerful attacks
- ▸Reverse engineering reveals hidden vulnerabilities
Red Hook
Red Hook
Aviv Grafi
Security Professional
Ingredients
- 2 ozRye Whiskey
- ½ ozMaraschino Liqueur
- ½ ozPunt e Mes
Instructions
- 1.Stir all components in a mixing glass with ice.
- 2.Strain into a chilled glass.
Key Takeaways
- ▸File-based attacks remain prevalent
- ▸Content disarm and reconstruction neutralizes threats
- ▸Email attachments are a common attack vector
Sonic Shot
Sonic Shot
Matt Huysman
Security Professional
Ingredients
- 1 partBlue Curacao
- 1 partPeppermint Schnapps
- 1 partGrenadine
Instructions
- 1.In a tall shot glass, layer the Blue Curacao, Peppermint Schnapps and Grenadine carefully.
- 2.Use a mixing spoon for layering.
Key Takeaways
- ▸Quick wins build momentum for security programs
- ▸Prioritization focuses efforts on highest risks
- ▸Limited resources require creative solutions
Final Answer
Final Answer
John Sileo
Identity Theft Speaker
Ingredients
- 1½ ozWhite Rum
- 1 ozMaraschino Liqueur
- 1 ozGreen Chartreuse
- 1 ozLemon Juice
Instructions
- 1.Combine all ingredients in a shaker with ice.
- 2.Shake well.
- 3.Strain into a cocktail glass.
Key Takeaways
- ▸Personal experience with identity theft drives advocacy
- ▸Employee education prevents insider threats
- ▸Data minimization reduces exposure
King's Jubilee
King's Jubilee
Paul Asadoorian
Security Podcaster & Evangelist
Ingredients
- 1⅓ ozWhite Rum
- ½ ozMaraschino Liqueur
- ⅓ ozFresh Lemon Juice
Instructions
- 1.Shake all ingredients with ice.
- 2.Fine strain into a chilled glass.
- 3.Optionally garnish with lemon zest twist.
Key Takeaways
- ▸Podcasting connects security professionals globally
- ▸Vulnerability management is an ongoing process
- ▸Community engagement strengthens the industry
Tequila Sunrise
Tequila Sunrise
Martin Pacher
Security Professional
Ingredients
- 1½ ozGold Tequila
- ¾ cupOrange Juice
- ¾ ozGrenadine
Instructions
- 1.Pour the tequila and orange juice in a shaker filled with ice cubes.
- 2.Shake vigorously for 8 to 10 seconds.
- 3.Strain into an old-fashioned glass with ice.
- 4.Pour in the grenadine syrup.
Key Takeaways
- ▸Security trends evolve rapidly
- ▸Staying current requires continuous learning
- ▸Emerging technologies bring new security challenges
Caipirinha
Caipirinha
Various BJJ Practitioners
Brazilian Jiu-Jitsu Community
Ingredients
- ½Lime
- 2 tspSuperfine Sugar
- 2 ozCachaca
Instructions
- 1.Cut half of a lime into small wedges.
- 2.Place the lime and sugar into an old-fashioned glass and muddle well.
- 3.Top the drink with cachaça and stir well.
- 4.Fill the glass with small ice cubes or cracked ice and stir again.
Key Takeaways
- ▸Discipline from martial arts applies to security work
- ▸Problem-solving skills transfer across domains
- ▸Physical and mental training complement each other
Tiger Blood
Tiger Blood
Neil Saltman and Doug Gotay
Security Professionals
Ingredients
- 3 ozVodka
- 1 ozGinger Ale
- 2 ozPomegranate Juice
- 2-3 splashesLime Juice
Instructions
- 1.Pour all ingredients into a glass with ice.
- 2.Add 2-3 splashes of lime juice.
- 3.Stir and enjoy.
Key Takeaways
- ▸Team dynamics impact security effectiveness
- ▸Collaboration improves threat response
- ▸Diverse perspectives strengthen security programs
High Roller
High Roller
Dr. Matthew Canham
Security Researcher
Ingredients
- ¾ ozGrand Marnier
- 1½ ozVodka
- 4 ozOrange Juice
- Few dropsGrenadine
Instructions
- 1.Pour Grand Marnier, vodka and orange juice in a cocktail shaker filled with ice.
- 2.Shake well.
- 3.Strain into an old fashioned glass with ice.
- 4.Top with a few drops of grenadine.
Key Takeaways
- ▸Psychology influences security decision-making
- ▸Cognitive biases affect risk perception
- ▸Understanding behavior improves security design
Electric Shark
Electric Shark
William Lin
Security Professional
Ingredients
- 1 ozSpiced Rum
- 2 ozBlue Curacao
- 4 ozPineapple Juice
- TopGinger Beer
Instructions
- 1.Combine rum, blue curacao and pineapple juice in a shaker filled with ice.
- 2.Shake vigorously for 8 to 10 seconds.
- 3.Strain over a glass with ice.
- 4.Top with ginger beer.
Key Takeaways
- ▸Network visibility is essential for security
- ▸Network segmentation limits lateral movement
- ▸Encrypted traffic poses monitoring challenges
Corpse Reviver #2
Corpse Reviver #2
Jacob Horne
Security Professional
Ingredients
- 1 ozGin
- 1 ozTriple Sec
- 1 ozLillet Blanc
- 1 ozFresh Lemon Juice
- 1 dashAbsinthe
Instructions
- 1.Pour all components into a shaker filled with ice.
- 2.Shake well.
- 3.Strain into a chilled glass.
- 4.Optionally garnish with an orange peel.
Key Takeaways
- ▸Recovery planning is essential for resilience
- ▸Business continuity ensures operations continue
- ▸Backup and restore procedures must be tested
Mind Eraser
Mind Eraser
Sophie Zhang
Data Scientist & Whistleblower
Ingredients
- 1 partKahlua
- 1 partVodka
- 1 partClub Soda
Instructions
- 1.Layer Kahlua, then Vodka, then club soda into a tall shot glass.
- 2.Shoot it straight through a straw.
Key Takeaways
- ▸Platform integrity affects society broadly
- ▸Misinformation spreads faster than corrections
- ▸Ethical considerations guide security decisions
Lemon Drop
Lemon Drop
Sophie Zhang
Data Scientist & Whistleblower
Ingredients
- 2 ozVodka
- ½ ozTriple Sec
- 1 ozLemon Juice
- 1 ozSimple Syrup
Instructions
- 1.Add all components into a shaker with ice.
- 2.Shake well.
- 3.Strain into a glass.
Key Takeaways
- ▸Data integrity requires organizational commitment
- ▸Ethical AI development needs diverse perspectives
- ▸Transparency builds trust with users
SideCar
SideCar
Joseph Schorr
Security Professional
Ingredients
- 2 ozBourbon
- 1 ozLemon Juice
- ¾ ozSimple Syrup
- ½Egg White
Instructions
- 1.Add all ingredients into a cocktail shaker.
- 2.Shake lightly for 30 seconds.
- 3.Fill halfway with ice.
- 4.Shake well and strain on the rocks.
Key Takeaways
- ▸Authorization determines what users can do
- ▸Least privilege limits potential damage
- ▸Access control models vary by use case
Python
Python
John Kindervag
Creator of Zero Trust
Ingredients
- 1½ ozWhite Rum
- 1 ozMint Liqueur
- 1 ozPineapple Juice
- TopLemon Lime Soda
- ½Lemon
Instructions
- 1.Add all ingredients into a cocktail shaker.
- 2.Shake and strain over glass with ice.
- 3.Squeeze half of lemon in.
- 4.Top with Lemon Lime soda.
Key Takeaways
- ▸Never trust, always verify is the Zero Trust mantra
- ▸Zero Trust applies to all network traffic
- ▸Micro-segmentation enables Zero Trust architecture
Epic Fail
Epic Fail
Greg Edwards
Security Professional
Ingredients
- 1½ ozVodka
- 3½ ozCoke
- ½Lemon
- FillIce
Instructions
- 1.Fill a glass with ice and all ingredients.
- 2.Thoroughly mix till the glass is misted.
- 3.Garnish with a lemon slice.
Key Takeaways
- ▸Failures provide valuable learning opportunities
- ▸Blameless post-mortems encourage honesty
- ▸Documentation prevents repeated mistakes
Fast Buck
Fast Buck
Timur Yunusov
Security Researcher
Ingredients
- 2½ ozSloe Gin
- 3½ ozGinger Ale
- ¼Lemon
- FillIce
Instructions
- 1.Pour sloe gin and ginger ale into an ice-filled highball glass.
- 2.Add lemon wedge and enjoy.
Key Takeaways
- ▸Financial systems are high-value targets
- ▸Payment security requires multiple layers
- ▸Fraud detection uses behavioral analysis
Alien Brain Hemorrhage
Alien Brain Hemorrhage
Sherri Davidoff
Digital Forensics Expert
Ingredients
- 1 ozPeach Schnapps
- ½ ozIrish Cream
- DrizzleBlue Curacao
- DrizzleGrenadine
Instructions
- 1.Pour peach schnapps into shot glass.
- 2.Layer the Irish cream on top.
- 3.Drizzle in grenadine.
- 4.Add a splash of blue curacao.
Key Takeaways
- ▸Digital forensics requires methodical investigation
- ▸Evidence preservation is critical for legal proceedings
- ▸Chain of custody ensures evidence integrity
Neon Nightmare
Neon Nightmare
Dr. Magda Chelly
Cybersecurity Executive
Ingredients
- 1 ozCoconut Rum
- 1 ozBlue Curacao
- 1 ozMelon Liqueur
- 1 ozSour Apple Pucker
- TopPineapple Juice
Instructions
- 1.Add ice to tall glass.
- 2.Pour over coconut rum, sour apple pucker, melon liqueur and blue curacao.
- 3.Top with pineapple juice.
- 4.Optionally garnish with cherry.
Key Takeaways
- ▸Diversity strengthens security teams
- ▸Inclusive leadership improves outcomes
- ▸Different perspectives enhance threat detection
Suffering Bastard
Suffering Bastard
Regina Bluman
Security Professional
Ingredients
- 1 ozGin
- 1 ozRum
- 1 ozLime Juice
- TopGinger Ale
- DashBitters
Instructions
- 1.Combine all ingredients into a shaker.
- 2.Shake well.
- 3.Pour over ice.
- 4.Top with Ginger Ale.
Key Takeaways
- ▸Burnout is a real risk in security
- ▸Work-life balance improves performance
- ▸Sustainable careers require boundaries
Time Warp
Time Warp
Igor Volovich
Security Strategist
Ingredients
- 1½ ozRum
- ½ ozGrand Marnier
- ¼ ozLime Juice
- 2 tspGrenadine
Instructions
- 1.Fill a shaker half full with ice cubes.
- 2.Pour all ingredients into shaker and shake well.
- 3.Strain into a glass and serve.
Key Takeaways
- ▸Security has evolved dramatically over time
- ▸Historical perspective informs future planning
- ▸Emerging technologies create new challenges
Chicago Apple Cider
Chicago Apple Cider
Adi Elliott
Security Professional
Ingredients
- 1 ozCanadian Mist Whiskey
- ¼ ozGoldschlager
- To tasteApple Juice
Instructions
- 1.Stir the Canadian Mist whiskey and Goldschlager cinnamon schnapps together in an old fashioned glass half filled with ice cubes.
- 2.Add apple juice to taste.
Key Takeaways
- ▸Regional communities provide local support
- ▸Meetups foster in-person connections
- ▸Local events complement global conferences
110 in the Shade
110 in the Shade
Jim Tiller
Security Executive
Ingredients
- 16 ozLager
- 1½ ozTequila
Instructions
- 1.Fill a shooter with Tequila.
- 2.Drop it into a full beer glass.
- 3.Drink quickly.
Key Takeaways
- ▸Board communication requires business language
- ▸Security strategy must align with business goals
- ▸Executive buy-in enables security investment
Cryptonite
Cryptonite
Gummo
Hacker
Ingredients
- ¾ ozSpiced Rum
- ¾ ozMidori
- ¾ ozCoconut Rum
- ¾ ozPineapple Juice
- SplashBacardi
Instructions
- 1.Pour all ingredients into a shaker with ice.
- 2.Shake vigorously.
- 3.Strain into a chilled glass.
- 4.Garnish with a lime wheel.
Key Takeaways
- ▸Hacking culture has evolved over decades
- ▸Cryptocurrency creates new security challenges
- ▸Underground economies drive cybercrime innovation
007x Martini
007x Martini
Matt Barnett
Security Professional
Ingredients
- 3 ozGin
- 1 ozVodka
- ½ ozDry Vermouth
Instructions
- 1.In a cocktail shaker, combine gin, vodka, and dry vermouth.
- 2.Shake well.
- 3.Strain into a chilled cocktail glass.
- 4.Garnish with a large piece of lemon peel.
Key Takeaways
- ▸Pop culture influences security perception
- ▸Media portrayals affect career interest
- ▸Realistic depictions help education
Yin Yang Martini
Yin Yang Martini
Jeremy Miller
Security Professional
Ingredients
- 1 ozStoli Vanilla Vodka
- ½ ozGodiva White Chocolate Liqueur
- ½ ozWhite Creme de Cacao
- 3 ozVanilla Ice Cream
Instructions
- 1.Blend all ingredients for 15-30 seconds in a blender.
- 2.Pour into a 10 oz chilled martini glass to the rim.
- 3.Garnish with dark chocolate shavings in the shape of a YinYang.
- 4.Place 1 white chocolate disc on the dark side and 1 dark chocolate disc on the white side.
Key Takeaways
- ▸Security and usability must be balanced
- ▸User experience affects security adoption
- ▸Friction can reduce security compliance
Mint Julep
Mint Julep
Louis Rosenberg, PhD
AI Researcher
Ingredients
- 2 ozKentucky Bourbon
- ¼ ozSimple Syrup
- 8 leavesFresh Mint
- FillCrushed Ice
Instructions
- 1.In a rocks glass, muddle fresh mint leaves with simple syrup.
- 2.Add bourbon and pack glass tightly with crushed ice.
- 3.Stir until frosted.
- 4.Top with more crushed ice and garnish with mint sprig.
Key Takeaways
- ▸AI is transforming cybersecurity
- ▸Swarm intelligence offers new approaches
- ▸Human-AI collaboration enhances decisions
Blue Steel
Blue Steel
George Gerchow
Security Executive
Ingredients
- FillBlue Gatorade
- To tasteVodka
- FillIce
Instructions
- 1.Fill a glass full of ice.
- 2.Pour in Vodka and blue Gatorade.
- 3.Mix and enjoy.
Key Takeaways
- ▸Compliance frameworks provide structure
- ▸Regulations drive security investment
- ▸Automation simplifies compliance
Spider Byte
Spider Byte
Nicole Hoffman
Security Professional
Ingredients
- 1 shotWhite Tequila
- ½ canRockstar
Instructions
- 1.Drop the shot in the Rockstar and enjoy.
Key Takeaways
- ▸Threat hunting finds hidden attackers
- ▸Proactive security reduces dwell time
- ▸Hypothesis-driven hunting improves results
Gunfire
Gunfire
Frankie McRae
Military Security Expert
Ingredients
- 1 cupBlack Tea
- 1 shotRum
Instructions
- 1.Pour the shot into the black tea and enjoy.
Key Takeaways
- ▸Military discipline applies to security
- ▸Operations security protects sensitive information
- ▸Leadership lessons transfer to civilian roles
Flux Incapacitator
Flux Incapacitator
Pablos Holman
Inventor & Hacker
Ingredients
- 1 ozRum
- ½ ozGrenadine
- 4 ozPineapple Juice
Instructions
- 1.Fill a shaker with ice.
- 2.Add the Rum and Pineapple juice and shake vigorously.
- 3.Strain into a cocktail glass or double rocks glass.
- 4.Gently pour in the grenadine.
Key Takeaways
- ▸Innovation requires unconventional thinking
- ▸Hackers solve problems creatively
- ▸Technology can address global challenges
Absinthe Drip
Absinthe Drip
Mark Carney and Victoria Kumaran
Security Professionals
Ingredients
- 1½ ozAbsinthe
- 1 cubeSugar
- 4-6 ozIce-cold Filtered Water
Instructions
- 1.Pour Absinthe into a stemmed glass.
- 2.Place a slotted absinthe spoon over the rim of the glass and set a single sugar cube on top.
- 3.Using an absinthe fountain, slowly drip ice-cold filtered water over the sugar cube.
- 4.When the mixture is completely cloudy, the drink is ready.
Key Takeaways
- ▸Partnerships multiply security effectiveness
- ▸Collaboration requires trust building
- ▸Shared goals align security teams
Renegade
Renegade
Anastasia Edwards
Security Professional
Ingredients
- 1 ozBourbon
- 1 ozMezcal
- ¾ ozYellow Chartreuse
- 1 dashOrange Bitters
- 1 dashAngostura Bitters
Instructions
- 1.Combine all ingredients and stir over ice until well chilled.
- 2.Pour in a chilled glass.
- 3.Garnish with orange twist.
Key Takeaways
- ▸Challenging assumptions leads to innovation
- ▸Unconventional approaches find new solutions
- ▸Question established practices regularly
Class Act
Class Act
Alyssa Miller
Security Advocate & Leader
Ingredients
- 1 ozSouthern Comfort
- 1 ozAdvocaat
- ½ ozCoconut Rum
- 2 ozPineapple Juice
Instructions
- 1.Pour all ingredients into a shaker of ice.
- 2.Shake well.
- 3.Strain into a rocks glass full of ice.
- 4.Constantly mix the drink in your glass, because the Advocaat will settle.
Key Takeaways
- ▸Advocacy amplifies security messages
- ▸Community leadership creates change
- ▸Empowering others multiplies impact
The Red Pill
The Red Pill
Jeff Jockisch and Dave Burnett
Privacy Experts
Ingredients
- 2 ozPomegranate Juice
- 1½ ozBourbon
- ½ ozRaspberry Liqueur
- 1 tspMaple Syrup
- ½Lemon
- 2 ozCold Club Soda
Instructions
- 1.Add pomegranate juice, bourbon, raspberry liqueur, and maple syrup to a glass and mix.
- 2.Place an ice ball into another glass, then pour in the bourbon mixture.
- 3.Place the tip of a spoon at the surface and slowly pour lemon juice to layer.
- 4.Repeat with club soda layer to fill the glass.
Key Takeaways
- ▸Personal data requires protection
- ▸Privacy regulations continue to evolve
- ▸Data brokers pose privacy risks
Phishbowl
Phishbowl
Arun Vishwanath
Phishing Researcher
Ingredients
- 2 ozVodka
- 2 ozCoconut Rum
- 1½ ozPeach Schnapps
- 2 ozBlue Raspberry Vodka
- 2 ozSprite
- SomeNerds Candy
- SomeSwedish Fish
Instructions
- 1.In a shaker filled with ice, pour in all liquor.
- 2.Shake well to mix.
- 3.Throw some Nerds candy and Swedish Fish into the base of a round glass.
- 4.Fill with ice and pour the mix in.
- 5.Top with Sprite.
Key Takeaways
- ▸Phishing exploits psychological vulnerabilities
- ▸User behavior is predictable
- ▸Training alone is insufficient
Hologram Shot
Hologram Shot
Charlie Northrup
Security Professional
Ingredients
- 1 partBlue Curacao
- 1 partBanana Liqueur
- 1 partCranberry Juice
Instructions
- 1.Place all ingredients into a shaker with ice.
- 2.Shake and strain into a shot glass.
Key Takeaways
- ▸Emerging tech creates security opportunities
- ▸Virtual environments need security too
- ▸Augmented reality has security applications
Storyteller
Host File
Jack Rhysider
Creator & Host of Darknet Diaries
Ingredients
- 1 ozCatan Pisco
- 1 ozAverna
Instructions
- 1.Stir ingredients and strain into a rocks glass.
- 2.Garnish with orange swath.
- 3.Optionally add smoked cinnamon bitters.
Key Takeaways
- ▸Storytelling makes security accessible
- ▸Every incident has a human story
- ▸Research and accuracy are paramount
VTEC Punch
VTEC Punch
Robert Leale
Automotive Security Researcher
Ingredients
- 2 ozBourbon
- ½ ozLemon Juice
- ½ ozSimple Syrup
- 1Egg White
Instructions
- 1.Fill a glass with ice cubes and pour bourbon in.
- 2.Add lemon juice, simple syrup and egg white.
Key Takeaways
- ▸Connected cars create new attack surfaces
- ▸Automotive security is critical for safety
- ▸Vehicle systems are increasingly complex
CyCLONE
CyCLONE
Eran Sinai
Security Professional
Ingredients
- 1 ozCointreau
- 2 ozTequila
- ½ ozFresh Lime Juice
Instructions
- 1.Add all ingredients to shaker with ice.
- 2.Shake well.
- 3.Strain into glass.
- 4.Garnish with orange swath.
- 5.Optionally add smoked cinnamon bitters.
Key Takeaways
- ▸Automation multiplies security effectiveness
- ▸Orchestration connects security tools
- ▸Scalable operations handle growing threats
Decepticon
The Con Artist
Brett Johnson
Former US Most Wanted Cybercriminal
Ingredients
- 1½ ozGin
- ½ ozMezcal
- ½ ozMaraschino Liqueur
- ¾ ozFresh Lemon Juice
Instructions
- 1.Add all ingredients to a cocktail shaker with ice.
- 2.Shake for 15 seconds.
- 3.Strain into a chilled martini glass.
- 4.Garnish with lemon twist and serve.
Key Takeaways
- ▸Understanding criminals improves defenses
- ▸Trust systems exist in criminal communities
- ▸Redemption is possible in cybersecurity
Chainsaw Shot
Chainsaw Shot
Joel Burleson-Davis
Security Professional
Ingredients
- 1½ ozChilled Tequila
- 2 dropsTabasco
- 1 splashLime Juice
- 1 splashLemon-Lime Mix
- 1 pinchBlack Pepper
Instructions
- 1.Place tequila, Tabasco, lime juice and lemon-lime mix into a shaker with ice.
- 2.Shake and strain into a freezer chilled shot glass.
- 3.Garnish with a single pinch of black pepper.
Key Takeaways
- ▸Simplicity improves security effectiveness
- ▸Complexity is the enemy of security
- ▸Clear priorities focus security efforts
Finnish Long Drink
Ghosts in the Machine
Mikko Hypponen
Chief Research Officer, F-Secure
Ingredients
- 2 ozGin
- ½ ozLemon Juice
- ½ ozUnsweetened Cranberry Juice
- 4 ozGrapefruit Soda
Instructions
- 1.Add gin, lemon juice and unsweetened cranberry juice to an ice-filled highball glass.
- 2.Top with Grapefruit Soda.
Key Takeaways
- ▸Malware has evolved into sophisticated weapons
- ▸Nation-states changed the threat landscape
- ▸Balance offense and defense capabilities
Jager Bomb
Jager Bomb
Crane Hassold
Threat Intelligence Expert
Ingredients
- 1½ ozJagermeister
- ½ can (8.4oz)Red Bull
Instructions
- 1.Fill a shot glass with Jägermeister.
- 2.Pour half a can of Red Bull into a pint glass.
- 3.Drop the shot glass into the taller glass.
- 4.Drink immediately and enjoy.
Key Takeaways
- ▸BEC is a billion-dollar threat
- ▸Threat intelligence reveals attacker patterns
- ▸Understanding motivation improves defenses
Death in the Afternoon
Death in the Afternoon
Robert Bateman
Privacy Expert
Ingredients
- 1½ ozAbsinthe
- 4½ ozChilled Champagne
Instructions
- 1.Pour the absinthe into a coupe.
- 2.Top slowly with the Champagne.
Key Takeaways
- ▸Privacy regulations are expanding globally
- ▸GDPR set the standard for privacy laws
- ▸Compliance requires ongoing effort
Red Rum
Red Rum
Mike Jones
Security Professional
Ingredients
- 2 ozRum
- 1 ozGrenadine
- 2½ ozOrange Juice
Instructions
- 1.Mix rum and grenadine in a cocktail shaker.
- 2.Pour into a highball glass over crushed ice and orange juice.
- 3.Garnish with a maraschino cherry and an orange or lime slice.
Key Takeaways
- ▸Red teams reveal real vulnerabilities
- ▸Adversary simulation tests true readiness
- ▸Realistic scenarios improve defenses
Mad Dog 20/20
Mad Dog 20/20
Jim Lawler
Former CIA Officer
Ingredients
- 20 ozAmerican Fortified Wine
Instructions
- 1.No preparation required.
- 2.Ready to drink.
Key Takeaways
- ▸Intelligence operations inform cyber defense
- ▸Espionage techniques apply to corporate security
- ▸Human intelligence complements technical intelligence
The Analyzer
The Analyzer
Jason Brooks and Keenan Hale Jr.
Security Analysts
Ingredients
- 1½ ozGin
- 1 ozLillet Blanc
- ½ ozLemon Juice
- ½ ozSimple Syrup
- 1 dashBitters
- TopClub Soda
Instructions
- 1.Combine gin, Lillet Blanc, lemon juice, simple syrup, and bitters in a shaker with ice.
- 2.Shake well.
- 3.Strain into a highball glass filled with ice.
- 4.Top with club soda.
Key Takeaways
- ▸Analysis transforms data into insights
- ▸Context is crucial for accurate analysis
- ▸Analytical skills can be developed
GPT Special
GPT Special
John Miller
AI Security Researcher
Ingredients
- 2 ozGin
- 1 ozPassion Fruit Syrup
- TopTonic Water
Instructions
- 1.Fill a highball glass with ice cubes.
- 2.Pour in the gin, passion fruit syrup, and tonic water.
- 3.Stir gently.
Key Takeaways
- ▸AI introduces new security challenges
- ▸LLMs can be manipulated through prompts
- ▸AI security requires new frameworks
Hacksaw
Hacksaw
Bruce Schneier
Security Technologist & Author
Ingredients
- 1 ozVodka
- 1 ozOrange Juice
- 2 ozOrange Soda
Instructions
- 1.In an ice filled glass, pour in the vodka.
- 2.Add orange juice.
- 3.Top with orange soda.
Key Takeaways
- ▸Security economics drive decisions
- ▸Policy shapes security outcomes
- ▸Security theater provides false comfort
Enforcer
Enforcer
Andres Andreu
Security Professional
Ingredients
- 2 ozBourbon
- 5 ozGinger Ale
- ¼ ozLime Juice
Instructions
- 1.Put ice into a glass.
- 2.Add the bourbon and lime juice.
- 3.Top off with ginger ale.
Key Takeaways
- ▸Policies must be enforced to be effective
- ▸Enforcement requires monitoring
- ▸Exceptions undermine security policies
Kombucha Mojito
Kombucha Mojito
FC
Security Professional
Ingredients
- 1 cupKombucha
- 1 tbspHoney
- 8-10 leavesMint
- ½Lime
- TopClub Soda
Instructions
- 1.In a cocktail shaker, muddle mint leaves and lime juice.
- 2.Add honey and kombucha.
- 3.Stir well and pour mixture into glass.
- 4.Top with club soda and stir again.
Key Takeaways
- ▸Health impacts security performance
- ▸Stress management is essential
- ▸Work-life balance prevents burnout
Scanalyzer
Scanalyzer
Nelson Santos
Security Professional
Ingredients
- 2 ozGin
- ¾ ozLime Juice
- TopTonic Water
Instructions
- 1.Fill glass with ice.
- 2.Add in the gin and lime juice.
- 3.Top off with Tonic water.
- 4.Stir gently.
- 5.Optionally garnish with a lime wedge.
Key Takeaways
- ▸Scanning reveals known vulnerabilities
- ▸Automation enables continuous assessment
- ▸Scan results require context
Texas Tornado
Texas Tornado
Phillip Wylie
Offensive Security Instructor
Ingredients
- 1 partSouthern Comfort
- 1 partPineapple Juice
- 1 partSprite
Instructions
- 1.Combine all ingredients in shaker.
- 2.Shake well.
- 3.Pour the mixture into a rocks glass with ice.
- 4.Leave it for a few minutes to chill.
Key Takeaways
- ▸Regional communities provide support
- ▸Local conferences offer unique value
- ▸Networking builds career opportunities
4 Branches Bourbon
4 Branches Bourbon
Ric Prado
Former CIA Paramilitary Officer
Ingredients
- 2 oz4 Branches Bourbon, Founders Edition
Instructions
- 1.Pour 2 oz of bourbon into the whiskey glass.
- 2.Swirl, smell the aromas.
- 3.Take a small sip, savor the flavors.
- 4.Swallow and then exhale.
- 5.Enjoy slowly.
Key Takeaways
- ▸Covert operations require meticulous planning
- ▸Experience teaches invaluable lessons
- ▸Leadership under pressure defines success
Labyrinth
Labyrinth
Larry Herzog
Security Professional
Ingredients
- 1 partRye Bourbon
- ½ partOloroso Sherry
- ¼ partAmaretto
- 3 dashesAngostura Bitters
Instructions
- 1.Stir all ingredients with ice.
- 2.Strain into a rocks glass over a large cube.
- 3.Optionally garnish with an orange peel and a cherry.
Key Takeaways
- ▸Complex problems require systematic approaches
- ▸Persistence helps navigate challenges
- ▸Multiple paths may lead to solutions
The Last Mechanical Art
The Last Mechanical Art
Allen Woods
Security Professional
Ingredients
- ¾ ozMezcal
- ¾ ozCynar
- ¾ ozSweet Vermouth
- ¾ ozCampari
Instructions
- 1.Stir ingredients with ice.
- 2.Strain into a chilled coupe glass.
- 3.Garnish with an orange twist.
Key Takeaways
- ▸Security is a craft requiring practice
- ▸Mastery comes through experience
- ▸Artisanal approaches add value
Avatar
Avatar
Colleen Lennox and Jason Brooks
Security Professionals
Ingredients
- 1 ozVodka
- ½ ozBlue Curacao
- ½ cupLemonade
- ¼ cupOrange Juice
- FillIce
Instructions
- 1.Pour all ingredients over ice into a glass.
- 2.Top off with Orange Juice.
Key Takeaways
- ▸Digital identity requires protection
- ▸Online personas can be exploited
- ▸Identity verification prevents fraud
Non-Fiction
Non-Fiction
Tracy Z. Maleeff
Information Security Librarian
Ingredients
- 1½ ozGin
- ¾ ozElderflower Liqueur
- ½ ozFresh Lemon Juice
- ½ ozLavender Syrup
- 2 dashesOrange Bitters
Instructions
- 1.In a cocktail shaker with ice, add all ingredients.
- 2.Shake vigorously for 10-15 seconds to chill.
- 3.Strain into a chilled martini glass.
- 4.Garnish with a sprig of fresh lavender.
Key Takeaways
- ▸Information literacy is a security skill
- ▸Research skills improve security work
- ▸Accurate information enables decisions
The Shadow
The Shadow
Mike Petrie
Security Professional
Ingredients
- 2 ozGin
- 1 ozChilled Earl Grey Tea
- ½ ozCreme de Violette
- ½ ozFresh Lemon Juice
Instructions
- 1.In a cocktail shaker, combine gin, chilled Earl Grey tea, Crème de Violette, and fresh lemon juice.
- 2.Fill the shaker with ice and shake vigorously.
- 3.Strain into chilled glass.
- 4.Optionally garnish with a lemon twist.
Key Takeaways
- ▸Shadow IT creates hidden risks
- ▸Visibility is essential for security
- ▸Unknown assets cannot be protected
Gotham Martini
Gotham Martini
Ron Nissim
Security Professional
Ingredients
- 2 ozVodka
- 1 splashBlackberry Schnapps
- 1 splashBlack Sambuca
Instructions
- 1.In a cocktail shaker filled with ice, combine all ingredients.
- 2.Shake vigorously for 10-15 seconds.
- 3.Strain into chilled glass.
Key Takeaways
- ▸Urban environments have unique security needs
- ▸Critical infrastructure requires protection
- ▸City-scale security is complex
The U.P.C.
The U.P.C.
Paul V. McEnroe
Co-Creator of the UPC Barcode
Ingredients
- 1 ozUnaged Rum
- 1 ozPeach Liqueur
- 1 ozCranberry Juice
Instructions
- 1.Combine all ingredients in a glass with ice.
- 2.Gently stir the mixture.
- 3.SCAN WITH CAUTION.
Key Takeaways
- ▸Simple innovations transform industries
- ▸Standardization enables interoperability
- ▸Technology history informs the future
Superhero Sipper
X-Factor
Vivek Ramachandran
Founder, SecurityTube & Pentester Academy
Ingredients
- 1 ozCognac
- ½ ozAppleton Estate Rum
- ¾ ozDry Amontillado Sherry
- ½ ozAmaro Nonino
- ½ ozMaple Syrup
- 1 dashAromatic Bitters
- 1 dashAngostura Bitters
Instructions
- 1.Stir all of the ingredients over ice.
- 2.Strain into a coupe.
- 3.No garnish.
Key Takeaways
- ▸Quality education should be accessible
- ▸Hands-on practice develops skills
- ▸Community learning amplifies impact
Crooked Tree
Crooked Tree
Kevin Pentecost and Jason Popillion
Security Professionals
Ingredients
- 2 ozBourbon
- ¾ ozLemon Juice
- ¾ ozHoney Syrup
Instructions
- 1.Combine all ingredients into a shaker with ice.
- 2.Shake well.
- 3.Fine strain into a rocks glass.
Key Takeaways
- ▸Diverse paths lead to security careers
- ▸Unique backgrounds add value
- ▸Non-traditional skills transfer well
Paloma
Paloma
Peter Schawacker
Security Professional
Ingredients
- 2 ozBlanco Tequila
- ½ ozFresh Lime Juice
- ½ ozSimple Syrup
- ¼ cupGrapefruit Juice
- TopSparkling Water
- FillIce
Instructions
- 1.Fill a glass with ice.
- 2.Add in tequila, lime juice, simple syrup and grapefruit juice.
- 3.Top off with sparkling water.
- 4.Optionally garnish with a lime.
Key Takeaways
- ▸Fresh perspectives reinvigorate work
- ▸Staying current requires effort
- ▸Enthusiasm is contagious
Lone Ranger
Lone Ranger
Wirefall
Security Researcher
Ingredients
- 1½ ozBlanco Tequila
- ¾ ozFresh Lemon Juice
- ½ ozSimple Syrup
- 2 ozSparkling Wine
Instructions
- 1.Fill a shaker with ice.
- 2.Add in tequila, lemon juice and simple syrup.
- 3.Shake well.
- 4.Strain into an ice filled glass.
- 5.Top with sparkling wine.
- 6.Optionally garnish with a lime twist.
Key Takeaways
- ▸Independent research offers freedom
- ▸Solo work requires self-motivation
- ▸Individual contributions matter
The Hallucination
The Hallucination
Hutch
Security Professional
Ingredients
- 1 ozElderflower Liqueur
- 1 ozAbsinthe
- 1 ozFresh Lemon Juice
- TopGuava Soda
Instructions
- 1.Add ice into a chilled cocktail glass.
- 2.Add the Elderflower Liqueur, Absinthe, and lemon juice into a cocktail shaker without ice.
- 3.Shake vigorously.
- 4.Strain into the glass with ice.
- 5.Top off with guava soda.
Key Takeaways
- ▸Deception is a powerful attack technique
- ▸Misdirection diverts attention
- ▸False perceptions enable attacks
Wildcard
Wildcard
Iceman
Security Professional
Ingredients
- 1 ozCardamaro
- 1 ozGenever
- 1 ozCynar
Instructions
- 1.Add all ingredients to a shaker filled with ice.
- 2.Stir until chilled and properly diluted.
- 3.Strain into a lowball glass filled with fresh ice.
- 4.Optionally garnish with a sprig of rosemary or an orange peel.
Key Takeaways
- ▸Unpredictable threats require flexibility
- ▸Black swan events can be catastrophic
- ▸Preparation helps with the unexpected
The Replicant
The Replicant
Izzy Traub
Security Professional
Ingredients
- 1½ ozVodka
- ¾ ozMidori
- ¾ ozLemon Juice
- ½ ozSimple Syrup
Instructions
- 1.Combine all ingredients into a shaker with ice.
- 2.Shake well.
- 3.Strain into a chilled cocktail glass.
Key Takeaways
- ▸Deepfakes create new security risks
- ▸Synthetic media is increasingly realistic
- ▸Detection tools are evolving
Purple Haze
The Human Factor
Jessica Barker
Co-Founder, Cygenta
Ingredients
- 2 ozGin
- 1 ozViolet Liqueur
- 1 ozFresh Lemon Juice
- ½ ozHoney Syrup
- 1 dashOrange Bitters
Instructions
- 1.Combine all ingredients in a shaker with ice.
- 2.Shake well.
- 3.Strain into a chilled glass.
- 4.Optionally garnish with a twist of lemon peel or a sprig of lavender.
Key Takeaways
- ▸Security culture must be built
- ▸Psychology improves security outcomes
- ▸Effective training engages users
Fallen Angel
Fallen Angel
Chris Wright
Security Professional
Ingredients
- 2 ozDry Gin
- 1 ozLemon Juice
- 2 tspCreme De Menthe
- 2 tspSimple Syrup
- 2 dashesAromatic Bitters
Instructions
- 1.Combine all ingredients in a shaker with ice.
- 2.Shake well for 15-20 seconds for maximum chill.
- 3.Strain into a cocktail glass.
- 4.Optionally garnish with mint.
Key Takeaways
- ▸Failures provide learning opportunities
- ▸Setbacks can drive improvement
- ▸Resilience helps overcome challenges
Circuit Breaker
Circuit Breaker
Len Noe
Biohacker & Security Researcher
Ingredients
- 1 ozDon Q 151 Rum
- 1 ozHeering Cherry Liqueur
- 1 ozLemon Juice
- ½ ozSimple Syrup
Instructions
- 1.Combine all ingredients into a shaker with crushed ice.
- 2.Shake for 10 seconds.
- 3.Strain into an old fashioned glass.
Key Takeaways
- ▸Biohacking raises new security questions
- ▸Implantable devices need security
- ▸Human enhancement has implications
Empathy Elixir
Empathy Elixir
Tammy Klotz
Security Leader
Ingredients
- 2 ozBourbon
- 1 ozElderflower Liqueur
- ½ ozLemon Juice
- 1 dashBitters
Instructions
- 1.Combine all ingredients in a shaker with ice.
- 2.Shake thoroughly.
- 3.Strain into a glass.
- 4.Optionally garnish with a lemon twist.
Key Takeaways
- ▸Empathy improves security leadership
- ▸Understanding users improves security
- ▸People-first security works better
Scorpion
Compliance Catalyst
Josh Marpet
CSO, Cyturus
Ingredients
- 2 ozLight Rum
- 0.5 ozCognac
- 2 ozOrange Juice
- 0.75 ozLemon Juice
- 0.5 ozOrgeat
Instructions
- 1.Shake all ingredients with ice.
- 2.Strain into a tall glass filled with ice.
Key Takeaways
- ▸Compliance drives security improvement
- ▸Risk management adapts to threats
- ▸Community building strengthens the industry
Soundwave
Syntax
Brandon Prince
Hacker, DJ & Motorcycle Racer
Ingredients
- 50 mlGrapefruit Tequila
- 15 mlAbsinthe
- 10 mlBlue Curaçao
- 1 pinchSichuan Pepper
- 2 ozClub Soda
Instructions
- 1.Shake spirits with ice.
- 2.Strain into highball with ice.
- 3.Top with club soda carefully.
Key Takeaways
- ▸Hacker culture embraces diverse interests
- ▸Creativity fuels security research
- ▸Community events build connections
Apple Envy
OSXploit
Slava Konstantinov
Mac Lead Engineer, ThreatLocker
Ingredients
- 2 slicesChopped Apple
- 2 ozCrown Apple Whisky
- 1 tspSimple Syrup
- 4 ozGinger Beer
Instructions
- 1.Muddle apple with syrup.
- 2.Add whisky and ice.
- 3.Stir and top with ginger beer.
Key Takeaways
- ▸Mac security requires specialized approaches
- ▸Endpoint protection is essential
- ▸Apple deployments face unique challenges
Phantom Cocktail
Ghost Protocol
Scotch Wichmann
Cybersecurity Expert & Paranormal Researcher
Ingredients
- 1.5 ozCiroc Vodka
- 0.5 ozDomaine de Canton
- 0.25 ozChambord
- 0.25 ozBenedictine
Instructions
- 1.Combine ingredients and pour over ice sphere in martini glass.
- 2.Garnish with lemon zest and cherry.
Key Takeaways
- ▸Unconventional paths lead to security careers
- ▸Curiosity drives innovation
- ▸Research spans beyond traditional boundaries
Mechanical Orange
Torque
Curt Vincent
Security Professional
Ingredients
- 50 mlVodka
- 0.5 wholeOrganic Orange
- 2 tspFine Sugar
- 1 cupCrushed Ice
Instructions
- 1.Muddle orange and sugar.
- 2.Add crushed ice and vodka.
- 3.Stir gently.
Key Takeaways
- ▸Automation improves security efficiency
- ▸Engineering mindset solves problems
- ▸Mechanical thinking aids defense
Jedi Mind Trick
NeuroVector
Dr. Matt Canham
Cognitive Security Researcher
Ingredients
- 1.5 ozGrapefruit & Rose Vodka
- 1 ozWhite Grape Juice
- 0.75 ozFalernum
- 0.25 ozLime Juice
Instructions
- 1.Shake all ingredients with ice.
- 2.Strain into a chilled glass.
Key Takeaways
- ▸Cognitive security protects minds
- ▸Deep fakes challenge trust
- ▸AI enables sophisticated manipulation
The Alchemist
Statline
Mariano Mattei
VP of Cybersecurity and AI
Ingredients
- 1.5 ozScotch Whisky
- 1 ozLillet Blanc
- 0.5 ozBlood Orange Liqueur
- 2 dashesOrange Bitters
Instructions
- 1.Stir ingredients with ice.
- 2.Strain into a chilled cocktail glass.
Key Takeaways
- ▸AI transforms security operations
- ▸Data science informs defense
- ▸Statistics guide security decisions
Shapeshifter
Reality Defaced
Perry Carpenter
Security Awareness Expert & Author
Ingredients
- 2 ozBourbon
- 0.75 ozAmaro
- 0.75 ozSweet Vermouth
- 0.5 ozCampari
Instructions
- 1.Stir with ice.
- 2.Strain into rocks glass over fresh ice.
Key Takeaways
- ▸Deepfakes challenge authentication
- ▸Misinformation spreads rapidly
- ▸AI enables manipulation tactics
Danger Zone
Silent War
Derek Fisher
Cybersecurity & Engineering Expert
Ingredients
- 1.5 ozBourbon
- 0.5 ozArdbeg Scotch
- 0.75 ozSweet Vermouth
- 0.25 ozMirto
- 2 dashesPlum Bitters
Instructions
- 1.Stir with ice.
- 2.Strain into rocks glass with large cube.
- 3.Garnish with lemon twist.
Key Takeaways
- ▸Threat modeling informs security design
- ▸AI changes attack patterns
- ▸Architecture determines resilience
Redrum
MikeHacksThings
Mike Lisi
Security Consultant & Red Team Village Leader
Ingredients
- 0.5 ozRum
- 0.75 ozLime Juice
- 4 ozPomegranate Juice
- 1 tbspPomegranate Seeds
Instructions
- 1.Build over ice in highball glass.
- 2.Stir gently.
- 3.Garnish with pomegranate seeds.
Key Takeaways
- ▸Certifications validate skills
- ▸Community builds expertise
- ▸Red teaming requires continuous learning
Brightstar
DELTA K
Charlie Northrup, Keenan Hale & Mike Elkins
AI & Mathematics Researchers
Ingredients
- 0.5 ozCrème de Banana
- 0.5 ozCrème de Noyaux
- 0.25 ozCrème de Cacao
- 0.25 ozBlue Curaçao
Instructions
- 1.Layer ingredients carefully using back of spoon.
Key Takeaways
- ▸Mathematics underpins AI security
- ▸LLMs introduce new attack surfaces
- ▸Theoretical frameworks guide practice
Blade Runner
Soulware
Matthew Chavira
CEO, Profits of AI
Ingredients
- 2 ozLight Gold Rum
- 0.5 ozOverproof Rum
- 2.5 ozPineapple Juice
- 0.5 ozCane Syrup
Instructions
- 1.Shake with ice.
- 2.Strain into Collins glass with ice.
- 3.Garnish and serve.
Key Takeaways
- ▸Humanoid robots raise security questions
- ▸AI autonomy requires safeguards
- ▸Technology advances require ethics
The Diplomat
Worldwide Security
Fred Heiding
Researcher, Harvard Belfer Center
Ingredients
- 1.5 ozDry Vermouth
- 0.75 ozSweet Vermouth
- 0.125 ozMaraschino Liqueur
- 2 dashesOrange Bitters
Instructions
- 1.Stir with ice in Old Fashioned glass.
- 2.Express lemon peel and garnish.
Key Takeaways
- ▸National cybersecurity requires collaboration
- ▸AI threats demand new defenses
- ▸Technical talent belongs in policy
Cyber Chimarrão
The Chosen One
Filipi Pires
Security Researcher
Ingredients
- 2 tbspErva-mate
- 8 ozHot Water
Instructions
- 1.Prepare erva-mate in cuia.
- 2.Add hot water.
- 3.Sip through bomba.
- 4.Refill as needed.
Key Takeaways
- ▸Identity management is critical
- ▸Legacy systems harbor vulnerabilities
- ▸Conference experiences shape careers
Sensei
InfoSec Pat
Patrick Gorman
Cybersecurity Professional
Ingredients
- 2 ozJamaican Rum
- 0.75 ozLemon Juice
- 0.5 ozSimple Syrup
- 2 dashesBitters
Instructions
- 1.Shake with ice.
- 2.Strain into chilled glass.
- 3.Garnish with lemon peel.
Key Takeaways
- ▸Career development takes persistence
- ▸Community building amplifies impact
- ▸Practical advice helps newcomers
Darth Vader
The Force
Kevin Johnson
Security Consultant & Educator
Ingredients
- 1.5 ozDark Rum
- 0.5 ozBlack Cherry Syrup
- 0.5 ozSour Cherry Schnapps
- 4 ozSprite
Instructions
- 1.Place filled shot glass upside down in rocks glass.
- 2.Pour remaining ingredients around it.
- 3.Release shot when ready.
Key Takeaways
- ▸Career evolution requires adaptability
- ▸Pentesting demands continuous learning
- ▸Ethical hacking serves defense
The Falcon
FlightPath
Josh Mason
Security Leader
Ingredients
- 2 ozDark Rum
- 0.75 ozLime Juice
- 2 dashesAngostura Bitters
- 4 ozCola
Instructions
- 1.Build over ice in Collins glass.
- 2.Stir gently.
- 3.Top with cola.
- 4.Garnish with lime.
Key Takeaways
- ▸Business language resonates with leadership
- ▸Risk communication requires translation
- ▸Security must align with business goals
Shadow Elixir
Inner Hacker
Ted Harrington
Security Author & Executive
Ingredients
- 1 ozVodka
- 0.5 ozCrème de Cacao
- 0.25 ozCoca-Cola
- 1 pinchActivated Charcoal
Instructions
- 1.Chill shot glasses.
- 2.Shake vodka, crème de cacao, Coca-Cola, and activated charcoal with ice.
- 3.Strain into shot glasses.
Key Takeaways
- ▸The hacker mindset improves defense
- ▸Security must be built in early
- ▸Culture drives security outcomes
Bounty Hunter
Revelation
Casey Ellis
Founder, Bugcrowd
Ingredients
- 2 ozBourbon
- 1 ozCoconut Liqueur
- 0.5 ozFresh Lime Juice
- 0.5 ozSimple Syrup
- 4 leavesMint
Instructions
- 1.Gently muddle mint with simple syrup.
- 2.Add bourbon, coconut liqueur, lime juice, and ice.
- 3.Shake briefly.
- 4.Strain into glass.
Key Takeaways
- ▸Crowdsourced security scales defense
- ▸Vulnerability disclosure benefits all
- ▸Platforms enable collaboration
Iteration No. 3
Flow State
Yuriy Tsibere
Security Professional
Ingredients
- 1 ozGin
- 0.5 ozAperol
- 0.5 ozLemon Juice
- 0.5 ozHoney Syrup
- 3 ozTonic Water
Instructions
- 1.Shake everything except tonic with ice.
- 2.Strain into Collins glass.
- 3.Top with tonic.
- 4.Garnish with rosemary sprig.
Key Takeaways
- ▸Flow state enhances performance
- ▸Focus is critical in incident response
- ▸Mental health matters in security
Sonik Shot
K1NOSA
Amar Sonik
Organizer, BSides Singapore
Ingredients
- 1 partGrenadine
- 2 partsPeppermint Schnapps
- 4 partsBlue Curaçao
Instructions
- 1.Pour grenadine first.
- 2.Carefully layer peppermint schnapps.
- 3.Then layer blue curaçao.
- 4.Serve as a layered shot.
Key Takeaways
- ▸Community conferences empower growth
- ▸Regional scenes need local champions
- ▸BSides events democratize security
Purple Panda Punch
Panda
John Aff
Security Professional (PANDA)
Ingredients
- 2 ozVodka
- 1 ozBlue Curaçao
- 1 ozCranberry Juice
- 1 ozPineapple Juice
- 0.75 ozLemon Juice
Instructions
- 1.Add all ingredients to shaker with ice.
- 2.Shake vigorously for 20 seconds.
- 3.Pour into tall glass with fresh ice.
- 4.Serve.
Key Takeaways
- ▸Threat hunting requires dedication
- ▸Research drives security innovation
- ▸Expertise grows with experience
Handcuff
Trespass
Corey LeBleu
Security Professional
Ingredients
- 1 ozCaptain Morgan Spiced Rum
- 6 ozCoca-Cola
- 1 dashVanilla Extract
Instructions
- 1.Mix spiced rum in a highball glass over ice.
- 2.Add vanilla extract.
- 3.Fill with Coca-Cola.
Key Takeaways
- ▸Physical security tests reveal gaps
- ▸Social engineering bypasses technology
- ▸Authorization is essential for testing
Thank You for Listening!
We hope you enjoy these cocktails as much as we enjoyed creating them. Cheers to great conversations and even better drinks!
Find more episodes and recipes at
barcodesecurity.com/cocktails
Security Podcast