SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
DIY Education in Cyber Security
Kelly Shortridge July 30, 2015
Agenda
My goal is to help you figure out where and how to
start your learning journey by answering:
 What careers are there?
 How do I learn more about the field?
 How do I meet people / network?
 How do I stay current on industry trends?
2
Who am I?
Hi, I’m Kelly Shortridge
 Currently doing exciting things on the business side
of infosec
 Previously advised infosec companies on M&A and
private capital raise deals
 No technical background
 Built a knowledge base and network within infosec
from scratch
3
Career Paths
5
The “You Can’t Sit With Us” Myth
InfoSec as a professional field can seem a bit opaque,
insular and unapproachable.
In reality, it’s a blossoming field offering exciting
opportunities for a variety of skill sets and
interests…and not just full of cliques of “mean nerds”
6
InfoSec = Opportunity
Diverse potential paths to follow within infosec:
 Application Security
 Compliance & Policy
 Data Forensics & Incident Response
 Network Security Engineer / Ops & Monitoring
 Penetration Testing
 Security Architecture
 Security Solution Development
 Vulnerability Research & Reverse Engineering
7
InfoSec = Flexibility
Roles often overlap and have fuzzy boundaries
 Cover different aspects of the lifecycle of security
operations
Some areas of study are broadly applicable
 Data Science
 Math
 Network & System Architecture
 Software Development
8
Current Hotness
9
Skill Sets – Example #1
Network Security Engineer / Ops & Monitoring
 Understand network design & architecture
 Familiarity with security tech – IDS/IPS, SIEM,
firewalls, vulnerability detection & remediation
 Develop custom tooling for security monitoring
 Some knowledge on machine learning is a plus
10
Skill Sets – Example #2
Vulnerability Research & Reverse Engineering
 Analyze malicious code, shellcode, packed &
obfuscated code
 Identify attacker methodology
 Strong math abilities, particularly graph theory
 Familiarity with IDA Pro and user & kernel-mode
debuggers
 Languages: Assembly (x86 & x64), C/C++, Python
11
Skill Sets – Example #2
Application Security
 Audit applications for vulnerabilities (XSS, SQLI, logic
flaws, etc.)
 Understanding of application architecture
 Help development teams implement SDL
 Build tooling to improve testing & auditing
 Languages: Java, PHP, C / C++, Python, Ruby
12
Potential Employers
Major hubs include SF, NYC & DC – each city has its
own “flavor” driven by employer base
Government Private Vendors
Defense Contractors &
Gov’t Agencies
Tech, Finance, Media,
eCommerce, etc.
Security Vendors &
Consultancies
13
Broader Applicability
Security can serve as a differentiator in non-sec roles
 Anyone in the development process (design, UX,
etc.) should have the ability to consider security
implications of their decisions
 PR, legal and finance personnel should understand
their organization’s security risk profile
14
Find Your Purpose
Intersection of what you love doing, what you’re good
at doing, what is paid for and what the market needs
 Talent shortage in + known need for infosec means
you can focus on what you love + where you excel
Learning More
16
Where to Start?
Regardless of whether you’re a complete beginner,
switching fields or already successfully entered the
field, there’s plenty of knowledge and skills to gain.
17
Formal Education
Academia
Certifications
 Helpful if no other means of vetting abilities
18
Online Education
There are now tons of online resources available for
learning languages, development and data science
 Some free, some paid (often you get a certificate)
 Consistency is key; set a daily goal for practicing
19
Old-School Resources
If you prefer the more traditional book approach, try:
 The Art of Software Security Assessment
 Hacking: The Art of Exploitation
 The Shellcoder's Handbook
 Android Hacker's Handbook
 iOS Hacker's Handbook
20
CTFs & Other Games
Allows you to improve & show off your skills
 CTFs: DEFCON CTF, CSAW CTF, Ghost in the
Shellcode, MITRE STEM CTF, NECCDC, picoCTF
 Wargames: Hack this Site, Over the Wire, Smash the
Stack
 Reference list: http://captf.com/practice-ctf/
21
Conferences
Cons are often how people stay in touch
 Check out talks, or find them online
 Social events – great for networking
 Parties requiring challenges (Caesar’s Challenge at
Blackhat/DEFCON)
22
Meetups & Local Events
 Meetup.com is a great aggregator of
different meetups in your locale
 Code as Craft: Engineering talks
sponsored by Etsy here in NYC
Find local events to explore different areas of interest,
learn or practice skills and meet new people
23
Trainings
 Practical education with focus on
specific professional roles in infosec
Training sessions can quickly bring you up the learning
curve, but typically are expensive ($2,000 - $5,000)
 Conferences aggregate trainings
from a variety of companies, though
additional trainings are generally held
year round as well
24
Academic Papers
Explore emerging areas of research
 arXiv
 IEEE
 Microsoft – Security & Privacy Research
 Reddit.com/r/NetSec
 USENIX
Make note of particular topics you find interesting and
don’t be shy in contacting the authors directly
Networking
26
Step 1: Trust
InfoSec is a trust-based industry.
Don’t violate trust and be wary of those who do.
27
Networking Strategy
Get as many “at bats” as possible
 Meet many people across various areas of
expertise, employers & career stages
 Not everyone will respond, so need to maximize
your hit rate by reaching out to more people
 Expand your network by asking new contacts
(politely) if they know anyone you should meet
Awkwardness is a Part of Life
28
29
#hatersgonnahate
Don’t let anyone convince you that you won’t be
successful or don’t belong in the industry
 People like passion and
want to support “winners”
 Persistence is key (true of
most things)
 Define your own measure
of success
30
Contact Maintenance
Regularly follow-up, but be mindful of people’s time
 People generally like getting a “free” coffee
Even starting out, consider how you can be helpful
 Try to maintain a 50/50 ask to give ratio
 Keep an eye out for potential hires, introductions /
connections or research they’d find interesting
Keeping Up to Date
32
Socializing
Staying in touch and meeting new people helps
enormously in knowing the “latest”
 Not all research / projects are discussed online
 Gossip and chatter can also inform you of career
opportunities or new, interesting companies
 Fills in gaps in news you might have missed
33
Mainstream News is Not Ideal
Mostly a lot of this:
34
Suggested News Sources
 Twitter – where the industry “chatter” happens
 CyberWire – aggregates InfoSec news daily
 Individual websites:
35
Short InfoSec Twitter List
 @0xcharlie
 @4Dgifts
 @alexstamos
 @aloria
 @bcrypt
 @c7zero
 @cBekrar
 @chrisrohlf
 @collinrm
 @crypt0ad
 @dinodaizovi
 @djrbliss
 @drraid
 @esizkur
 @halvarflake
 @haroonmeer
 @j4istal
 @justineboneait
 @k8em0
 @mattblaze
 @matthew_d_green
 @mdowd
 @msuiche
 @nils
 @nudehaberdasher
 @pencilsareneat
 @quine
 @runasand
 @s7ephen
 @semibogan
 @_snagg
 @snare
 @SwiftOnSecurity
 @thegrugq
 @WeldPond
 @window
Conclusions
37
You Do You
 Consistently build your personal portfolio of
skills, experience and industry connections
 The field is rich with options, so you’ll likely
find a role you enjoy and in which you excel
 On the infosec industry treadmill, remember
that it’s a marathon, not a sprint
38
A Closing Quote
“Work as hard and as much as you want to on
the things you like to do the best.
Don't think about what you want to be, but what
you want to do.”
– Richard P. Feynman

Weitere ähnliche Inhalte

Was ist angesagt?

LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...Danny Batomen Yanga
 
Attestation de stagerach amel
Attestation de stagerach amelAttestation de stagerach amel
Attestation de stagerach amelImed Boukadida
 
20120612 04 - Les différentes facettes de la securité. La vision IBM
20120612 04 - Les différentes facettes de la securité. La vision IBM20120612 04 - Les différentes facettes de la securité. La vision IBM
20120612 04 - Les différentes facettes de la securité. La vision IBMLeClubQualiteLogicielle
 
ライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組み
ライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組みライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組み
ライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組みDemaecan
 
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023SaiLinnThu2
 
Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...
Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...
Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...Alphorm
 
Face au changement permanent, soyons tout simplement «WAGILES»
Face au changement permanent, soyons tout simplement «WAGILES»Face au changement permanent, soyons tout simplement «WAGILES»
Face au changement permanent, soyons tout simplement «WAGILES»Claude Emond
 
Academic Research Proposal PowerPoint Presentation Slides
Academic Research Proposal PowerPoint Presentation SlidesAcademic Research Proposal PowerPoint Presentation Slides
Academic Research Proposal PowerPoint Presentation SlidesSlideTeam
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyMostafa El Lathy
 
Attestation de Stage- M. Bonaventure Mugimba ORQR
Attestation de Stage- M. Bonaventure Mugimba  ORQRAttestation de Stage- M. Bonaventure Mugimba  ORQR
Attestation de Stage- M. Bonaventure Mugimba ORQRBonaventure Mugimba
 
radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)rinnocente
 
Cv special ed
Cv special edCv special ed
Cv special edJay Singh
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsSolarWinds
 
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud Ajeet Singh
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Novosco
 
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxabenyeung1
 
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...Amazon Web Services
 

Was ist angesagt? (20)

LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
LES SYSTEMES DE GESTION DES IDENTITES ET DES ACCES : MISE EN ŒUVRE ET APPORT ...
 
Attestation de stagerach amel
Attestation de stagerach amelAttestation de stagerach amel
Attestation de stagerach amel
 
20120612 04 - Les différentes facettes de la securité. La vision IBM
20120612 04 - Les différentes facettes de la securité. La vision IBM20120612 04 - Les différentes facettes de la securité. La vision IBM
20120612 04 - Les différentes facettes de la securité. La vision IBM
 
ライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組み
ライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組みライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組み
ライフインフラとなるために進めている出前館の Web アクセシビリティ改善への取り組み
 
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023
Istio Ambient Mesh in ACTION - Istio UG Singapore - 22June,2023
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...
Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...
Alphorm.com Formation Hacking et Sécurité 2020 (1/3) : Méthodologies de Pente...
 
Face au changement permanent, soyons tout simplement «WAGILES»
Face au changement permanent, soyons tout simplement «WAGILES»Face au changement permanent, soyons tout simplement «WAGILES»
Face au changement permanent, soyons tout simplement «WAGILES»
 
Academic Research Proposal PowerPoint Presentation Slides
Academic Research Proposal PowerPoint Presentation SlidesAcademic Research Proposal PowerPoint Presentation Slides
Academic Research Proposal PowerPoint Presentation Slides
 
Présentation AzureAD ( Identité hybrides et securité)
Présentation AzureAD ( Identité hybrides et securité)Présentation AzureAD ( Identité hybrides et securité)
Présentation AzureAD ( Identité hybrides et securité)
 
Palo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El LathyPalo alto outline course | Mostafa El Lathy
Palo alto outline course | Mostafa El Lathy
 
Attestation de Stage- M. Bonaventure Mugimba ORQR
Attestation de Stage- M. Bonaventure Mugimba  ORQRAttestation de Stage- M. Bonaventure Mugimba  ORQR
Attestation de Stage- M. Bonaventure Mugimba ORQR
 
radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)radius dhcp dot1.x (802.1x)
radius dhcp dot1.x (802.1x)
 
Cv special ed
Cv special edCv special ed
Cv special ed
 
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software VendorsBecoming Secure By Design: Questions You Should Ask Your Software Vendors
Becoming Secure By Design: Questions You Should Ask Your Software Vendors
 
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud  Palo Alto Virtual firewall deployment guide on OpenStack Cloud
Palo Alto Virtual firewall deployment guide on OpenStack Cloud
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
F5 Distributed Cloud.pptx
F5 Distributed Cloud.pptxF5 Distributed Cloud.pptx
F5 Distributed Cloud.pptx
 
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
Enel, AWS, and Athonet: Connecting Millions of IoT Devices on Private LTE (TL...
 
Aruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep DiveAruba ClearPass Exchange Deep Dive
Aruba ClearPass Exchange Deep Dive
 

Ähnlich wie DIY Education in Cyber Security

Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutKelly Shortridge
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Phx-techtalk
Phx-techtalkPhx-techtalk
Phx-techtalkThinkful
 
Phxtech830
Phxtech830Phxtech830
Phxtech830Thinkful
 
PHXTECH830
PHXTECH830PHXTECH830
PHXTECH830Thinkful
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designNikita Lukianets
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...APMDonotuse
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeEC-Council
 
Fallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being DigitalFallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being DigitalAki Spicer
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019Resourceful Nonprofit
 
Blockchain Brochure - Open Reply
Blockchain Brochure - Open ReplyBlockchain Brochure - Open Reply
Blockchain Brochure - Open ReplyAusrine S.
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsediveGrace Chi
 
gtintpdx0816
gtintpdx0816gtintpdx0816
gtintpdx0816Thinkful
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfAngela Baxter
 

Ähnlich wie DIY Education in Cyber Security (20)

Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Phx-techtalk
Phx-techtalkPhx-techtalk
Phx-techtalk
 
Phxtech830
Phxtech830Phxtech830
Phxtech830
 
PHXTECH830
PHXTECH830PHXTECH830
PHXTECH830
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational design
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Fallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being DigitalFallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being Digital
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
 
Blockchain Brochure - Open Reply
Blockchain Brochure - Open ReplyBlockchain Brochure - Open Reply
Blockchain Brochure - Open Reply
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - Pulsedive
 
gtintpdx0816
gtintpdx0816gtintpdx0816
gtintpdx0816
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 

Mehr von Kelly Shortridge

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
 
The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of ResilienceKelly Shortridge
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKelly Shortridge
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactKelly Shortridge
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecKelly Shortridge
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Kelly Shortridge
 
Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Kelly Shortridge
 

Mehr von Kelly Shortridge (8)

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
 
The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of Resilience
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec Autodidact
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosec
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
 
Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...
 

Kürzlich hochgeladen

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Kürzlich hochgeladen (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

DIY Education in Cyber Security

  • 1. DIY Education in Cyber Security Kelly Shortridge July 30, 2015
  • 2. Agenda My goal is to help you figure out where and how to start your learning journey by answering:  What careers are there?  How do I learn more about the field?  How do I meet people / network?  How do I stay current on industry trends? 2
  • 3. Who am I? Hi, I’m Kelly Shortridge  Currently doing exciting things on the business side of infosec  Previously advised infosec companies on M&A and private capital raise deals  No technical background  Built a knowledge base and network within infosec from scratch 3
  • 5. 5 The “You Can’t Sit With Us” Myth InfoSec as a professional field can seem a bit opaque, insular and unapproachable. In reality, it’s a blossoming field offering exciting opportunities for a variety of skill sets and interests…and not just full of cliques of “mean nerds”
  • 6. 6 InfoSec = Opportunity Diverse potential paths to follow within infosec:  Application Security  Compliance & Policy  Data Forensics & Incident Response  Network Security Engineer / Ops & Monitoring  Penetration Testing  Security Architecture  Security Solution Development  Vulnerability Research & Reverse Engineering
  • 7. 7 InfoSec = Flexibility Roles often overlap and have fuzzy boundaries  Cover different aspects of the lifecycle of security operations Some areas of study are broadly applicable  Data Science  Math  Network & System Architecture  Software Development
  • 9. 9 Skill Sets – Example #1 Network Security Engineer / Ops & Monitoring  Understand network design & architecture  Familiarity with security tech – IDS/IPS, SIEM, firewalls, vulnerability detection & remediation  Develop custom tooling for security monitoring  Some knowledge on machine learning is a plus
  • 10. 10 Skill Sets – Example #2 Vulnerability Research & Reverse Engineering  Analyze malicious code, shellcode, packed & obfuscated code  Identify attacker methodology  Strong math abilities, particularly graph theory  Familiarity with IDA Pro and user & kernel-mode debuggers  Languages: Assembly (x86 & x64), C/C++, Python
  • 11. 11 Skill Sets – Example #2 Application Security  Audit applications for vulnerabilities (XSS, SQLI, logic flaws, etc.)  Understanding of application architecture  Help development teams implement SDL  Build tooling to improve testing & auditing  Languages: Java, PHP, C / C++, Python, Ruby
  • 12. 12 Potential Employers Major hubs include SF, NYC & DC – each city has its own “flavor” driven by employer base Government Private Vendors Defense Contractors & Gov’t Agencies Tech, Finance, Media, eCommerce, etc. Security Vendors & Consultancies
  • 13. 13 Broader Applicability Security can serve as a differentiator in non-sec roles  Anyone in the development process (design, UX, etc.) should have the ability to consider security implications of their decisions  PR, legal and finance personnel should understand their organization’s security risk profile
  • 14. 14 Find Your Purpose Intersection of what you love doing, what you’re good at doing, what is paid for and what the market needs  Talent shortage in + known need for infosec means you can focus on what you love + where you excel
  • 16. 16 Where to Start? Regardless of whether you’re a complete beginner, switching fields or already successfully entered the field, there’s plenty of knowledge and skills to gain.
  • 17. 17 Formal Education Academia Certifications  Helpful if no other means of vetting abilities
  • 18. 18 Online Education There are now tons of online resources available for learning languages, development and data science  Some free, some paid (often you get a certificate)  Consistency is key; set a daily goal for practicing
  • 19. 19 Old-School Resources If you prefer the more traditional book approach, try:  The Art of Software Security Assessment  Hacking: The Art of Exploitation  The Shellcoder's Handbook  Android Hacker's Handbook  iOS Hacker's Handbook
  • 20. 20 CTFs & Other Games Allows you to improve & show off your skills  CTFs: DEFCON CTF, CSAW CTF, Ghost in the Shellcode, MITRE STEM CTF, NECCDC, picoCTF  Wargames: Hack this Site, Over the Wire, Smash the Stack  Reference list: http://captf.com/practice-ctf/
  • 21. 21 Conferences Cons are often how people stay in touch  Check out talks, or find them online  Social events – great for networking  Parties requiring challenges (Caesar’s Challenge at Blackhat/DEFCON)
  • 22. 22 Meetups & Local Events  Meetup.com is a great aggregator of different meetups in your locale  Code as Craft: Engineering talks sponsored by Etsy here in NYC Find local events to explore different areas of interest, learn or practice skills and meet new people
  • 23. 23 Trainings  Practical education with focus on specific professional roles in infosec Training sessions can quickly bring you up the learning curve, but typically are expensive ($2,000 - $5,000)  Conferences aggregate trainings from a variety of companies, though additional trainings are generally held year round as well
  • 24. 24 Academic Papers Explore emerging areas of research  arXiv  IEEE  Microsoft – Security & Privacy Research  Reddit.com/r/NetSec  USENIX Make note of particular topics you find interesting and don’t be shy in contacting the authors directly
  • 26. 26 Step 1: Trust InfoSec is a trust-based industry. Don’t violate trust and be wary of those who do.
  • 27. 27 Networking Strategy Get as many “at bats” as possible  Meet many people across various areas of expertise, employers & career stages  Not everyone will respond, so need to maximize your hit rate by reaching out to more people  Expand your network by asking new contacts (politely) if they know anyone you should meet
  • 28. Awkwardness is a Part of Life 28
  • 29. 29 #hatersgonnahate Don’t let anyone convince you that you won’t be successful or don’t belong in the industry  People like passion and want to support “winners”  Persistence is key (true of most things)  Define your own measure of success
  • 30. 30 Contact Maintenance Regularly follow-up, but be mindful of people’s time  People generally like getting a “free” coffee Even starting out, consider how you can be helpful  Try to maintain a 50/50 ask to give ratio  Keep an eye out for potential hires, introductions / connections or research they’d find interesting
  • 32. 32 Socializing Staying in touch and meeting new people helps enormously in knowing the “latest”  Not all research / projects are discussed online  Gossip and chatter can also inform you of career opportunities or new, interesting companies  Fills in gaps in news you might have missed
  • 33. 33 Mainstream News is Not Ideal Mostly a lot of this:
  • 34. 34 Suggested News Sources  Twitter – where the industry “chatter” happens  CyberWire – aggregates InfoSec news daily  Individual websites:
  • 35. 35 Short InfoSec Twitter List  @0xcharlie  @4Dgifts  @alexstamos  @aloria  @bcrypt  @c7zero  @cBekrar  @chrisrohlf  @collinrm  @crypt0ad  @dinodaizovi  @djrbliss  @drraid  @esizkur  @halvarflake  @haroonmeer  @j4istal  @justineboneait  @k8em0  @mattblaze  @matthew_d_green  @mdowd  @msuiche  @nils  @nudehaberdasher  @pencilsareneat  @quine  @runasand  @s7ephen  @semibogan  @_snagg  @snare  @SwiftOnSecurity  @thegrugq  @WeldPond  @window
  • 37. 37 You Do You  Consistently build your personal portfolio of skills, experience and industry connections  The field is rich with options, so you’ll likely find a role you enjoy and in which you excel  On the infosec industry treadmill, remember that it’s a marathon, not a sprint
  • 38. 38 A Closing Quote “Work as hard and as much as you want to on the things you like to do the best. Don't think about what you want to be, but what you want to do.” – Richard P. Feynman