SlideShare a Scribd company logo
1 of 41
An Imposter’s Journey
Into InfoSec
@stuhirstinfosec
Disclaimers;
I like memes.
I don’t take myself too seriously.
I have Imposter Syndrome.
@stuhirstinfosec
#imposter-syndrome
Who Am I?
@stuhirstinfosec
What is Imposter Syndrome?
@stuhirstinfosec
SHOW OF
HANDS
PLEASE!!!
#imposter-syndrome
What is Imposter Syndrome?
@stuhirstinfosec
“I don’t deserve
to be here”
“I’m lucky”
“I’m out of my
depth”
“I feel like a
fake”
“I’ve bluffed my
way into this”
“I’m going
to get ‘found
out’ soon”
What is Imposter Syndrome?
@stuhirstinfosec
Impostor syndrome (also known as impostor
phenomenon, impostorism, fraud syndrome or
the impostor experience) is a psychological pattern in
which an individual doubts their accomplishments and
has a persistent internalised fear of being exposed as
a "fraud"
@stuhirstinfosec
THE 5 TYPES OF
IMPOSTER
#imposter-syndrome
The Perfectionist
@stuhirstinfosec
You set your
goals too high -
when you don’t
reach them, you
think you’re a
failure
The Superman
@stuhirstinfosec
You work crazy
hours to make
up for your
perceived ‘lack
of ability’
The Genius
@stuhirstinfosec
The idea that by
having to work
hard at
something, that
in itself is failure
Should you
expect things to
be ‘easy’?!
The Individualist
@stuhirstinfosec
That if you have
to ask for help,
you’ve already
failed
“I can do this
myself!”
The Expert
@stuhirstinfosec
You’ve ‘tricked’
your way into
your job and will
be ‘found out’ at
some point
You’re waiting
on the ‘tap on
the shoulder’!
What Is It Connected To?
• Family expectations
• Overprotective parent(s) or legal guardian(s)
• Graduate-level coursework
• Racial identities
• Anxiety
• Depression
• Lower trait self-esteem
• Being a perfectionist
• Excessive self-monitoring, with an emphasis on self-worth
@stuhirstinfosec
#imposter-syndrome
Why is Imposter Syndrome so prevalent in
Security/Tech?
@stuhirstinfosec
@stuhirstinfosec
SECURITY
& TECH
ARE
HARD!
@stuhirstinfosec
@stuhirstinfosec
@stuhirstinfosec
It’s taken me 3+ years
just to be ‘ok’ at AWS
@stuhirstinfosec
BUT I QUESTION WHETHER I KNOW WHAT I’M
DOING AND WHETHER IT’S GOOD ENOUGH!
Decided to create a new role in
the company to manage AWS
Security across 4 brands……
Of course it’s not just all
about ‘products’ or
‘solutions’….
@stuhirstinfosec
@stuhirstinfosec
Incidents Compliance
FirewallsMalware Bots
Phishing
3rd Parties
Cloud
Pen Testing
Risk
Cryptography
IDS/IPS
Threat
Modelling
Networking
SIEM
Encryption
Secrets/Cred
s
Authentication
Access
Endpoints
Vulnerability
ManagementWAF
DR
@stuhirstinfosec
MODERN BUSINESS IS OFTEN
COMPLEX, TAXING, EXHAUSTING AND
DEMANDING
It doesn’t matter what your role
is….
#imposter-syndrome
WHAT ABOUT
PERSONAL LIVES?
@stuhirstinfosec
@stuhirstinfosec
@stuhirstinfosec
@stuhirstinfosec
@stuhirstinfosec
IMPOSTERS CAN
MAKE IT!!!
YOU CAN MAKE IT!!!
@stuhirstinfosec
WHAT CAN YOU DO
ABOUT IT?
@stuhirstinfosec
#imposter-syndrome
1. Give up caring whether you are ‘right’ or ‘wrong’
2. The other people in the room often don’t know
the answer either
3. The worst outcome is nowhere near as bad as
you think it might be
4. Seniority is not a sign of someone being ‘better’
than you
@stuhirstinfosec
5. People are learning from you
6. Keep learning
7. Understand that you will fail.
Repeatedly.
8. Remove ‘luck’ from your accomplishments
9. Try and embrace praise
@stuhirstinfosec
Is It Actually A Bad Thing?
@stuhirstinfosec
It’s not all
negative….
@stuhirstinfosec
CONTROL THAT EGO!
@stuhirstinfosec
STAY HUMBLE!
@stuhirstinfosec
“SYNDROME”?!
No wonder there is discomfort in suggesting you are an
Imposter!
What else has helped me?
@stuhirstinfosec
• Public Speaker
• Run Security Scotland Meet Up
• Run the AWS Security Slack Forum
• Regular LinkedIn ‘Brain Farter’
#imposter-syndrome
What has helped?
@stuhirstinfosec
Research!!!!
What has helped?
@stuhirstinfosec
Not enough hours
in the day!
#imposter-syndrome
Reading has helped me!
@stuhirstinfosec
My thoughts to leave you
with;
YOU can (and probably are
doing!) these things
YOU are awesome
YOU are helping shape our
online world for generations
to come
@stuhirstinfosec

More Related Content

Similar to An Imposter's Journey Into InfoSec

Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading AustraliaDon T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Wendy Fricke
 

Similar to An Imposter's Journey Into InfoSec (20)

What We Have Learnt About Imposter Syndrome - MeasureCamp 2018
What We Have Learnt About Imposter Syndrome - MeasureCamp 2018What We Have Learnt About Imposter Syndrome - MeasureCamp 2018
What We Have Learnt About Imposter Syndrome - MeasureCamp 2018
 
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
 
How to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developerHow to defeat impostor syndrome: confessions of a developer
How to defeat impostor syndrome: confessions of a developer
 
War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!
 
Navigating Imposter Syndrome
Navigating Imposter SyndromeNavigating Imposter Syndrome
Navigating Imposter Syndrome
 
Imposter syndrome why am i setting up a business
Imposter syndrome why am i setting up a businessImposter syndrome why am i setting up a business
Imposter syndrome why am i setting up a business
 
Yes, You Belong Here
Yes, You Belong HereYes, You Belong Here
Yes, You Belong Here
 
How fighting, flaunting, and improvising led me to graph databases
How fighting, flaunting, and improvising led me to graph databasesHow fighting, flaunting, and improvising led me to graph databases
How fighting, flaunting, and improvising led me to graph databases
 
Overcoming Imposter Syndrome
Overcoming Imposter SyndromeOvercoming Imposter Syndrome
Overcoming Imposter Syndrome
 
Overcoming common Network Marketing Fears
Overcoming common Network Marketing FearsOvercoming common Network Marketing Fears
Overcoming common Network Marketing Fears
 
Energy Conservation Essay In Hindi
Energy Conservation Essay In HindiEnergy Conservation Essay In Hindi
Energy Conservation Essay In Hindi
 
Staying confident without feeling like an imposter
Staying confident without feeling like an imposterStaying confident without feeling like an imposter
Staying confident without feeling like an imposter
 
Survivallife - Discover the dirty secrets and mind control Games of A real li...
Survivallife - Discover the dirty secrets and mind control Games of A real li...Survivallife - Discover the dirty secrets and mind control Games of A real li...
Survivallife - Discover the dirty secrets and mind control Games of A real li...
 
Overcoming imposter syndrome keynote
Overcoming imposter syndrome keynoteOvercoming imposter syndrome keynote
Overcoming imposter syndrome keynote
 
Stu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To CisoStu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To Ciso
 
Imposter Syndrome: Overcoming Self-Doubt in Success
Imposter Syndrome: Overcoming Self-Doubt in SuccessImposter Syndrome: Overcoming Self-Doubt in Success
Imposter Syndrome: Overcoming Self-Doubt in Success
 
Taming the imposter monster speech slide deck (1)
Taming the imposter monster speech slide deck (1)Taming the imposter monster speech slide deck (1)
Taming the imposter monster speech slide deck (1)
 
Object123 - A Workplace Safe-space Tool
Object123 - A Workplace Safe-space ToolObject123 - A Workplace Safe-space Tool
Object123 - A Workplace Safe-space Tool
 
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading AustraliaDon T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
Don T Call Me Ishmael Essay. Dont Call Me Ishmael - Reading Australia
 
Imposter Syndrome (Kurt Madsen at LunchUX)
Imposter Syndrome (Kurt Madsen at LunchUX)Imposter Syndrome (Kurt Madsen at LunchUX)
Imposter Syndrome (Kurt Madsen at LunchUX)
 

More from Stu Hirst (8)

AWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptxAWS Meet Up COPENHAGEN.pptx
AWS Meet Up COPENHAGEN.pptx
 
Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020
 
Hi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love YouHi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love You
 
Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019
 
Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019
 
Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018
 
DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 

An Imposter's Journey Into InfoSec