SlideShare a Scribd company logo
1 of 47
So you want a
JOB
in
CYBER
SECURITY?
@TeriRadichel
My Background
 Tech: Software Engineer > Cloud Engineer > Cloud Architect > Cybersecurity
 Entrepreneur (3x): > Writing, E-commerce & Web Hosting, Cybersecurity
 Degrees: BA Business, 2 Master’s Software Engineering, Cybersecurity
 Certifications: Many, including SANS GSE
 CEO of 2nd Sight Lab > Training, Assessments, Penetration Tests
 IANS Research Faculty > Phone consulting
 Infragard, AWS Hero, SANS Difference Maker’s Award
 Professional Speaker: Conferences around the world (RSA, OWASP, etc)
 Author: Cybersecurity for Executives in the Age of Cloud
 https://medium.com/cloud-security/women-in-tech-cyber-security/home
Organizations I’ve worked for (that I can say)
…as employee, consultant, took my classes…
Subcontractor
 Hey, what’s that?
 Something weird is going on here.
 Hey, someone’s on our machine!
 Investigate systems and network.
 Obsess over figuring out how they did it.
 Try to make sure it never happens again.
 That’s my story.
How people used to get into cybersecurity
Security Operations
Intrusion Detection & Response
 Misfit messing around with computers.
 Hack something.
 Maybe get arrested.
 Or not.
 Attend hacker conferences.
 End up working for the government.
 Or Corporate America.
 Or both.
Alternatively….
Cybersecurity legends ~ Hackers
Also check out:
 RSA
 OWASP AppSec
 BSides
 ISACA
 Black Hat
 ATT&CK CON
 REcon
DEFCON
https://www.youtube.com/user/DEFCONConference/videos
Military, Government, & Cyber Spies
 Exposure in mainstream media.
 More training options.
 More certifications.
 Cybersecurity degrees.
 Training at technical colleges.
 More meetups and conferences.
 More books, blogs, videos.
Cybersecurity today
No cybersecurity degree existed when I started
When most people think of cybersecurity...
How others
feel about
cybersecurity…
 PCI: Payment Card Industry
https://www.pcisecuritystandards.org/
 HIPAA: Health care data https://www.hhs.gov
 GDPR: Data of European Citizens https://gdpr-info.eu/
 NERC: North America Power System
https://www.nerc.com/Pages/default.aspx
 State privacy laws https://iapp.org/resources/article/us-
state-privacy-legislation-tracker/
 GSA Privacy Act: PII https://www.gsa.gov/reference/gsa-
privacy-program/rules-and-policies-protecting-pii-privacy-act
Examples of Regulation
Follow rules!
(Compliance)
 NIST (National Institutes of Standards & Technology)
https://www.nist.gov/
 ISACA (Information Systems Audit & Control Association)
https://www.isaca.org/
 SOC2 Compliance
https://www.aicpa.org/interestareas/frc/assuranceadvisoryse
rvices/aicpasoc2report.html
 ISO27001 https://www.iso.org/isoiec-27001-information-
security.html
Cybersecurity Audits Prove it.
 Compliance is a minimum
 Cybersecurity fundamentals
 Industry knowledge and information sharing
 Good cybersecurity architecture & processes
 Vendor guidance
 Monitor the news! What are attackers doing?
 Adjust security practices accordingly.
Best Practices (not laws)
Regulatory compliance
does not equal
security.
 CIS Benchmarks https://www.cisecurity.org/cis-benchmarks/
 CIS Controls https://www.cisecurity.org/controls/cis-controls-
list/
 OWASP Top 10 https://owasp.org/www-project-top-ten/
 MITRE ATT&CK https://attack.mitre.org/
 CWEs https://cwe.mitre.org/
 Top 25 most dangerous software weaknesses
https://cwe.mitre.org/top25/archive/2021/2021_cwe_top25.
html
 Vendor security documentation – especially for cloud systems.
Industry Guidance(More lists…)
 Vary widely in scope and objectives.
 Run a scan and generate an automated report for a customer.
 Evaluate system architecture and networks.
 Ask questions about tools, systems, and processes.
 Review company standards, policies, and procedures.
 Consider most common attack vectors.
 Interview development teams, business professionals, or
others.
 Evaluate system code or test security product functionality.
Cybersecurity AssessmentsMinimum.
Not great.
Also, cheap.
 Find and exploit system vulnerabilities.
 Sort of like a hacker, but not really
 Much more limited time frame
 Limited by scope (provided by customer)
 Network, internal, cloud, deployments, applications, products
 Some access to expose vulnerabilities
 Objective: Coverage or target?
 Approaches: scanning, reverse-engineering, social engineering
Penetration Tests
Try to break in!
Then write a 40-80+
page report (in my
case)
Software & Hardware Vulnerabilities
Input
bad
stuff.
Make bad things
happen here
https://cve.mitre.org/
Common Vulnerabilities & Exposures
Vulnerability Management
Systems exposed to the Internet are attacked
 Attackers scan for open ports
 System vulnerabilities
 Exploit to get foothold
 Call home to C2
 Send commands
 Get credentials
 Repeat
Network Security
https://medium.com/cloud-security/how-network-traffic-got-me-into-cybersecurity-
94796bb78c92
https://medium.com/cloud-security/what-is-packet-sniffing-f03f50aa230
https://websitenotebook.blogspot.com/2014/05/hexadecimal-to-binary-to-decimal-cheat.html
https://websitenotebook.blogspot.com/2014/05/decoding-ip-header-example.html
Malware on
infected
machines scans
for other
machines to
attack on the
Internet and
within internal
networks.
Zero Trust!
People Many security
incidents involve
human actions!
 Verify it’s a security problem.
 Capture evidence in a way that proves no one tampered with
it.
 Handle evidence in a secure manner (chain of custody).
 Contain the malware to prevent spread.
 Potentially observe it or use the copy for analysis.
 Remove it from systems – completely!
 Report and learn from the incident.
Digital Forensics &
Incident Response (DFIR)
Sample breach
notifications in
my weekly news
feed.
Q: How did our systems get breached?
A: An attacker got ransomware onto our systems.
Q: How did the attacker get ransomware onto our systems?
A: They got onto one of the machines in our network.
Q: How did they get onto the machine?
A: General: Evil link in email, vulnerability, misconfiguration.
Q: What was the link? What was the vulnerability?
A: Specific: The actual link, CVE, IP address, port, software.
Breach reports need root cause
Ask the right
questions.
https://www.giac.org/paper/gsec/35355/case-study-critical-controls-prevented-target-
breach/140127
Analysis of the Target Breach
 Domain Generation Algorithm
 CNAME pointing to C2 server
 DNS and HTTP C2
 IP Ranges
 Steganography
 Malware commands
 Attack techniques
https://www.fireeye.com/blog/threat-research/2020/12/sunburst-additional-technical-
details.html
https://medium.com/cloud-security/solarwinds-hack-retrospective-part-1-8107671e3314
Technical Details Security researcher or
malware analyst
Reverse Engineering Malware
https://www.nsa.gov/resources/everyone/ghidra/
Disassembler /
decompiler
Risk Management
 Reduce risk of a data breach and potential damage.
 Attack vectors: The different attacks available on your
systems.
 Attack surface: The amount of exposure available to
attack.
 Blast Radius: How much damage unauthorized access
can cause.
Key to security
1. Immutable software deliverables in Solar Winds
deployments.
2. Identification of C2 network traffic by affected customers.
3. Least-privilege for credentials on infected systems.
4. Just-in-time and conditional access for high-risk actions.
What could have prevented the attack?
Security architecture
Security operations or analyst
Governance & Risk Management, IAM
Governance & Risk Management, IAM
 Security has a lot of rules and lists!
 Where should you start?
 How do attackers get in?
1. Abstract the details to core principles.
2. Prioritize fixing highest risk findings.
3. Avoid over-analysis.
4. Avoid repeat problems.
Getting a handle on complexity
What
Causes
Data
Breaches?
The Concept of Abstraction
Less to manage.
The same set of
principles can stop or
limit damage for a
myriad of attacks!
20 cybersecurity questions
 Key factors that drive data breaches.
 Learn fundamental cybersecurity.
 Study how attacks work.
 Abstract common attack vectors.
 Understand what stops them.
 Reduce the chances you give attackers.
 Create metrics that make a difference.
 Automated reporting + Manual analysis.
20 questions to ask your security team
How many CVEs? Developer security training? Network, data, app?
Percent of systems exposed to the
Internet?
What are our security policies?
Data exposed to Internet? Who generates most exceptions? Why?
Total attack paths on our network? Security checks built into deployment systems?
Potential damage if credentials stolen? Are we vetting our vendors? How?
Percentage of accounts with MFA? Proof that our security solutions provide value?
Percentage data encrypted when stored? Do we have an incident handling team or plan?
Percentage of network traffic encrypted? What percent activities can be and are
automated?
Findings from pentests and assessments? What is the overall risk level? Getting better?
Can we restore from backups? Tested? How is the threat landscape changing?
Worldwide average cost of a breach
https://www.ibm.com/security/data-breach
U.S. average cost of a data breach
https://www.ibm.com/security/data-breach
Measure risk and reduce it
$2.30M
Cost difference for
breaches with high vs.
low level of compliance
failures
- IBM Cost of a Data
Breach
Automation
$2.90M
Average cost of a data
breach at organizations
with security AI and
automation fully
deployed.
- IBM Cost of a Data
Breach
We still need
humans for
analysis.
Not all
problems can
be solved by
automation.
Analysis
 Executives
 Developers
 Marketing
 Human resources
 Salespeople
 Interns!
 Contractors
 Third-party vendors
Everyone needs security awareness!
All it takes is one mistake…
 People need to understand why rules exist.
 Communication is critical.
 Email and videos not that effective.
 Iterative fixes.
 Test before blocking.
 Get executive support.
The organization still needs to function
https://www.sans.org/white-papers/36837
Without this, an exercise in futility
Non-exhaustive list of security jobs
Chief Information Security Officer (CISO) Security Administrator
Risk Management & Governance / Privacy Officer Security Operations Center (SOC) Analyst
Auditors and Assessors Cryptography / Cryptology / Cryptanalyst
Blue Team (Defense) Penetration Testers / Red Team (Offense)
Security Engineer (Application, Cloud, System,
Network, Product, Hardware, Network)
Security Architect (Application, System, Cloud,
Enterprise, Product, Hardware, Network)
Security Researcher / Malware Analyst Security Sales, Marketing, Product Management
Digital Forensics & Incident Response (DFIR) Security Consultant / Specialist
FBI Agent / Counter Espionage Agent / Cyber Spy Cyber Intelligence Specialist
Information Security Analyst Security Manager
 Catch hackers in the act? (Security Analyst, SOC)
 Help companies after a cyber attack? (DFIR, CERT)
 Study malware & attacks? (Security Researcher)
 Hack? (Pentester, Red Team, Bug Bounties, Criminals)
 Design & build secure systems? (Architect, Engineer)
 Policies and risk reduction? (Risk Management, Governance)
 Validate orgs follow rules? (Assessor, Auditor)
 Implement policies and work with executives? (CISO)
 Enforce policies? (CEO, Board of Directors)
What do you want to do?
Security Pros do
not enforce!
Security Salaries
https://www.wsj.com/articles/cybersecurity-chiefs-are-in-high-demand-as-companies-face-rising-
hacking-threats-11627551000
https://www.csoonline.com/article/3624670/cybersecurity-salary-what-8-top-security-jobs-pay.html
 Survey of 354 CISOs Published by Heidrick & Struggles International,
WSJ.
 Median Salary of $509,000 over $473K in 2020.
 Total compensation with equity grants & bonuses $936,000.
 May be inflated and depends on company size. Generally over $200K.
 Smaller companies tend to hire MSSPs, consultants, virtual CISO.
 Other security jobs…might not pay as much as software
development.
 Explains the shortage in cybersecurity pros? Hope that changes soon.
2nd
Sight
Lab
 Obtain skills: Look at job descriptions.
 On-the-job training: Find a company that will train you.
 Certifications / Degrees: Get you past the HR department.
 Establish trust: Security is all about trust.
 Meet people: Get involved in the security community.
 Get experience: Internships, personal projects, CTFs, volunteer.
 Demonstrate knowledge: Writing, GitHub, speaking, videos (use sources!)
 Continuous learning: Security is a moving target.
 Be familiar with current events: Read, Twitter, my news blog!
How to get a job in cybersecurity
https://medium.com/cybersecurity-news
Book:
https://amzn.to/3C1g3F9
Cloud Security Blog:
https://medium.com/cloud-security
Cybersecurity News Blog:
https://medium.com/cybersecurity-
news
@TeriRadichel
Thank you!
More on Twitter!

More Related Content

What's hot

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Radar Cyber Security
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...Edureka!
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management Rishi Kant
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentalsCloudflare
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)WAJAHAT IQBAL
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation TrainingBryan Len
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptxANIKETKUMARSHARMA3
 

What's hot (20)

Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Cyber security(2018 updated)
Cyber security(2018 updated)Cyber security(2018 updated)
Cyber security(2018 updated)
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025Cyber attacks and IT security management in 2025
Cyber attacks and IT security management in 2025
 
Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
 
Cyber Threat Management
Cyber Threat Management Cyber Threat Management
Cyber Threat Management
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
CYBERSECURITY - Best Practices,Concepts & Case Study (Mindmap)
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Cyber Threat Simulation Training
Cyber Threat Simulation TrainingCyber Threat Simulation Training
Cyber Threat Simulation Training
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
Cyber security standards
Cyber security standardsCyber security standards
Cyber security standards
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 

Similar to So You Want a Job in Cybersecurity

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec TrainingMike Spaulding
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud appsCenzic
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0Happiest Minds Technologies
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web ApplicationsNadia BENCHIKHA
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxInfosectrain3
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Jack Shaffer
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modelingkeyuradmin
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMIRJET Journal
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer OverviewScott Suhy
 
Top 10 Azure Security Best Practices (1).pptx
Top 10 Azure Security Best Practices (1).pptxTop 10 Azure Security Best Practices (1).pptx
Top 10 Azure Security Best Practices (1).pptxHichamNiamane1
 

Similar to So You Want a Job in Cybersecurity (20)

Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
Cybersecurity - Jim Butterworth
Cybersecurity - Jim ButterworthCybersecurity - Jim Butterworth
Cybersecurity - Jim Butterworth
 
Security assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP PrepSecurity assessment with a hint of CISSP Prep
Security assessment with a hint of CISSP Prep
 
Security in the cloud protecting your cloud apps
Security in the cloud   protecting your cloud appsSecurity in the cloud   protecting your cloud apps
Security in the cloud protecting your cloud apps
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)International Journal of Network Security & Its Applications (IJNSA)
International Journal of Network Security & Its Applications (IJNSA)
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Threat Modeling Web Applications
Threat Modeling Web ApplicationsThreat Modeling Web Applications
Threat Modeling Web Applications
 
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptxCompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
CompTIA CySA Domain 1 Threat and Vulnerability Management.pptx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018Cybersecurity Presentation at WVONGA spring meeting 2018
Cybersecurity Presentation at WVONGA spring meeting 2018
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Threat Modeling
Threat ModelingThreat Modeling
Threat Modeling
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMINTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM
 
NetWatcher Customer Overview
NetWatcher Customer OverviewNetWatcher Customer Overview
NetWatcher Customer Overview
 
Top 10 Azure Security Best Practices (1).pptx
Top 10 Azure Security Best Practices (1).pptxTop 10 Azure Security Best Practices (1).pptx
Top 10 Azure Security Best Practices (1).pptx
 

More from Teri Radichel

Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxTeri Radichel
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Teri Radichel
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud CompromiseTeri Radichel
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack VectorsTeri Radichel
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTeri Radichel
 
How the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityHow the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityTeri Radichel
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Teri Radichel
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Teri Radichel
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Teri Radichel
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTeri Radichel
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Teri Radichel
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the CloudTeri Radichel
 
Locking Down Your Cloud
Locking Down Your CloudLocking Down Your Cloud
Locking Down Your CloudTeri Radichel
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.Teri Radichel
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWSTeri Radichel
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWSTeri Radichel
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016Teri Radichel
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachTeri Radichel
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSTeri Radichel
 

More from Teri Radichel (20)

Cloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptxCloud Offense Informs Cloud Defense.pptx
Cloud Offense Informs Cloud Defense.pptx
 
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
 
Real World Cloud Compromise
Real World Cloud CompromiseReal World Cloud Compromise
Real World Cloud Compromise
 
Serverless Attack Vectors
Serverless Attack VectorsServerless Attack Vectors
Serverless Attack Vectors
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
 
Azure for Auditors
Azure for AuditorsAzure for Auditors
Azure for Auditors
 
How the Cloud Changes Cyber Security
How the Cloud Changes Cyber SecurityHow the Cloud Changes Cyber Security
How the Cloud Changes Cyber Security
 
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019Are you ready for a cloud pentest? AWS re:Inforce 2019
Are you ready for a cloud pentest? AWS re:Inforce 2019
 
Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?Are You Ready for a Cloud Pentest?
Are You Ready for a Cloud Pentest?
 
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018Red Team vs. Blue Team on AWS ~ re:Invent 2018
Red Team vs. Blue Team on AWS ~ re:Invent 2018
 
Top 5 Priorities for Cloud Security
Top 5 Priorities for Cloud SecurityTop 5 Priorities for Cloud Security
Top 5 Priorities for Cloud Security
 
Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018Red Team vs Blue Team on AWS - RSA 2018
Red Team vs Blue Team on AWS - RSA 2018
 
Crypto Miners in the Cloud
Crypto Miners in the CloudCrypto Miners in the Cloud
Crypto Miners in the Cloud
 
Locking Down Your Cloud
Locking Down Your CloudLocking Down Your Cloud
Locking Down Your Cloud
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 
Packet Capture on AWS
Packet Capture on AWSPacket Capture on AWS
Packet Capture on AWS
 
Security for Complex Networks on AWS
Security for Complex Networks on AWSSecurity for Complex Networks on AWS
Security for Complex Networks on AWS
 
AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016AWS Security Ideas - re:Invent 2016
AWS Security Ideas - re:Invent 2016
 
Critical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target BreachCritical Controls Might Have Prevented the Target Breach
Critical Controls Might Have Prevented the Target Breach
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
 

Recently uploaded

Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Servicejennyeacort
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607dollysharma2066
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxJenniferPeraro1
 
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一ypfy7p5ld
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012sapnasaifi408
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量sehgh15heh
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfCyril CAUDROY
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书saphesg8
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证diploma001
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfpadillaangelina0023
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxLesterJayAquino
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...Suhani Kapoor
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...RegineManuel2
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一lvtagr7
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfjtzach
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一fjjwgk
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfpadillaangelina0023
 

Recently uploaded (20)

Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts ServiceCall Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
Call Girls In Bhikaji Cama Place 24/7✡️9711147426✡️ Escorts Service
 
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
Gurgaon Call Girls: Free Delivery 24x7 at Your Doorstep G.G.N = 8377087607
 
Issues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptxIssues in the Philippines (Unemployment and Underemployment).pptx
Issues in the Philippines (Unemployment and Underemployment).pptx
 
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
Call Girl in Low Price Delhi Punjabi Bagh  9711199012Call Girl in Low Price Delhi Punjabi Bagh  9711199012
Call Girl in Low Price Delhi Punjabi Bagh 9711199012
 
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
原版定制copy澳洲查尔斯达尔文大学毕业证CDU毕业证成绩单留信学历认证保障质量
 
Application deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdfApplication deck- Cyril Caudroy-2024.pdf
Application deck- Cyril Caudroy-2024.pdf
 
办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书办理哈珀亚当斯大学学院毕业证书文凭学位证书
办理哈珀亚当斯大学学院毕业证书文凭学位证书
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
原版定制卡尔加里大学毕业证(UC毕业证)留信学历认证
 
Black and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdfBlack and White Minimalist Co Letter.pdf
Black and White Minimalist Co Letter.pdf
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
 
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
VIP Call Girls Service Saharanpur Aishwarya 8250192130 Independent Escort Ser...
 
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
Drawing animals and props.pptxDrawing animals and props.pptxDrawing animals a...
 
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
定制(UQ毕业证书)澳洲昆士兰大学毕业证成绩单原版一比一
 
Ioannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdfIoannis Tzachristas Self-Presentation for MBA.pdf
Ioannis Tzachristas Self-Presentation for MBA.pdf
 
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
定制(ECU毕业证书)埃迪斯科文大学毕业证毕业证成绩单原版一比一
 
Gray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdfGray Gold Clean CV Resume2024tod (1).pdf
Gray Gold Clean CV Resume2024tod (1).pdf
 

So You Want a Job in Cybersecurity

  • 1. So you want a JOB in CYBER SECURITY? @TeriRadichel
  • 2. My Background  Tech: Software Engineer > Cloud Engineer > Cloud Architect > Cybersecurity  Entrepreneur (3x): > Writing, E-commerce & Web Hosting, Cybersecurity  Degrees: BA Business, 2 Master’s Software Engineering, Cybersecurity  Certifications: Many, including SANS GSE  CEO of 2nd Sight Lab > Training, Assessments, Penetration Tests  IANS Research Faculty > Phone consulting  Infragard, AWS Hero, SANS Difference Maker’s Award  Professional Speaker: Conferences around the world (RSA, OWASP, etc)  Author: Cybersecurity for Executives in the Age of Cloud  https://medium.com/cloud-security/women-in-tech-cyber-security/home
  • 3. Organizations I’ve worked for (that I can say) …as employee, consultant, took my classes… Subcontractor
  • 4.  Hey, what’s that?  Something weird is going on here.  Hey, someone’s on our machine!  Investigate systems and network.  Obsess over figuring out how they did it.  Try to make sure it never happens again.  That’s my story. How people used to get into cybersecurity Security Operations Intrusion Detection & Response
  • 5.  Misfit messing around with computers.  Hack something.  Maybe get arrested.  Or not.  Attend hacker conferences.  End up working for the government.  Or Corporate America.  Or both. Alternatively…. Cybersecurity legends ~ Hackers
  • 6. Also check out:  RSA  OWASP AppSec  BSides  ISACA  Black Hat  ATT&CK CON  REcon DEFCON https://www.youtube.com/user/DEFCONConference/videos
  • 8.  Exposure in mainstream media.  More training options.  More certifications.  Cybersecurity degrees.  Training at technical colleges.  More meetups and conferences.  More books, blogs, videos. Cybersecurity today No cybersecurity degree existed when I started
  • 9. When most people think of cybersecurity...
  • 11.  PCI: Payment Card Industry https://www.pcisecuritystandards.org/  HIPAA: Health care data https://www.hhs.gov  GDPR: Data of European Citizens https://gdpr-info.eu/  NERC: North America Power System https://www.nerc.com/Pages/default.aspx  State privacy laws https://iapp.org/resources/article/us- state-privacy-legislation-tracker/  GSA Privacy Act: PII https://www.gsa.gov/reference/gsa- privacy-program/rules-and-policies-protecting-pii-privacy-act Examples of Regulation Follow rules! (Compliance)
  • 12.  NIST (National Institutes of Standards & Technology) https://www.nist.gov/  ISACA (Information Systems Audit & Control Association) https://www.isaca.org/  SOC2 Compliance https://www.aicpa.org/interestareas/frc/assuranceadvisoryse rvices/aicpasoc2report.html  ISO27001 https://www.iso.org/isoiec-27001-information- security.html Cybersecurity Audits Prove it.
  • 13.  Compliance is a minimum  Cybersecurity fundamentals  Industry knowledge and information sharing  Good cybersecurity architecture & processes  Vendor guidance  Monitor the news! What are attackers doing?  Adjust security practices accordingly. Best Practices (not laws) Regulatory compliance does not equal security.
  • 14.  CIS Benchmarks https://www.cisecurity.org/cis-benchmarks/  CIS Controls https://www.cisecurity.org/controls/cis-controls- list/  OWASP Top 10 https://owasp.org/www-project-top-ten/  MITRE ATT&CK https://attack.mitre.org/  CWEs https://cwe.mitre.org/  Top 25 most dangerous software weaknesses https://cwe.mitre.org/top25/archive/2021/2021_cwe_top25. html  Vendor security documentation – especially for cloud systems. Industry Guidance(More lists…)
  • 15.  Vary widely in scope and objectives.  Run a scan and generate an automated report for a customer.  Evaluate system architecture and networks.  Ask questions about tools, systems, and processes.  Review company standards, policies, and procedures.  Consider most common attack vectors.  Interview development teams, business professionals, or others.  Evaluate system code or test security product functionality. Cybersecurity AssessmentsMinimum. Not great. Also, cheap.
  • 16.  Find and exploit system vulnerabilities.  Sort of like a hacker, but not really  Much more limited time frame  Limited by scope (provided by customer)  Network, internal, cloud, deployments, applications, products  Some access to expose vulnerabilities  Objective: Coverage or target?  Approaches: scanning, reverse-engineering, social engineering Penetration Tests Try to break in! Then write a 40-80+ page report (in my case)
  • 17. Software & Hardware Vulnerabilities Input bad stuff. Make bad things happen here
  • 18. https://cve.mitre.org/ Common Vulnerabilities & Exposures Vulnerability Management
  • 19. Systems exposed to the Internet are attacked  Attackers scan for open ports  System vulnerabilities  Exploit to get foothold  Call home to C2  Send commands  Get credentials  Repeat
  • 21. Malware on infected machines scans for other machines to attack on the Internet and within internal networks. Zero Trust!
  • 22. People Many security incidents involve human actions!
  • 23.  Verify it’s a security problem.  Capture evidence in a way that proves no one tampered with it.  Handle evidence in a secure manner (chain of custody).  Contain the malware to prevent spread.  Potentially observe it or use the copy for analysis.  Remove it from systems – completely!  Report and learn from the incident. Digital Forensics & Incident Response (DFIR) Sample breach notifications in my weekly news feed.
  • 24. Q: How did our systems get breached? A: An attacker got ransomware onto our systems. Q: How did the attacker get ransomware onto our systems? A: They got onto one of the machines in our network. Q: How did they get onto the machine? A: General: Evil link in email, vulnerability, misconfiguration. Q: What was the link? What was the vulnerability? A: Specific: The actual link, CVE, IP address, port, software. Breach reports need root cause Ask the right questions.
  • 26.  Domain Generation Algorithm  CNAME pointing to C2 server  DNS and HTTP C2  IP Ranges  Steganography  Malware commands  Attack techniques https://www.fireeye.com/blog/threat-research/2020/12/sunburst-additional-technical- details.html https://medium.com/cloud-security/solarwinds-hack-retrospective-part-1-8107671e3314 Technical Details Security researcher or malware analyst
  • 28. Risk Management  Reduce risk of a data breach and potential damage.  Attack vectors: The different attacks available on your systems.  Attack surface: The amount of exposure available to attack.  Blast Radius: How much damage unauthorized access can cause. Key to security
  • 29. 1. Immutable software deliverables in Solar Winds deployments. 2. Identification of C2 network traffic by affected customers. 3. Least-privilege for credentials on infected systems. 4. Just-in-time and conditional access for high-risk actions. What could have prevented the attack? Security architecture Security operations or analyst Governance & Risk Management, IAM Governance & Risk Management, IAM
  • 30.  Security has a lot of rules and lists!  Where should you start?  How do attackers get in? 1. Abstract the details to core principles. 2. Prioritize fixing highest risk findings. 3. Avoid over-analysis. 4. Avoid repeat problems. Getting a handle on complexity What Causes Data Breaches?
  • 31. The Concept of Abstraction Less to manage.
  • 32. The same set of principles can stop or limit damage for a myriad of attacks!
  • 33. 20 cybersecurity questions  Key factors that drive data breaches.  Learn fundamental cybersecurity.  Study how attacks work.  Abstract common attack vectors.  Understand what stops them.  Reduce the chances you give attackers.  Create metrics that make a difference.  Automated reporting + Manual analysis.
  • 34. 20 questions to ask your security team How many CVEs? Developer security training? Network, data, app? Percent of systems exposed to the Internet? What are our security policies? Data exposed to Internet? Who generates most exceptions? Why? Total attack paths on our network? Security checks built into deployment systems? Potential damage if credentials stolen? Are we vetting our vendors? How? Percentage of accounts with MFA? Proof that our security solutions provide value? Percentage data encrypted when stored? Do we have an incident handling team or plan? Percentage of network traffic encrypted? What percent activities can be and are automated? Findings from pentests and assessments? What is the overall risk level? Getting better? Can we restore from backups? Tested? How is the threat landscape changing?
  • 35. Worldwide average cost of a breach https://www.ibm.com/security/data-breach
  • 36. U.S. average cost of a data breach https://www.ibm.com/security/data-breach
  • 37. Measure risk and reduce it $2.30M Cost difference for breaches with high vs. low level of compliance failures - IBM Cost of a Data Breach
  • 38. Automation $2.90M Average cost of a data breach at organizations with security AI and automation fully deployed. - IBM Cost of a Data Breach
  • 39. We still need humans for analysis. Not all problems can be solved by automation. Analysis
  • 40.  Executives  Developers  Marketing  Human resources  Salespeople  Interns!  Contractors  Third-party vendors Everyone needs security awareness! All it takes is one mistake…
  • 41.  People need to understand why rules exist.  Communication is critical.  Email and videos not that effective.  Iterative fixes.  Test before blocking.  Get executive support. The organization still needs to function https://www.sans.org/white-papers/36837 Without this, an exercise in futility
  • 42. Non-exhaustive list of security jobs Chief Information Security Officer (CISO) Security Administrator Risk Management & Governance / Privacy Officer Security Operations Center (SOC) Analyst Auditors and Assessors Cryptography / Cryptology / Cryptanalyst Blue Team (Defense) Penetration Testers / Red Team (Offense) Security Engineer (Application, Cloud, System, Network, Product, Hardware, Network) Security Architect (Application, System, Cloud, Enterprise, Product, Hardware, Network) Security Researcher / Malware Analyst Security Sales, Marketing, Product Management Digital Forensics & Incident Response (DFIR) Security Consultant / Specialist FBI Agent / Counter Espionage Agent / Cyber Spy Cyber Intelligence Specialist Information Security Analyst Security Manager
  • 43.  Catch hackers in the act? (Security Analyst, SOC)  Help companies after a cyber attack? (DFIR, CERT)  Study malware & attacks? (Security Researcher)  Hack? (Pentester, Red Team, Bug Bounties, Criminals)  Design & build secure systems? (Architect, Engineer)  Policies and risk reduction? (Risk Management, Governance)  Validate orgs follow rules? (Assessor, Auditor)  Implement policies and work with executives? (CISO)  Enforce policies? (CEO, Board of Directors) What do you want to do? Security Pros do not enforce!
  • 44. Security Salaries https://www.wsj.com/articles/cybersecurity-chiefs-are-in-high-demand-as-companies-face-rising- hacking-threats-11627551000 https://www.csoonline.com/article/3624670/cybersecurity-salary-what-8-top-security-jobs-pay.html  Survey of 354 CISOs Published by Heidrick & Struggles International, WSJ.  Median Salary of $509,000 over $473K in 2020.  Total compensation with equity grants & bonuses $936,000.  May be inflated and depends on company size. Generally over $200K.  Smaller companies tend to hire MSSPs, consultants, virtual CISO.  Other security jobs…might not pay as much as software development.  Explains the shortage in cybersecurity pros? Hope that changes soon. 2nd Sight Lab
  • 45.  Obtain skills: Look at job descriptions.  On-the-job training: Find a company that will train you.  Certifications / Degrees: Get you past the HR department.  Establish trust: Security is all about trust.  Meet people: Get involved in the security community.  Get experience: Internships, personal projects, CTFs, volunteer.  Demonstrate knowledge: Writing, GitHub, speaking, videos (use sources!)  Continuous learning: Security is a moving target.  Be familiar with current events: Read, Twitter, my news blog! How to get a job in cybersecurity
  • 47. Book: https://amzn.to/3C1g3F9 Cloud Security Blog: https://medium.com/cloud-security Cybersecurity News Blog: https://medium.com/cybersecurity- news @TeriRadichel Thank you! More on Twitter!

Editor's Notes

  1. https://livebook.manning.com/book/programming-the-ti-83-plus-ti-84-plus/chapter-2/200