DIY Education in Cyber Security

Kelly Shortridge
Kelly ShortridgeProduct Manager at Security Scorecard
DIY Education in Cyber Security
Kelly Shortridge July 30, 2015
Agenda
My goal is to help you figure out where and how to
start your learning journey by answering:
 What careers are there?
 How do I learn more about the field?
 How do I meet people / network?
 How do I stay current on industry trends?
2
Who am I?
Hi, I’m Kelly Shortridge
 Currently doing exciting things on the business side
of infosec
 Previously advised infosec companies on M&A and
private capital raise deals
 No technical background
 Built a knowledge base and network within infosec
from scratch
3
Career Paths
5
The “You Can’t Sit With Us” Myth
InfoSec as a professional field can seem a bit opaque,
insular and unapproachable.
In reality, it’s a blossoming field offering exciting
opportunities for a variety of skill sets and
interests…and not just full of cliques of “mean nerds”
6
InfoSec = Opportunity
Diverse potential paths to follow within infosec:
 Application Security
 Compliance & Policy
 Data Forensics & Incident Response
 Network Security Engineer / Ops & Monitoring
 Penetration Testing
 Security Architecture
 Security Solution Development
 Vulnerability Research & Reverse Engineering
7
InfoSec = Flexibility
Roles often overlap and have fuzzy boundaries
 Cover different aspects of the lifecycle of security
operations
Some areas of study are broadly applicable
 Data Science
 Math
 Network & System Architecture
 Software Development
8
Current Hotness
9
Skill Sets – Example #1
Network Security Engineer / Ops & Monitoring
 Understand network design & architecture
 Familiarity with security tech – IDS/IPS, SIEM,
firewalls, vulnerability detection & remediation
 Develop custom tooling for security monitoring
 Some knowledge on machine learning is a plus
10
Skill Sets – Example #2
Vulnerability Research & Reverse Engineering
 Analyze malicious code, shellcode, packed &
obfuscated code
 Identify attacker methodology
 Strong math abilities, particularly graph theory
 Familiarity with IDA Pro and user & kernel-mode
debuggers
 Languages: Assembly (x86 & x64), C/C++, Python
11
Skill Sets – Example #2
Application Security
 Audit applications for vulnerabilities (XSS, SQLI, logic
flaws, etc.)
 Understanding of application architecture
 Help development teams implement SDL
 Build tooling to improve testing & auditing
 Languages: Java, PHP, C / C++, Python, Ruby
12
Potential Employers
Major hubs include SF, NYC & DC – each city has its
own “flavor” driven by employer base
Government Private Vendors
Defense Contractors &
Gov’t Agencies
Tech, Finance, Media,
eCommerce, etc.
Security Vendors &
Consultancies
13
Broader Applicability
Security can serve as a differentiator in non-sec roles
 Anyone in the development process (design, UX,
etc.) should have the ability to consider security
implications of their decisions
 PR, legal and finance personnel should understand
their organization’s security risk profile
14
Find Your Purpose
Intersection of what you love doing, what you’re good
at doing, what is paid for and what the market needs
 Talent shortage in + known need for infosec means
you can focus on what you love + where you excel
Learning More
16
Where to Start?
Regardless of whether you’re a complete beginner,
switching fields or already successfully entered the
field, there’s plenty of knowledge and skills to gain.
17
Formal Education
Academia
Certifications
 Helpful if no other means of vetting abilities
18
Online Education
There are now tons of online resources available for
learning languages, development and data science
 Some free, some paid (often you get a certificate)
 Consistency is key; set a daily goal for practicing
19
Old-School Resources
If you prefer the more traditional book approach, try:
 The Art of Software Security Assessment
 Hacking: The Art of Exploitation
 The Shellcoder's Handbook
 Android Hacker's Handbook
 iOS Hacker's Handbook
20
CTFs & Other Games
Allows you to improve & show off your skills
 CTFs: DEFCON CTF, CSAW CTF, Ghost in the
Shellcode, MITRE STEM CTF, NECCDC, picoCTF
 Wargames: Hack this Site, Over the Wire, Smash the
Stack
 Reference list: http://captf.com/practice-ctf/
21
Conferences
Cons are often how people stay in touch
 Check out talks, or find them online
 Social events – great for networking
 Parties requiring challenges (Caesar’s Challenge at
Blackhat/DEFCON)
22
Meetups & Local Events
 Meetup.com is a great aggregator of
different meetups in your locale
 Code as Craft: Engineering talks
sponsored by Etsy here in NYC
Find local events to explore different areas of interest,
learn or practice skills and meet new people
23
Trainings
 Practical education with focus on
specific professional roles in infosec
Training sessions can quickly bring you up the learning
curve, but typically are expensive ($2,000 - $5,000)
 Conferences aggregate trainings
from a variety of companies, though
additional trainings are generally held
year round as well
24
Academic Papers
Explore emerging areas of research
 arXiv
 IEEE
 Microsoft – Security & Privacy Research
 Reddit.com/r/NetSec
 USENIX
Make note of particular topics you find interesting and
don’t be shy in contacting the authors directly
Networking
26
Step 1: Trust
InfoSec is a trust-based industry.
Don’t violate trust and be wary of those who do.
27
Networking Strategy
Get as many “at bats” as possible
 Meet many people across various areas of
expertise, employers & career stages
 Not everyone will respond, so need to maximize
your hit rate by reaching out to more people
 Expand your network by asking new contacts
(politely) if they know anyone you should meet
Awkwardness is a Part of Life
28
29
#hatersgonnahate
Don’t let anyone convince you that you won’t be
successful or don’t belong in the industry
 People like passion and
want to support “winners”
 Persistence is key (true of
most things)
 Define your own measure
of success
30
Contact Maintenance
Regularly follow-up, but be mindful of people’s time
 People generally like getting a “free” coffee
Even starting out, consider how you can be helpful
 Try to maintain a 50/50 ask to give ratio
 Keep an eye out for potential hires, introductions /
connections or research they’d find interesting
Keeping Up to Date
32
Socializing
Staying in touch and meeting new people helps
enormously in knowing the “latest”
 Not all research / projects are discussed online
 Gossip and chatter can also inform you of career
opportunities or new, interesting companies
 Fills in gaps in news you might have missed
33
Mainstream News is Not Ideal
Mostly a lot of this:
34
Suggested News Sources
 Twitter – where the industry “chatter” happens
 CyberWire – aggregates InfoSec news daily
 Individual websites:
35
Short InfoSec Twitter List
 @0xcharlie
 @4Dgifts
 @alexstamos
 @aloria
 @bcrypt
 @c7zero
 @cBekrar
 @chrisrohlf
 @collinrm
 @crypt0ad
 @dinodaizovi
 @djrbliss
 @drraid
 @esizkur
 @halvarflake
 @haroonmeer
 @j4istal
 @justineboneait
 @k8em0
 @mattblaze
 @matthew_d_green
 @mdowd
 @msuiche
 @nils
 @nudehaberdasher
 @pencilsareneat
 @quine
 @runasand
 @s7ephen
 @semibogan
 @_snagg
 @snare
 @SwiftOnSecurity
 @thegrugq
 @WeldPond
 @window
Conclusions
37
You Do You
 Consistently build your personal portfolio of
skills, experience and industry connections
 The field is rich with options, so you’ll likely
find a role you enjoy and in which you excel
 On the infosec industry treadmill, remember
that it’s a marathon, not a sprint
38
A Closing Quote
“Work as hard and as much as you want to on
the things you like to do the best.
Don't think about what you want to be, but what
you want to do.”
– Richard P. Feynman
1 of 38

Recommended

Hyphenet Security Awareness Training by
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
1.5K views65 slides
Endpoint Protection by
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
6.4K views32 slides
Cybersecurity Awareness Training Presentation v1.2 by
Cybersecurity Awareness Training Presentation v1.2Cybersecurity Awareness Training Presentation v1.2
Cybersecurity Awareness Training Presentation v1.2DallasHaselhorst
3.1K views43 slides
Phishing by
PhishingPhishing
Phishinganjalika sinha
1.1K views14 slides
IT Security Awarenesss by Northern Virginia Community College by
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
10.6K views39 slides
CNIT 129S: Ch 7: Attacking Session Management by
CNIT 129S: Ch 7: Attacking Session Management CNIT 129S: Ch 7: Attacking Session Management
CNIT 129S: Ch 7: Attacking Session Management Sam Bowne
1.1K views128 slides

More Related Content

What's hot

Firewall and its purpose by
Firewall and its purposeFirewall and its purpose
Firewall and its purposeRohit Phulsunge
6K views33 slides
Offline bruteforce attack on WiFi Protected Setup by
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup0xcite
544.7K views21 slides
Cybersecurity Awareness Training Presentation v1.1 by
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1DallasHaselhorst
2.6K views42 slides
Cyber security training by
Cyber security trainingCyber security training
Cyber security trainingWilmington University
8.9K views16 slides
SharePoint Online へのアクセスを制限しよう by
SharePoint Online へのアクセスを制限しようSharePoint Online へのアクセスを制限しよう
SharePoint Online へのアクセスを制限しようHirofumi Ota
4.4K views21 slides
Firewall by
FirewallFirewall
Firewallnayakslideshare
1.9K views13 slides

What's hot(20)

Offline bruteforce attack on WiFi Protected Setup by 0xcite
Offline bruteforce attack on WiFi Protected SetupOffline bruteforce attack on WiFi Protected Setup
Offline bruteforce attack on WiFi Protected Setup
0xcite544.7K views
Cybersecurity Awareness Training Presentation v1.1 by DallasHaselhorst
Cybersecurity Awareness Training Presentation v1.1Cybersecurity Awareness Training Presentation v1.1
Cybersecurity Awareness Training Presentation v1.1
DallasHaselhorst2.6K views
SharePoint Online へのアクセスを制限しよう by Hirofumi Ota
SharePoint Online へのアクセスを制限しようSharePoint Online へのアクセスを制限しよう
SharePoint Online へのアクセスを制限しよう
Hirofumi Ota4.4K views
Cybersecurity Awareness Training by Dave Monahan
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
Dave Monahan1.6K views
Dell Technologies Cyber Security playbook by Margarete McGrath
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath286 views
Introduction to Web Application Penetration Testing by Anurag Srivastava
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava2.2K views
Saml×SharePoint by y-matsuoka
Saml×SharePointSaml×SharePoint
Saml×SharePoint
y-matsuoka19.5K views
Ethical hacking and cyber security intro by Abhilash Ak
Ethical hacking and cyber security introEthical hacking and cyber security intro
Ethical hacking and cyber security intro
Abhilash Ak1.2K views
What is Social Engineering? An illustrated presentation. by Pratum
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum13.9K views
FIREWALL by Akash R
FIREWALL FIREWALL
FIREWALL
Akash R811 views
Why upgrade your MFA to Adaptive Authentication? by WSO2
Why upgrade your MFA to Adaptive Authentication?Why upgrade your MFA to Adaptive Authentication?
Why upgrade your MFA to Adaptive Authentication?
WSO2539 views
Cybersecurity Awareness Training Presentation v1.3 by DallasHaselhorst
Cybersecurity Awareness Training Presentation v1.3Cybersecurity Awareness Training Presentation v1.3
Cybersecurity Awareness Training Presentation v1.3
DallasHaselhorst2.6K views
Introduction to red team operations by Sunny Neo
Introduction to red team operationsIntroduction to red team operations
Introduction to red team operations
Sunny Neo1.3K views
Owasp top 10 vulnerabilities by OWASP Delhi
Owasp top 10 vulnerabilitiesOwasp top 10 vulnerabilities
Owasp top 10 vulnerabilities
OWASP Delhi4.5K views
Phishing & Pharming Explained.pdf by Evs, Lahore
Phishing & Pharming Explained.pdfPhishing & Pharming Explained.pdf
Phishing & Pharming Explained.pdf
Evs, Lahore131 views

Similar to DIY Education in Cyber Security

Should i study cyber security by
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
117 views15 slides
Talks submitted by
Talks submittedTalks submitted
Talks submittedKim Minh
1.5K views65 slides
Cyber Education: Your Options & Resources Mapped Out by
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutKelly Shortridge
3.2K views51 slides
Ethical Hacking, Its relevance and Its Prospects by
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
756 views21 slides
- Social Engineering Unit- II Part- I.pdf by
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
13 views31 slides
Securing And Protecting Information Protection by
Securing And Protecting Information ProtectionSecuring And Protecting Information Protection
Securing And Protecting Information ProtectionSusan Kennedy
2 views79 slides

Similar to DIY Education in Cyber Security(20)

Should i study cyber security by Vishal Singh
Should i study cyber securityShould i study cyber security
Should i study cyber security
Vishal Singh117 views
Talks submitted by Kim Minh
Talks submittedTalks submitted
Talks submitted
Kim Minh1.5K views
Cyber Education: Your Options & Resources Mapped Out by Kelly Shortridge
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
Kelly Shortridge3.2K views
Ethical Hacking, Its relevance and Its Prospects by Rwik Kumar Dutta
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
Rwik Kumar Dutta756 views
- Social Engineering Unit- II Part- I.pdf by Ramya Nellutla
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
Ramya Nellutla13 views
Securing And Protecting Information Protection by Susan Kennedy
Securing And Protecting Information ProtectionSecuring And Protecting Information Protection
Securing And Protecting Information Protection
Susan Kennedy2 views
Phx-techtalk by Thinkful
Phx-techtalkPhx-techtalk
Phx-techtalk
Thinkful132 views
Phxtech830 by Thinkful
Phxtech830Phxtech830
Phxtech830
Thinkful116 views
PHXTECH830 by Thinkful
PHXTECH830PHXTECH830
PHXTECH830
Thinkful183 views
Let's Talk: fundamentals of conversational design by Nikita Lukianets
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational design
Nikita Lukianets1.5K views
The Impact Of Wearable Activity Devices On The Fitness... by Heidi Perry
The Impact Of Wearable Activity Devices On The Fitness...The Impact Of Wearable Activity Devices On The Fitness...
The Impact Of Wearable Activity Devices On The Fitness...
Heidi Perry2 views
So... you want to be a security consultant by abnmi
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
abnmi254 views
Project professionals: Ready for the future? AI and Change Management, James ... by APMDonotuse
Project professionals: Ready for the future? AI and Change Management, James ...Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...
APMDonotuse41 views
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee by EC-Council
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
EC-Council199 views
Fallon Brainfood x MNAMA: Being Digital by Aki Spicer
Fallon Brainfood x MNAMA: Being DigitalFallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being Digital
Aki Spicer1.3K views
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019 by Resourceful Nonprofit
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Blockchain Brochure - Open Reply by Ausrine S.
Blockchain Brochure - Open ReplyBlockchain Brochure - Open Reply
Blockchain Brochure - Open Reply
Ausrine S.322 views
DeepSec: Social driven vulnerability assessment by Cefriel
DeepSec: Social driven vulnerability assessmentDeepSec: Social driven vulnerability assessment
DeepSec: Social driven vulnerability assessment
Cefriel3.3K views

More from Kelly Shortridge

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game by
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
466 views132 slides
The Red Pill of Resilience by
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of ResilienceKelly Shortridge
333 views111 slides
Volatile Memory: Behavioral Game Theory in Defensive Security by
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
3.6K views54 slides
Know Thyself: Optimizing Team Decision-Making by
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKelly Shortridge
1K views39 slides
How to Become an InfoSec Autodidact by
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactKelly Shortridge
1.1K views46 slides
The Art of Explanation: Behavioral models of infosec by
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecKelly Shortridge
733 views37 slides

More from Kelly Shortridge(8)

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game by Kelly Shortridge
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Kelly Shortridge466 views
Volatile Memory: Behavioral Game Theory in Defensive Security by Kelly Shortridge
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
Kelly Shortridge3.6K views
Know Thyself: Optimizing Team Decision-Making by Kelly Shortridge
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
Kelly Shortridge1K views
How to Become an InfoSec Autodidact by Kelly Shortridge
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec Autodidact
Kelly Shortridge1.1K views
The Art of Explanation: Behavioral models of infosec by Kelly Shortridge
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosec
Kelly Shortridge733 views
Privacy vs. Security: A False Trade-Off? by Kelly Shortridge
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
Kelly Shortridge511 views
Behavioral Models of Information Security: Industry irrationality & what to d... by Kelly Shortridge
Behavioral Models of Information Security: Industry irrationality & what to d...Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...
Kelly Shortridge2.7K views

Recently uploaded

MVP and prioritization.pdf by
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
39 views8 slides
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell by
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
"Node.js vs workers — A comparison of two JavaScript runtimes", James M SnellFwdays
14 views30 slides
The Role of Patterns in the Era of Large Language Models by
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
91 views65 slides
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
199 views20 slides
Measurecamp Brussels - Synthetic data.pdf by
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdfHuman37
26 views14 slides
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
91 views52 slides

Recently uploaded(20)

"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell by Fwdays
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
"Node.js vs workers — A comparison of two JavaScript runtimes", James M Snell
Fwdays14 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 views
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... by ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 views
Measurecamp Brussels - Synthetic data.pdf by Human37
Measurecamp Brussels - Synthetic data.pdfMeasurecamp Brussels - Synthetic data.pdf
Measurecamp Brussels - Synthetic data.pdf
Human37 26 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... by The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Power of Heat Decarbonisation Plans in the Built Environment by IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 views
Deep Tech and the Amplified Organisation: Core Concepts by Holonomics
Deep Tech and the Amplified Organisation: Core ConceptsDeep Tech and the Amplified Organisation: Core Concepts
Deep Tech and the Amplified Organisation: Core Concepts
Holonomics17 views
AIM102-S_Cognizant_CognizantCognitive by PhilipBasford
AIM102-S_Cognizant_CognizantCognitiveAIM102-S_Cognizant_CognizantCognitive
AIM102-S_Cognizant_CognizantCognitive
PhilipBasford21 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays58 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 views
Optimizing Communication to Optimize Human Behavior - LCBM by Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 views
Discover Aura Workshop (12.5.23).pdf by Neo4j
Discover Aura Workshop (12.5.23).pdfDiscover Aura Workshop (12.5.23).pdf
Discover Aura Workshop (12.5.23).pdf
Neo4j15 views
"Running students' code in isolation. The hard way", Yurii Holiuk by Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 views
What is Authentication Active Directory_.pptx by HeenaMehta35
What is Authentication Active Directory_.pptxWhat is Authentication Active Directory_.pptx
What is Authentication Active Directory_.pptx
HeenaMehta3515 views
The Power of Generative AI in Accelerating No Code Adoption.pdf by Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Saeed Al Dhaheri39 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10146 views
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」 by PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」
PCCC23:日本AMD株式会社 テーマ2「AMD EPYC™ プロセッサーを用いたAIソリューション」

DIY Education in Cyber Security

  • 1. DIY Education in Cyber Security Kelly Shortridge July 30, 2015
  • 2. Agenda My goal is to help you figure out where and how to start your learning journey by answering:  What careers are there?  How do I learn more about the field?  How do I meet people / network?  How do I stay current on industry trends? 2
  • 3. Who am I? Hi, I’m Kelly Shortridge  Currently doing exciting things on the business side of infosec  Previously advised infosec companies on M&A and private capital raise deals  No technical background  Built a knowledge base and network within infosec from scratch 3
  • 5. 5 The “You Can’t Sit With Us” Myth InfoSec as a professional field can seem a bit opaque, insular and unapproachable. In reality, it’s a blossoming field offering exciting opportunities for a variety of skill sets and interests…and not just full of cliques of “mean nerds”
  • 6. 6 InfoSec = Opportunity Diverse potential paths to follow within infosec:  Application Security  Compliance & Policy  Data Forensics & Incident Response  Network Security Engineer / Ops & Monitoring  Penetration Testing  Security Architecture  Security Solution Development  Vulnerability Research & Reverse Engineering
  • 7. 7 InfoSec = Flexibility Roles often overlap and have fuzzy boundaries  Cover different aspects of the lifecycle of security operations Some areas of study are broadly applicable  Data Science  Math  Network & System Architecture  Software Development
  • 9. 9 Skill Sets – Example #1 Network Security Engineer / Ops & Monitoring  Understand network design & architecture  Familiarity with security tech – IDS/IPS, SIEM, firewalls, vulnerability detection & remediation  Develop custom tooling for security monitoring  Some knowledge on machine learning is a plus
  • 10. 10 Skill Sets – Example #2 Vulnerability Research & Reverse Engineering  Analyze malicious code, shellcode, packed & obfuscated code  Identify attacker methodology  Strong math abilities, particularly graph theory  Familiarity with IDA Pro and user & kernel-mode debuggers  Languages: Assembly (x86 & x64), C/C++, Python
  • 11. 11 Skill Sets – Example #2 Application Security  Audit applications for vulnerabilities (XSS, SQLI, logic flaws, etc.)  Understanding of application architecture  Help development teams implement SDL  Build tooling to improve testing & auditing  Languages: Java, PHP, C / C++, Python, Ruby
  • 12. 12 Potential Employers Major hubs include SF, NYC & DC – each city has its own “flavor” driven by employer base Government Private Vendors Defense Contractors & Gov’t Agencies Tech, Finance, Media, eCommerce, etc. Security Vendors & Consultancies
  • 13. 13 Broader Applicability Security can serve as a differentiator in non-sec roles  Anyone in the development process (design, UX, etc.) should have the ability to consider security implications of their decisions  PR, legal and finance personnel should understand their organization’s security risk profile
  • 14. 14 Find Your Purpose Intersection of what you love doing, what you’re good at doing, what is paid for and what the market needs  Talent shortage in + known need for infosec means you can focus on what you love + where you excel
  • 16. 16 Where to Start? Regardless of whether you’re a complete beginner, switching fields or already successfully entered the field, there’s plenty of knowledge and skills to gain.
  • 17. 17 Formal Education Academia Certifications  Helpful if no other means of vetting abilities
  • 18. 18 Online Education There are now tons of online resources available for learning languages, development and data science  Some free, some paid (often you get a certificate)  Consistency is key; set a daily goal for practicing
  • 19. 19 Old-School Resources If you prefer the more traditional book approach, try:  The Art of Software Security Assessment  Hacking: The Art of Exploitation  The Shellcoder's Handbook  Android Hacker's Handbook  iOS Hacker's Handbook
  • 20. 20 CTFs & Other Games Allows you to improve & show off your skills  CTFs: DEFCON CTF, CSAW CTF, Ghost in the Shellcode, MITRE STEM CTF, NECCDC, picoCTF  Wargames: Hack this Site, Over the Wire, Smash the Stack  Reference list: http://captf.com/practice-ctf/
  • 21. 21 Conferences Cons are often how people stay in touch  Check out talks, or find them online  Social events – great for networking  Parties requiring challenges (Caesar’s Challenge at Blackhat/DEFCON)
  • 22. 22 Meetups & Local Events  Meetup.com is a great aggregator of different meetups in your locale  Code as Craft: Engineering talks sponsored by Etsy here in NYC Find local events to explore different areas of interest, learn or practice skills and meet new people
  • 23. 23 Trainings  Practical education with focus on specific professional roles in infosec Training sessions can quickly bring you up the learning curve, but typically are expensive ($2,000 - $5,000)  Conferences aggregate trainings from a variety of companies, though additional trainings are generally held year round as well
  • 24. 24 Academic Papers Explore emerging areas of research  arXiv  IEEE  Microsoft – Security & Privacy Research  Reddit.com/r/NetSec  USENIX Make note of particular topics you find interesting and don’t be shy in contacting the authors directly
  • 26. 26 Step 1: Trust InfoSec is a trust-based industry. Don’t violate trust and be wary of those who do.
  • 27. 27 Networking Strategy Get as many “at bats” as possible  Meet many people across various areas of expertise, employers & career stages  Not everyone will respond, so need to maximize your hit rate by reaching out to more people  Expand your network by asking new contacts (politely) if they know anyone you should meet
  • 28. Awkwardness is a Part of Life 28
  • 29. 29 #hatersgonnahate Don’t let anyone convince you that you won’t be successful or don’t belong in the industry  People like passion and want to support “winners”  Persistence is key (true of most things)  Define your own measure of success
  • 30. 30 Contact Maintenance Regularly follow-up, but be mindful of people’s time  People generally like getting a “free” coffee Even starting out, consider how you can be helpful  Try to maintain a 50/50 ask to give ratio  Keep an eye out for potential hires, introductions / connections or research they’d find interesting
  • 32. 32 Socializing Staying in touch and meeting new people helps enormously in knowing the “latest”  Not all research / projects are discussed online  Gossip and chatter can also inform you of career opportunities or new, interesting companies  Fills in gaps in news you might have missed
  • 33. 33 Mainstream News is Not Ideal Mostly a lot of this:
  • 34. 34 Suggested News Sources  Twitter – where the industry “chatter” happens  CyberWire – aggregates InfoSec news daily  Individual websites:
  • 35. 35 Short InfoSec Twitter List  @0xcharlie  @4Dgifts  @alexstamos  @aloria  @bcrypt  @c7zero  @cBekrar  @chrisrohlf  @collinrm  @crypt0ad  @dinodaizovi  @djrbliss  @drraid  @esizkur  @halvarflake  @haroonmeer  @j4istal  @justineboneait  @k8em0  @mattblaze  @matthew_d_green  @mdowd  @msuiche  @nils  @nudehaberdasher  @pencilsareneat  @quine  @runasand  @s7ephen  @semibogan  @_snagg  @snare  @SwiftOnSecurity  @thegrugq  @WeldPond  @window
  • 37. 37 You Do You  Consistently build your personal portfolio of skills, experience and industry connections  The field is rich with options, so you’ll likely find a role you enjoy and in which you excel  On the infosec industry treadmill, remember that it’s a marathon, not a sprint
  • 38. 38 A Closing Quote “Work as hard and as much as you want to on the things you like to do the best. Don't think about what you want to be, but what you want to do.” – Richard P. Feynman