SlideShare a Scribd company logo
1 of 29
Download to read offline
ANDRA ZAHARIA
5 Key Decisions
That Shape Your
Infosec Career
Freelance Senior Content Marketer
In digital marketing for the past 10
years
Working with infosec & privacy
companies for the past 5 years
Non-technical geek
Written over 500k words of
educational infosec content (articles,
emails, tips, case studies, social media
posts, etc.)
DefCamp volunteer since 2017
Helicopter cat mom
Hey! Hi!
This is finally happening!
Cybersecurity career paths you can
build towards:
Security Software Developer
Security Architect
Security Consultant
Information Security Analyst
Ethical Hacker
Computer Forensics Analyst
Chief Information Security Officer
Penetration Tester
IT Security Consultant
Security Systems Administrator
People worked in
infosec in the US (2018)
3.5 mil.
715k
313k
Cybersecurity job
openings by 2021
Infosec jobs available in
the US (2018)
https://www.cyberseek.org/
TOP CYBERSECURITY JOB TITLES
Cyber Security Engineer
Cyber Security Analyst
Network Engineer / Architect
Cyber Security Manager / Administrator
Systems Engineer
Software Developer / Engineer
Systems Administrator
Vulnerability Analyst / Penetration Tester
Cyber Security Consultant https://www.cyberseek.org/
1. DECIDE TO
BUILD AND FOLLOW
YOUR PROCESS
LET'S GET PRACTICAL
Decide to
build and
follow your
process
GET EDUCATION & CERTIFICATIONS
LEARN TO CODE
UNDERSTAND THE FIELD
FIND KEY PEOPLE TO LEARN FROM
BUILD YOUR SETUP
WORDS TO PONDER
“Nothing is as empowering
as real-world validation,
even if it's for failure.”
STEVEN PRESSFIELD
Decide to
build and
follow your
process
LEARN FROM MENTORS & PEERS
DEVELOP A FEEDBACK LOOP
LEARN HOW TO UNPACK IT & USE IT
APPLY YOUR KNOWLEDGE & SKILLS
BUILD A PRESENCE IN THE FIELD
There are
some awesome
communities
out there:
BUILD A WEBSITE
JOIN PEERLYST.COM
USE TWITTER
2. DECIDE TO
PLAY AN INFINITE GAME
HERE'S WHAT I MEAN BY THAT
WORDS TO PONDER
“A finite game is played for
the purpose of winning, an
infinite game for the purpose
of continuing the play.”
JAMES P. CARSE
Decide to
play an
infinite game
PREPARE TO DEAL WITH SURPRISES
DEVELOP AN APPETITE FOR CHANGE
TAP INTO UNLIMITED GROWTH
STAY ENGAGED AND CHALLENGED
CULTIVATE A GROWTH MINDSET
WORDS TO PONDER
“Individuals who believe their
talents can be developed (through
hard work, good strategies, and
input from others) have a growth
mindset.”
CAROL DWECK
So much
to learn,
so litte time!
SUBSCRIBE TO
NEWSLETTERS
DefCamp
Daniel Miessler
The CyberWire
Troy Hunt
LISTEN TO PODCASTS
Darknet Diaries
Hacking Humans
Smashing Security
FOLLOW JOURNALISTS
& RESEARCHERS
Lesley Carhart
Zack Whittaker
Eva Galperin
Kevin Beaumont
3. DECIDE TO
MAKE A CONTRIBUTION
I HAVE SOME SUGGESTIONS
Decide to
make a
contribution
INTERN IN COMPANIES
VOLUNTEER AT EVENTS
GO TO MEETUPS & CONFERENCES
SUBMIT YOUR PAPER
ANSWER QUESTIONS
Where you
can contribute
and learn
FORUMS
BleepingComputer
MalwareTips
Wilders Security
COMMUNITIES
Peerlyst
Reddit
Telegram groups
SOCIAL MEDIA
Twitter
Quora
LinkedIn
4. DECIDE TO
GO PRO
THIS IS MY FAVORITE PART
WORDS TO PONDER
“The professional does not
wait for inspiration; he acts
in anticipation of it."
STEVEN PRESSFIELD
Decide to
go pro
BE DEPENDABLE
GET FOCUS AND CLARITY
UNDERSTAND THE BUSINESS
SHOW UP AND DO YOUR BEST
ARTICULATE YOUR IDEAS & OPINIONS
WORDS TO PONDER
“The counterfeit innovator
is wildly self-confident. The
real one is scared to death.”
STEVEN PRESSFIELD
Decide to
go pro
CULTIVATE LONG-LASTING CURIOSITY
DECIDE WHAT ENOUGH MEANS TO YOU
DEFINE YOUR GUIDING PRINCIPLES
BUILD STRATEGIC VISION & FORESIGHT
KNOW YOU'RE ALWAYS BECOMING
WORDS TO PONDER
“What we get when we turn pro is,
we find our power. We find our will
and our voice and we find our self-
respect. We become who we always
were but had, until then, been afraid
to embrace and to live out.”
STEVEN PRESSFIELD
5. DECIDE TO
WORK ON SOMETHING
MEANINGFUL &
REWARDING
IT'S UP TO YOU
Decide to
work on
something
meaningful &
rewarding
BOOST YOUR SELF-AWARENESS
SEE THE BIGGER PICTURE
SOLVE INTRICATE PUZZLES
WORK WITH ADVANCED TEAMS & TECH
DERIVE VALUE & PERSONAL REWARDS
CHECK OUT THESE RESOURCES
There are some great tidbits in here:
How to Build a Successful Career in Information Security /
Cybersecurity -https://danielmiessler.com/blog/build-successful-
infosec-career/
What Having a “Growth Mindset” Actually Means -
https://hbr.org/2016/01/what-having-a-growth-mindset-actually-
means
What it’s like to work in cybersecurity (part I) -
https://def.camp/work-in-cybersecurity/
100 Questions for Better Decisions - https://andrazaharia.com/100-
questions-for-better-decisions/
Tips on how to live with imposter syndrome -
https://andrazaharia.com/imposter-syndrome/
InfoSec
Career
Hacking:
Sell Your
Skillz, Not
Your Soul
Thanks for
the
Feedback
Finite and
Infinite
Games
Ego Is the
Enemy
Turning Pro
Aaron W. Bayles
Chris Hurley
Douglas Stone
 Sheila Heen
James P. Carse Ryan Holiday Steven Pressfield
AndraZaharia.com
AndraZaharia.com/newsletter
AndraZaharia.com/the-podcast
You get the point.
@andrazaharia on Twitter & Medium
Find this presentation on:
slideshare.net/AndraZaharia
Thanks! Bye!
See you soon!

More Related Content

Similar to 5 Key Decisions That Shape Your Infosec Career

Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
Getting Plugged Into Data Science
Getting Plugged Into Data ScienceGetting Plugged Into Data Science
Getting Plugged Into Data ScienceCaitlin Hudon
 
Why What & How of the Internet of Things
Why What & How of the Internet of ThingsWhy What & How of the Internet of Things
Why What & How of the Internet of ThingsIdeas 2 Propel U
 
Why What & How of the Internet of Things
Why What & How of the Internet of Things Why What & How of the Internet of Things
Why What & How of the Internet of Things THINK Interactive, inc.
 
What the Internet of Things Really Means - For Marketers and Digital Agencies
What the Internet of Things Really Means - For Marketers and Digital AgenciesWhat the Internet of Things Really Means - For Marketers and Digital Agencies
What the Internet of Things Really Means - For Marketers and Digital AgenciesZach Pousman
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023KharimMchatta
 
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 KeynoteThe Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 KeynoteVeracode
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetAbhinav Mishra
 
Level Up - A Career in Security
Level Up - A Career in SecurityLevel Up - A Career in Security
Level Up - A Career in SecurityGabriel Mathenge
 
Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information SecurityDennis Maldonado
 
Giants, Passion and Pitching
Giants, Passion and PitchingGiants, Passion and Pitching
Giants, Passion and PitchingThe Start Society
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Adria Richards
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyAlisa Alvich
 
Blacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop presoBlacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop presoblacksintechnology
 
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis..."Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...TheFamily
 
Social Media For Lawyers Update
Social Media For Lawyers UpdateSocial Media For Lawyers Update
Social Media For Lawyers UpdateJayne Navarre
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster1508 A/S
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsediveGrace Chi
 

Similar to 5 Key Decisions That Shape Your Infosec Career (20)

Talks submitted
Talks submittedTalks submitted
Talks submitted
 
Getting Plugged Into Data Science
Getting Plugged Into Data ScienceGetting Plugged Into Data Science
Getting Plugged Into Data Science
 
Why What & How of the Internet of Things
Why What & How of the Internet of ThingsWhy What & How of the Internet of Things
Why What & How of the Internet of Things
 
Why What & How of the Internet of Things
Why What & How of the Internet of Things Why What & How of the Internet of Things
Why What & How of the Internet of Things
 
What the Internet of Things Really Means - For Marketers and Digital Agencies
What the Internet of Things Really Means - For Marketers and Digital AgenciesWhat the Internet of Things Really Means - For Marketers and Digital Agencies
What the Internet of Things Really Means - For Marketers and Digital Agencies
 
AI in Cybersecurity | 2023
AI in Cybersecurity | 2023AI in Cybersecurity | 2023
AI in Cybersecurity | 2023
 
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 KeynoteThe Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
The Security Industry: How to Survive Becoming Management BSIDESLV 2013 Keynote
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
Level Up - A Career in Security
Level Up - A Career in SecurityLevel Up - A Career in Security
Level Up - A Career in Security
 
Getting Started in Information Security
Getting Started in Information SecurityGetting Started in Information Security
Getting Started in Information Security
 
Giants, Passion and Pitching
Giants, Passion and PitchingGiants, Passion and Pitching
Giants, Passion and Pitching
 
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
Effectiveness Vs Efficiency: Practical ways for dealing with Information Over...
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
ImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copyImageQuest_Newsletter_July_Milton copy
ImageQuest_Newsletter_July_Milton copy
 
Blacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop presoBlacks In Technology BMI Tech Workshop preso
Blacks In Technology BMI Tech Workshop preso
 
Social selling
Social sellingSocial selling
Social selling
 
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis..."Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
"Growth hacking - The Launch of MJML" by Nicolas Garnier, Developer Evengelis...
 
Social Media For Lawyers Update
Social Media For Lawyers UpdateSocial Media For Lawyers Update
Social Media For Lawyers Update
 
Ai and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - MorgenboosterAi and Design: When, Why and How? - Morgenbooster
Ai and Design: When, Why and How? - Morgenbooster
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - Pulsedive
 

More from DefCamp

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht HackingDefCamp
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!DefCamp
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of TrustDefCamp
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?DefCamp
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXDefCamp
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...DefCamp
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDefCamp
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)DefCamp
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFADefCamp
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationDefCamp
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money downDefCamp
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...DefCamp
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochDefCamp
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareDefCamp
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?DefCamp
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured DefCamp
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...DefCamp
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.DefCamp
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber SecurityDefCamp
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering holeDefCamp
 

More from DefCamp (20)

Remote Yacht Hacking
Remote Yacht HackingRemote Yacht Hacking
Remote Yacht Hacking
 
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!Mobile, IoT, Clouds… It’s time to hire your own risk manager!
Mobile, IoT, Clouds… It’s time to hire your own risk manager!
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?Internet Balkanization: Why Are We Raising Borders Online?
Internet Balkanization: Why Are We Raising Borders Online?
 
Bridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UXBridging the gap between CyberSecurity R&D and UX
Bridging the gap between CyberSecurity R&D and UX
 
Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...Secure and privacy-preserving data transmission and processing using homomorp...
Secure and privacy-preserving data transmission and processing using homomorp...
 
Drupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the AttackerDrupalgeddon 2 – Yet Another Weapon for the Attacker
Drupalgeddon 2 – Yet Another Weapon for the Attacker
 
Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)Economical Denial of Sustainability in the Cloud (EDOS)
Economical Denial of Sustainability in the Cloud (EDOS)
 
Trust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFATrust, but verify – Bypassing MFA
Trust, but verify – Bypassing MFA
 
Threat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical ApplicationThreat Hunting: From Platitudes to Practical Application
Threat Hunting: From Platitudes to Practical Application
 
Building application security with 0 money down
Building application security with 0 money downBuilding application security with 0 money down
Building application security with 0 money down
 
Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...Implementation of information security techniques on modern android based Kio...
Implementation of information security techniques on modern android based Kio...
 
Lattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epochLattice based Merkle for post-quantum epoch
Lattice based Merkle for post-quantum epoch
 
The challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcareThe challenge of building a secure and safe digital environment in healthcare
The challenge of building a secure and safe digital environment in healthcare
 
Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?Timing attacks against web applications: Are they still practical?
Timing attacks against web applications: Are they still practical?
 
Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured Tor .onions: The Good, The Rotten and The Misconfigured
Tor .onions: The Good, The Rotten and The Misconfigured
 
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
Needles, Haystacks and Algorithms: Using Machine Learning to detect complex t...
 
We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.We will charge you. How to [b]reach vendor’s network using EV charging station.
We will charge you. How to [b]reach vendor’s network using EV charging station.
 
Connect & Inspire Cyber Security
Connect & Inspire Cyber SecurityConnect & Inspire Cyber Security
Connect & Inspire Cyber Security
 
The lions and the watering hole
The lions and the watering holeThe lions and the watering hole
The lions and the watering hole
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

5 Key Decisions That Shape Your Infosec Career

  • 1. ANDRA ZAHARIA 5 Key Decisions That Shape Your Infosec Career Freelance Senior Content Marketer
  • 2. In digital marketing for the past 10 years Working with infosec & privacy companies for the past 5 years Non-technical geek Written over 500k words of educational infosec content (articles, emails, tips, case studies, social media posts, etc.) DefCamp volunteer since 2017 Helicopter cat mom Hey! Hi! This is finally happening!
  • 3. Cybersecurity career paths you can build towards: Security Software Developer Security Architect Security Consultant Information Security Analyst Ethical Hacker Computer Forensics Analyst Chief Information Security Officer Penetration Tester IT Security Consultant Security Systems Administrator
  • 4. People worked in infosec in the US (2018) 3.5 mil. 715k 313k Cybersecurity job openings by 2021 Infosec jobs available in the US (2018) https://www.cyberseek.org/
  • 5. TOP CYBERSECURITY JOB TITLES Cyber Security Engineer Cyber Security Analyst Network Engineer / Architect Cyber Security Manager / Administrator Systems Engineer Software Developer / Engineer Systems Administrator Vulnerability Analyst / Penetration Tester Cyber Security Consultant https://www.cyberseek.org/
  • 6. 1. DECIDE TO BUILD AND FOLLOW YOUR PROCESS LET'S GET PRACTICAL
  • 7. Decide to build and follow your process GET EDUCATION & CERTIFICATIONS LEARN TO CODE UNDERSTAND THE FIELD FIND KEY PEOPLE TO LEARN FROM BUILD YOUR SETUP
  • 8. WORDS TO PONDER “Nothing is as empowering as real-world validation, even if it's for failure.” STEVEN PRESSFIELD
  • 9. Decide to build and follow your process LEARN FROM MENTORS & PEERS DEVELOP A FEEDBACK LOOP LEARN HOW TO UNPACK IT & USE IT APPLY YOUR KNOWLEDGE & SKILLS BUILD A PRESENCE IN THE FIELD
  • 10. There are some awesome communities out there: BUILD A WEBSITE JOIN PEERLYST.COM USE TWITTER
  • 11. 2. DECIDE TO PLAY AN INFINITE GAME HERE'S WHAT I MEAN BY THAT
  • 12. WORDS TO PONDER “A finite game is played for the purpose of winning, an infinite game for the purpose of continuing the play.” JAMES P. CARSE
  • 13. Decide to play an infinite game PREPARE TO DEAL WITH SURPRISES DEVELOP AN APPETITE FOR CHANGE TAP INTO UNLIMITED GROWTH STAY ENGAGED AND CHALLENGED CULTIVATE A GROWTH MINDSET
  • 14. WORDS TO PONDER “Individuals who believe their talents can be developed (through hard work, good strategies, and input from others) have a growth mindset.” CAROL DWECK
  • 15. So much to learn, so litte time! SUBSCRIBE TO NEWSLETTERS DefCamp Daniel Miessler The CyberWire Troy Hunt LISTEN TO PODCASTS Darknet Diaries Hacking Humans Smashing Security FOLLOW JOURNALISTS & RESEARCHERS Lesley Carhart Zack Whittaker Eva Galperin Kevin Beaumont
  • 16. 3. DECIDE TO MAKE A CONTRIBUTION I HAVE SOME SUGGESTIONS
  • 17. Decide to make a contribution INTERN IN COMPANIES VOLUNTEER AT EVENTS GO TO MEETUPS & CONFERENCES SUBMIT YOUR PAPER ANSWER QUESTIONS
  • 18. Where you can contribute and learn FORUMS BleepingComputer MalwareTips Wilders Security COMMUNITIES Peerlyst Reddit Telegram groups SOCIAL MEDIA Twitter Quora LinkedIn
  • 19. 4. DECIDE TO GO PRO THIS IS MY FAVORITE PART
  • 20. WORDS TO PONDER “The professional does not wait for inspiration; he acts in anticipation of it." STEVEN PRESSFIELD
  • 21. Decide to go pro BE DEPENDABLE GET FOCUS AND CLARITY UNDERSTAND THE BUSINESS SHOW UP AND DO YOUR BEST ARTICULATE YOUR IDEAS & OPINIONS
  • 22. WORDS TO PONDER “The counterfeit innovator is wildly self-confident. The real one is scared to death.” STEVEN PRESSFIELD
  • 23. Decide to go pro CULTIVATE LONG-LASTING CURIOSITY DECIDE WHAT ENOUGH MEANS TO YOU DEFINE YOUR GUIDING PRINCIPLES BUILD STRATEGIC VISION & FORESIGHT KNOW YOU'RE ALWAYS BECOMING
  • 24. WORDS TO PONDER “What we get when we turn pro is, we find our power. We find our will and our voice and we find our self- respect. We become who we always were but had, until then, been afraid to embrace and to live out.” STEVEN PRESSFIELD
  • 25. 5. DECIDE TO WORK ON SOMETHING MEANINGFUL & REWARDING IT'S UP TO YOU
  • 26. Decide to work on something meaningful & rewarding BOOST YOUR SELF-AWARENESS SEE THE BIGGER PICTURE SOLVE INTRICATE PUZZLES WORK WITH ADVANCED TEAMS & TECH DERIVE VALUE & PERSONAL REWARDS
  • 27. CHECK OUT THESE RESOURCES There are some great tidbits in here: How to Build a Successful Career in Information Security / Cybersecurity -https://danielmiessler.com/blog/build-successful- infosec-career/ What Having a “Growth Mindset” Actually Means - https://hbr.org/2016/01/what-having-a-growth-mindset-actually- means What it’s like to work in cybersecurity (part I) - https://def.camp/work-in-cybersecurity/ 100 Questions for Better Decisions - https://andrazaharia.com/100- questions-for-better-decisions/ Tips on how to live with imposter syndrome - https://andrazaharia.com/imposter-syndrome/
  • 28. InfoSec Career Hacking: Sell Your Skillz, Not Your Soul Thanks for the Feedback Finite and Infinite Games Ego Is the Enemy Turning Pro Aaron W. Bayles Chris Hurley Douglas Stone  Sheila Heen James P. Carse Ryan Holiday Steven Pressfield
  • 29. AndraZaharia.com AndraZaharia.com/newsletter AndraZaharia.com/the-podcast You get the point. @andrazaharia on Twitter & Medium Find this presentation on: slideshare.net/AndraZaharia Thanks! Bye! See you soon!