SlideShare a Scribd company logo
1 of 46
Hackers Are People Too
http://bit.ly/SvWVb0
Part I: Intro
Amanda Berlin
@InfoSystir
Stuff I do
My idea, inspiration, and why I’m
here
Evil hackers at Derbycon
Around the world in 80 cons
Jayson Street at BsidesCMH
(Columbus, Ohio) 2014
drwhom and support from
friends/community
Part II: The Prep
Getting it started
Article written
Article made pretty
• http://imgur.com/gallery/n81cq
Freak Out
Get the article out there
It was harder than I thought
Talk to people
• Talk to friends not in IT
• ….wait, not sure I have any
FEEDBACK!
Positive Feedback
“Amanda, our community is honored to have you in it.
Being part of the InfoSec community means sharing and
improving each other and those we care about, work with,
and work for.” @WolfFlight
“Interesting perspective..keep blogging!”
“insert more positive feedback here”
Negative Feedback
“This post was put together by a script kiddie.”
“As a former hacker, I read the first image, thought it was
retarded, didn't look at anything else, and downvoted.”
Questions & Stuff
“…Question: how does the average computer user know
which security software to use so they Don’t get hacked?”
“What are the different kinds of hats?”
“How do I know if software comes with spyware?”
“I thought all hackers were bad…”
“You mean people get paid to do that?!?!”
The Hacker
 All the hats
The White Hat
• “A white hat hacker breaks security for
non-malicious reasons”
• CEH, CISSP, OSCP, OSCE, CPTE, etc
• Blue, Red, Purple
The Black Hat
• A "black hat" hacker is a hacker who
"violates computer security for little reason
beyond maliciousness or for personal
gain“
• A.K.A
The Grey Hat
• “A grey hat hacker may surf the internet
and hack into a computer system for the
sole purpose of notifying the administrator
that their system has a security defect”
Part III: What’s Out There
The Good
• DerbyCon 2011 raised over $13,000 for
the Hackers for Charity foundation, over
double that of other conferences. In both
2012 and 2013 they raised over $30,000!!
• BloodKode at Defcon continues to grow
and take blood donations.
• EFF
The Good cont.
• Anonymous catches pedophiles/cartels
• Takes down terrorist and hate group sites
The Good cont.
• Mubix runs #ProjectMentor for free infosec
hands on learning
• http://www.projectmentor.net/
The Good cont.
• Someone is sending me to training
• THANK YOU
• THANK YOU
• THANK YOU
• Support/guidance from the community
The Good cont.
Thought Leaders
The Good cont.
Substance Abuse Help
http://www.room362.com/blog/2014/05/26/go-home-
infosec-youre-drunk/
“ShmooCon runs an AA meeting at the con”
http://nathanheafner.com/home/2014/05/29/infosec-i-
didnt-fly-accross-the-sea-to-see-you-mumble-and-
stumble-on-stage/
http://theocddiaries.com/well-being/drinking-at-security-
cons/
The Good cont.
The Bad
The Ugly
Part IV: What you can do
A.K.A. The 10 step program
Step 1: Proactive Media
Organizing a con?
“A conference is just an admission that you
want somebody to join you in your troubles.”
- Will Rogers
Step 2: Don’t Be a Dbag
At a con or online
.
.
.
.
‘nuff said
Step 3: The big time
Local papers & TV
National news. Just mention it!
Step 4: Teh Webz
Social Media - Twitter, FB, imgur, reddit,
youtube, etc...
Step 5: Preach the word!
• Start talking about
– What we do
– What we protect
– Cool stuff in the community
Step 6: Get them involved
Start differentiating white/black hats
Secure their own data
Get other organizations to look into
security (http://solidmonster.com/)
Step 7: Distribute the information
• Canned responses
• Password guides
• Common sense security
Step 7: Do it for the children!!!
• @Hak4kidz
Step 8: Show your passion
• Break out of your shell, hard to do but
worth it
• Eve Adams (@HackerHuntress): Attack
Paths: Breaking Into Infosec From IT Or
Other Totally Different Fields
• Cue awkwardness (@rattis & @secureholio)
Step 9: Surprise!!
Random acts of infosec
Step 10: Man up
Don’t be an ass to normal users
“Your customer doesn’t care how much you
know until they know how much you care. ~
Damon Richards”
Sum it up
1. Include local media
2. No douchbags allowed
3. Mention it everywhere
4. Teh Webz
5. Social Media
6. Involve & Teach users
7. Canned responses
8. Talk to people irl
9. Pay it forward
10. Be nice to your users/customers
Part V: Closing
YAY!
• If you enjoyed my first talk buy me a drink
(after talks of course)
BOO!
• If you didn’t you still can buy me a drink
Contact info
• @infosystir
• Infosystir.blogspot.com
Questions?
• Click to add text

More Related Content

What's hot

Social Media for Baby Boomers
Social Media for Baby BoomersSocial Media for Baby Boomers
Social Media for Baby BoomersSue Barrett
 
11ntcfailinform resources
11ntcfailinform resources11ntcfailinform resources
11ntcfailinform resourcesSimone Parrish
 
Managing information Overload
Managing information OverloadManaging information Overload
Managing information Overloadbdyck
 
Facebook
FacebookFacebook
FacebookSD Paul
 
[R]evolution: Elementary Workshop
[R]evolution: Elementary Workshop[R]evolution: Elementary Workshop
[R]evolution: Elementary WorkshopNathanielCarlson2
 
Slideshare online identity construction
Slideshare   online identity constructionSlideshare   online identity construction
Slideshare online identity constructionApinya Anphanlam
 
New Media Institute Presentation
New Media Institute PresentationNew Media Institute Presentation
New Media Institute PresentationInteractive Agency
 
Digital identity16may13shorter
Digital identity16may13shorterDigital identity16may13shorter
Digital identity16may13shorterShawna Reibling
 
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Paul Brown
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012Pat Sine
 
UX Week Presentation from Steve Portigal - Cross-Cultural Research
UX Week Presentation from Steve Portigal - Cross-Cultural ResearchUX Week Presentation from Steve Portigal - Cross-Cultural Research
UX Week Presentation from Steve Portigal - Cross-Cultural ResearchSteve Portigal
 
Social Media Overview-Bellagio Center Oct. 2011_v_final
Social Media Overview-Bellagio Center Oct. 2011_v_finalSocial Media Overview-Bellagio Center Oct. 2011_v_final
Social Media Overview-Bellagio Center Oct. 2011_v_finalChristopher Bishop
 
Cyber awareness highschoolers
Cyber awareness highschoolersCyber awareness highschoolers
Cyber awareness highschoolersAliza Racelis
 
Digital Footprints and Students Presentation
Digital Footprints and Students PresentationDigital Footprints and Students Presentation
Digital Footprints and Students PresentationKurtis Hewson
 
Social Media: Do You? (BU Business Mania Event)
Social Media: Do You? (BU Business Mania Event)Social Media: Do You? (BU Business Mania Event)
Social Media: Do You? (BU Business Mania Event)David Hopkins
 
Software networks
Software networksSoftware networks
Software networksSARACURL16
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters? Parakum Pathirana
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for scepticsHelen Webster
 

What's hot (20)

Social Media for Baby Boomers
Social Media for Baby BoomersSocial Media for Baby Boomers
Social Media for Baby Boomers
 
11ntcfailinform resources
11ntcfailinform resources11ntcfailinform resources
11ntcfailinform resources
 
Managing information Overload
Managing information OverloadManaging information Overload
Managing information Overload
 
Facebook
FacebookFacebook
Facebook
 
Facebook
FacebookFacebook
Facebook
 
[R]evolution: Elementary Workshop
[R]evolution: Elementary Workshop[R]evolution: Elementary Workshop
[R]evolution: Elementary Workshop
 
Slideshare online identity construction
Slideshare   online identity constructionSlideshare   online identity construction
Slideshare online identity construction
 
New Media Institute Presentation
New Media Institute PresentationNew Media Institute Presentation
New Media Institute Presentation
 
Digital identity16may13shorter
Digital identity16may13shorterDigital identity16may13shorter
Digital identity16may13shorter
 
Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.Social Justice. Social Good. Social Media. Social Change.
Social Justice. Social Good. Social Media. Social Change.
 
Public by Default: Life Online in 2012
Public by Default:  Life Online in 2012Public by Default:  Life Online in 2012
Public by Default: Life Online in 2012
 
UX Week Presentation from Steve Portigal - Cross-Cultural Research
UX Week Presentation from Steve Portigal - Cross-Cultural ResearchUX Week Presentation from Steve Portigal - Cross-Cultural Research
UX Week Presentation from Steve Portigal - Cross-Cultural Research
 
Social Media Overview-Bellagio Center Oct. 2011_v_final
Social Media Overview-Bellagio Center Oct. 2011_v_finalSocial Media Overview-Bellagio Center Oct. 2011_v_final
Social Media Overview-Bellagio Center Oct. 2011_v_final
 
Cyber awareness highschoolers
Cyber awareness highschoolersCyber awareness highschoolers
Cyber awareness highschoolers
 
Digital Footprints and Students Presentation
Digital Footprints and Students PresentationDigital Footprints and Students Presentation
Digital Footprints and Students Presentation
 
Digital footprint
Digital footprintDigital footprint
Digital footprint
 
Social Media: Do You? (BU Business Mania Event)
Social Media: Do You? (BU Business Mania Event)Social Media: Do You? (BU Business Mania Event)
Social Media: Do You? (BU Business Mania Event)
 
Software networks
Software networksSoftware networks
Software networks
 
Why your digital reputation matters?
Why your digital reputation matters? Why your digital reputation matters?
Why your digital reputation matters?
 
Social media for sceptics
Social media for scepticsSocial media for sceptics
Social media for sceptics
 

Similar to Hackers are people too

Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsICT Watch - Indonesia
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...Steve Poole
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerSteve Poole
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Pat Sine
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and ConcernsPINT Inc
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Marta Barrio Marcos
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaTyler Shields
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop SlidesNathanielCarlson2
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awarenessKaran Veer Singh
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Justin Denton
 
Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018Eric Reiss
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdfRobin540999
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the webjhollatz
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High SchoolLiftPotential
 

Similar to Hackers are people too (20)

Citizen (Online / Social) Media Ethics
Citizen (Online / Social) Media EthicsCitizen (Online / Social) Media Ethics
Citizen (Online / Social) Media Ethics
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
Jax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developerJax london2016 cybercrime-and-the-developer
Jax london2016 cybercrime-and-the-developer
 
Surviving and Thriving Online 2011
Surviving and Thriving Online 2011Surviving and Thriving Online 2011
Surviving and Thriving Online 2011
 
Corp Web Risks and Concerns
Corp Web Risks and ConcernsCorp Web Risks and Concerns
Corp Web Risks and Concerns
 
Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)Conference about Social Engineering (by Wh0s)
Conference about Social Engineering (by Wh0s)
 
DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Social Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social MediaSocial Media Basics: Security Loopholes with Twitter & Other Social Media
Social Media Basics: Security Loopholes with Twitter & Other Social Media
 
[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides[r]evolution Digital Literacy Workshop Slides
[r]evolution Digital Literacy Workshop Slides
 
Social groups for awareness
Social groups for awarenessSocial groups for awareness
Social groups for awareness
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...Creating a digital toolkit for users: How to teach our users how to limit the...
Creating a digital toolkit for users: How to teach our users how to limit the...
 
Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018Ethics and UX IxDA Berlin 2018
Ethics and UX IxDA Berlin 2018
 
fissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdffissea-conference-2012_srinivasan.pdf
fissea-conference-2012_srinivasan.pdf
 
Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Building a safer presence on the web
Building a safer presence on the webBuilding a safer presence on the web
Building a safer presence on the web
 
Social Media Safety For High School
Social Media Safety For High SchoolSocial Media Safety For High School
Social Media Safety For High School
 

More from Amanda Berlin

Mental Health in Infosec: Hackers, Hugs, & Drugs
Mental Health in Infosec: Hackers, Hugs, & DrugsMental Health in Infosec: Hackers, Hugs, & Drugs
Mental Health in Infosec: Hackers, Hugs, & DrugsAmanda Berlin
 
InheritedASecurityDept
InheritedASecurityDeptInheritedASecurityDept
InheritedASecurityDeptAmanda Berlin
 
Where to Start When Your Environment is Fucked
Where to Start When Your Environment is FuckedWhere to Start When Your Environment is Fucked
Where to Start When Your Environment is FuckedAmanda Berlin
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedAmanda Berlin
 
Defcon 23 Comedy inception
Defcon 23 Comedy inceptionDefcon 23 Comedy inception
Defcon 23 Comedy inceptionAmanda Berlin
 
Shooting phish in a barrel
Shooting phish in a barrelShooting phish in a barrel
Shooting phish in a barrelAmanda Berlin
 

More from Amanda Berlin (6)

Mental Health in Infosec: Hackers, Hugs, & Drugs
Mental Health in Infosec: Hackers, Hugs, & DrugsMental Health in Infosec: Hackers, Hugs, & Drugs
Mental Health in Infosec: Hackers, Hugs, & Drugs
 
InheritedASecurityDept
InheritedASecurityDeptInheritedASecurityDept
InheritedASecurityDept
 
Where to Start When Your Environment is Fucked
Where to Start When Your Environment is FuckedWhere to Start When Your Environment is Fucked
Where to Start When Your Environment is Fucked
 
Where To Start When Your Environment is Fucked
Where To Start When Your Environment is FuckedWhere To Start When Your Environment is Fucked
Where To Start When Your Environment is Fucked
 
Defcon 23 Comedy inception
Defcon 23 Comedy inceptionDefcon 23 Comedy inception
Defcon 23 Comedy inception
 
Shooting phish in a barrel
Shooting phish in a barrelShooting phish in a barrel
Shooting phish in a barrel
 

Recently uploaded

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Hackers are people too

  • 1. Hackers Are People Too http://bit.ly/SvWVb0
  • 2. Part I: Intro Amanda Berlin @InfoSystir
  • 4. My idea, inspiration, and why I’m here Evil hackers at Derbycon Around the world in 80 cons Jayson Street at BsidesCMH (Columbus, Ohio) 2014 drwhom and support from friends/community
  • 8. Article made pretty • http://imgur.com/gallery/n81cq
  • 10. Get the article out there It was harder than I thought
  • 11. Talk to people • Talk to friends not in IT • ….wait, not sure I have any FEEDBACK!
  • 12. Positive Feedback “Amanda, our community is honored to have you in it. Being part of the InfoSec community means sharing and improving each other and those we care about, work with, and work for.” @WolfFlight “Interesting perspective..keep blogging!” “insert more positive feedback here”
  • 13. Negative Feedback “This post was put together by a script kiddie.” “As a former hacker, I read the first image, thought it was retarded, didn't look at anything else, and downvoted.”
  • 14. Questions & Stuff “…Question: how does the average computer user know which security software to use so they Don’t get hacked?” “What are the different kinds of hats?” “How do I know if software comes with spyware?” “I thought all hackers were bad…” “You mean people get paid to do that?!?!”
  • 15. The Hacker  All the hats
  • 16. The White Hat • “A white hat hacker breaks security for non-malicious reasons” • CEH, CISSP, OSCP, OSCE, CPTE, etc • Blue, Red, Purple
  • 17. The Black Hat • A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain“ • A.K.A
  • 18. The Grey Hat • “A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect”
  • 19. Part III: What’s Out There
  • 20. The Good • DerbyCon 2011 raised over $13,000 for the Hackers for Charity foundation, over double that of other conferences. In both 2012 and 2013 they raised over $30,000!! • BloodKode at Defcon continues to grow and take blood donations. • EFF
  • 21. The Good cont. • Anonymous catches pedophiles/cartels • Takes down terrorist and hate group sites
  • 22. The Good cont. • Mubix runs #ProjectMentor for free infosec hands on learning • http://www.projectmentor.net/
  • 23. The Good cont. • Someone is sending me to training • THANK YOU • THANK YOU • THANK YOU • Support/guidance from the community
  • 25. The Good cont. Substance Abuse Help http://www.room362.com/blog/2014/05/26/go-home- infosec-youre-drunk/ “ShmooCon runs an AA meeting at the con” http://nathanheafner.com/home/2014/05/29/infosec-i- didnt-fly-accross-the-sea-to-see-you-mumble-and- stumble-on-stage/ http://theocddiaries.com/well-being/drinking-at-security- cons/
  • 29. Part IV: What you can do A.K.A. The 10 step program
  • 30. Step 1: Proactive Media Organizing a con? “A conference is just an admission that you want somebody to join you in your troubles.” - Will Rogers
  • 31. Step 2: Don’t Be a Dbag At a con or online . . . . ‘nuff said
  • 32. Step 3: The big time Local papers & TV National news. Just mention it!
  • 33. Step 4: Teh Webz Social Media - Twitter, FB, imgur, reddit, youtube, etc...
  • 34. Step 5: Preach the word! • Start talking about – What we do – What we protect – Cool stuff in the community
  • 35. Step 6: Get them involved Start differentiating white/black hats Secure their own data Get other organizations to look into security (http://solidmonster.com/)
  • 36. Step 7: Distribute the information • Canned responses • Password guides • Common sense security
  • 37. Step 7: Do it for the children!!! • @Hak4kidz
  • 38. Step 8: Show your passion • Break out of your shell, hard to do but worth it • Eve Adams (@HackerHuntress): Attack Paths: Breaking Into Infosec From IT Or Other Totally Different Fields • Cue awkwardness (@rattis & @secureholio)
  • 39. Step 9: Surprise!! Random acts of infosec
  • 40. Step 10: Man up Don’t be an ass to normal users “Your customer doesn’t care how much you know until they know how much you care. ~ Damon Richards”
  • 41. Sum it up 1. Include local media 2. No douchbags allowed 3. Mention it everywhere 4. Teh Webz 5. Social Media 6. Involve & Teach users 7. Canned responses 8. Talk to people irl 9. Pay it forward 10. Be nice to your users/customers
  • 43. YAY! • If you enjoyed my first talk buy me a drink (after talks of course)
  • 44. BOO! • If you didn’t you still can buy me a drink
  • 45. Contact info • @infosystir • Infosystir.blogspot.com