This document provides an overview of Saumil Shah's career in cybersecurity spanning over 21 years. It discusses the evolution of technology and cybersecurity threats from the year 2000 to the present. Key points covered include the shift from hardware-based attacks to more modern software and network-based attacks that follow money and target things like financial information, social networks, and critical infrastructure. The document argues for a shift towards more user-centric and risk-based approaches to security that empower users and build systems with security and trustworthiness as core features.