SlideShare une entreprise Scribd logo
1  sur  44
Why does InfoSec play bass?
And other insights into hacker/Infosec culture
Why are we here?
Puzzles, prizes, ermahgerd!
Me
Nick
The InfoSec music scene unfolds…
@joswr1ght
@jsokoly
@ax0n
@secbarbie
@selenakyle
@mongold
@__sporkbomb
@gattica
@mattjay
@JZdziarski
@chrissistrunk
@3XPlo1T2
@DanBratt99
@SeanVerity
@phoobar
@secboffin
@maradydd
@adelmatrash
@hackerhuntress
@J0hnnyXm4s
@p0wnlabs
@daveshackleford
@p0wnlabs
@chrissistrunk
@billbrenner
@caseyjohnellis
@p0wnlabs
Why do I play bass?
Why do I play bass?
Why does InfoSec play bass?
"Good Taste.”
-- Joseph Sokoly
Why does InfoSec play bass?
"We like the low, dark
and sinister. And
backbones.”
”We're not in it for glory
or props. Content in the
background.”
-- Eve Adams
Why does InfoSec play bass?
"Easy, we pull it
together. We keep
the drums on
tempo and support
the band :)”
-- Dave Lewis
Doubts – do we really play bass?
How could I be sure?
Time for some Data
Casual observations versus
the big picture
Security Community/Worker Size Estimates
Social Media
Conferences
Workforce
How small is our bubble?
FollowerWonk Results
• Security + researcher = 5334
• Pentester = 1488
• Cybersecurity = 2996
• Hacker = 43571
• Ethical + hacker = 1581
• CISSP – 1605
• Infosec + bass –drum = 11
• Infosec + guitar = 27
Hmm…
How accurate are my stats?
What
Statistics?
Dead on
balls
accurate
Accuracy Scale
So what? Why does any of this matter?
https://fsmontenegro.wordpress.com/2015/07/29/on-the-shortage-of-infosec-professionals/
@fsmontenegro  Follow this guy on Twitter
3561 just in the USAF (cyber command)
2170 just in US Army
1560 Booz Allen Hamilton
1407 Deloitte
1257 US Navy
Jobs? What jobs???
68
56
191
Would you like to take a survey?
Attackers 45%
Defenders 35%
IR/Forensics 25%
Male 90%
Female 10%
1 – Robot
Active on Social Media?
Nope – 13%
No, not allowed – 5%
Option 5 – 10%
Yes – 79%
Yes, but under an alias– 17%
I throw Information Security events
0%
I work full-time in the information
security industry
69%
I work overtime/double time/too much
time in Infosec. I need a vacation.
10%
I work part-time in the information
security industry
3%
I'm a hacker, security researcher, or do
something else in security, but it isn't
my day job
15%
Security student
1%
SysAdmin
1%
working toward
1%
How are you connected to InfoSec?
Who we are – trolls, pranksters, wiseasses
144 survey respondents, 2448 responses in total
I wasn’t able to count the vast number of wiseass responses.
• Getting kicked in the face by Jimmy Vo.
• I beat up CISOs in dark alleys for fun
• Option 5 typo was a favorite (x14)
• What do you do in the industry? Space Hitler < Thanks!
So, this bit about the
bass…
WELCOME TO OUR NEW MASCOT
InfoSec actually plays…
Survey results – Music
33% of respondents played an instrument
40% of those were multi-instrumentalists
Guitar 28
Bass 8
Violin 5
Drums 4
Saxophone 4
TOP 5
Survey Results – Martial Arts
• Aikido
• Boxing
• BJJ
• Karate
• Kickboxing
• Krav Maga
• MMA
• Tai Chi
• Tang Soo Do
• Goju
• Tae Kwon Do
• Muay Thai
• Shaolin Kempo
19% of respondents practice martial arts
Friends and strangers alike sent me photos of
them doing their hobbies.
Not a single photo scarred me for life or led me to
need therapy!
Mycology
Who are we?
We’re a
post-dystopian,
neo-cyberpunk
travelling ren
faire!
Conclusions – we see the world differently
They see
• A car
• A door, a lock, a barrier
• Retail environment
• Trash bin
• Gobbletygook
We see
• Potential 80mph brick of death
• A challenge, a puzzle
• Hilariously insecure playground
• Intelligence
• Something to be decoded,
cracked, decrypted…
Both a gift and a curse…
Conclusions
Security is a calling for many of us. It isn’t
a career… it is who we are.
Conclusions
“It was an accident…”
“Can’t remember when it started…”
“I had to decide between jail or an honest paycheck.”
“It's fun to break rules.”
“I like thinking I’m helping”
What’s Next?
What do you want to see? Do you have anything else you’d like to
share?
What direction should I take this?
Avery.Sawaba@gmail.com
@sawaba

Contenu connexe

Similaire à Why does InfoSec play bass?

Howdidonesurvive
HowdidonesurviveHowdidonesurvive
Howdidonesurvive
Hetti Nel
 
How did one survive?
How did one survive?How did one survive?
How did one survive?
Mariano Blaya
 
Zombie Presentation
Zombie PresentationZombie Presentation
Zombie Presentation
glovegrove
 

Similaire à Why does InfoSec play bass? (20)

Why Video Games are Good for You - 12-3-09
Why Video Games are Good for You - 12-3-09Why Video Games are Good for You - 12-3-09
Why Video Games are Good for You - 12-3-09
 
Women in Games Boston March 2018 Talk: Fostering Dialogue between Game Studie...
Women in Games Boston March 2018 Talk: Fostering Dialogue between Game Studie...Women in Games Boston March 2018 Talk: Fostering Dialogue between Game Studie...
Women in Games Boston March 2018 Talk: Fostering Dialogue between Game Studie...
 
Audio pro forma
Audio pro formaAudio pro forma
Audio pro forma
 
Howdidonesurvive
HowdidonesurviveHowdidonesurvive
Howdidonesurvive
 
How did one survive?
How did one survive?How did one survive?
How did one survive?
 
Audience research
Audience researchAudience research
Audience research
 
Zombie Presentation
Zombie PresentationZombie Presentation
Zombie Presentation
 
Audio pro forma
Audio pro formaAudio pro forma
Audio pro forma
 
Playing catch-up: games and play in the wider culture and in the library
Playing catch-up: games and play in the wider culture and in the libraryPlaying catch-up: games and play in the wider culture and in the library
Playing catch-up: games and play in the wider culture and in the library
 
Animation 14: Computer Science and Music
Animation 14: Computer Science and MusicAnimation 14: Computer Science and Music
Animation 14: Computer Science and Music
 
Buzztime trivia
Buzztime triviaBuzztime trivia
Buzztime trivia
 
Monopolize pitch
Monopolize pitchMonopolize pitch
Monopolize pitch
 
Monopolise pitch new
Monopolise pitch newMonopolise pitch new
Monopolise pitch new
 
Nerds bullying
Nerds bullyingNerds bullying
Nerds bullying
 
Classical:NEXT - Crowdfunding, with Steven Walter and Robert Douglass
Classical:NEXT - Crowdfunding, with Steven Walter and Robert DouglassClassical:NEXT - Crowdfunding, with Steven Walter and Robert Douglass
Classical:NEXT - Crowdfunding, with Steven Walter and Robert Douglass
 
Life-Play E-Handbook
Life-Play E-HandbookLife-Play E-Handbook
Life-Play E-Handbook
 
Syzygy 2019 : MELAS Quiz at IMNU
Syzygy 2019 : MELAS Quiz at IMNUSyzygy 2019 : MELAS Quiz at IMNU
Syzygy 2019 : MELAS Quiz at IMNU
 
Be Successful! Get Involved!
Be Successful! Get Involved!Be Successful! Get Involved!
Be Successful! Get Involved!
 
Wind, Not Sand: Mapping Dynamic Emotion Across a Product Landscape
Wind, Not Sand: Mapping Dynamic Emotion Across a Product LandscapeWind, Not Sand: Mapping Dynamic Emotion Across a Product Landscape
Wind, Not Sand: Mapping Dynamic Emotion Across a Product Landscape
 
research (interactive)
research (interactive)research (interactive)
research (interactive)
 

Plus de Adrian Sanabria

Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix EnigmaLies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
Adrian Sanabria
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Adrian Sanabria
 

Plus de Adrian Sanabria (20)

Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
Early Tech Adoption: Foolish or Pragmatic? - 17th ISACA South Florida WOW Con...
 
Avoiding Bad Stats and the Benefits of Playing Trivia with Friends: PancakesC...
Avoiding Bad Stats and the Benefits of Playing Trivia with Friends: PancakesC...Avoiding Bad Stats and the Benefits of Playing Trivia with Friends: PancakesC...
Avoiding Bad Stats and the Benefits of Playing Trivia with Friends: PancakesC...
 
Lies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix EnigmaLies and Myths in InfoSec - 2023 Usenix Enigma
Lies and Myths in InfoSec - 2023 Usenix Enigma
 
Indistinguishable from Magic: How the Cybersecurity Market Reached a Trillion...
Indistinguishable from Magic: How the Cybersecurity Market Reached a Trillion...Indistinguishable from Magic: How the Cybersecurity Market Reached a Trillion...
Indistinguishable from Magic: How the Cybersecurity Market Reached a Trillion...
 
2019 InfoSec Buyer's Guide
2019 InfoSec Buyer's Guide2019 InfoSec Buyer's Guide
2019 InfoSec Buyer's Guide
 
Equifax Breach Postmortem
Equifax Breach PostmortemEquifax Breach Postmortem
Equifax Breach Postmortem
 
The New Security Practitioner
The New Security PractitionerThe New Security Practitioner
The New Security Practitioner
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
The Products We Deserve
The Products We DeserveThe Products We Deserve
The Products We Deserve
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
From due diligence to IoT disaster
From due diligence to IoT disasterFrom due diligence to IoT disaster
From due diligence to IoT disaster
 
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
Stranded on Infosec Island: Defending the Enterprise with Nothing but Windows...
 
Open Source Defense for Edge 2017
Open Source Defense for Edge 2017Open Source Defense for Edge 2017
Open Source Defense for Edge 2017
 
451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?451 AppSense Webinar - Why blame the user?
451 AppSense Webinar - Why blame the user?
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
 
451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security451 and Cylance - The Roadmap To Better Endpoint Security
451 and Cylance - The Roadmap To Better Endpoint Security
 
Security and DevOps Overview
Security and DevOps OverviewSecurity and DevOps Overview
Security and DevOps Overview
 
2016 virus bulletin
2016 virus bulletin2016 virus bulletin
2016 virus bulletin
 
RSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to StartupsRSAC 2016: CISO's guide to Startups
RSAC 2016: CISO's guide to Startups
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Why does InfoSec play bass?

  • 1. Why does InfoSec play bass? And other insights into hacker/Infosec culture
  • 2. Why are we here?
  • 3.
  • 6. The InfoSec music scene unfolds… @joswr1ght @jsokoly @ax0n @secbarbie @selenakyle @mongold @__sporkbomb @gattica @mattjay @JZdziarski @chrissistrunk @3XPlo1T2 @DanBratt99 @SeanVerity @phoobar @secboffin @maradydd @adelmatrash @hackerhuntress @J0hnnyXm4s @p0wnlabs @daveshackleford @p0wnlabs @chrissistrunk @billbrenner @caseyjohnellis @p0wnlabs
  • 7. Why do I play bass?
  • 8. Why do I play bass?
  • 9. Why does InfoSec play bass? "Good Taste.” -- Joseph Sokoly
  • 10. Why does InfoSec play bass? "We like the low, dark and sinister. And backbones.” ”We're not in it for glory or props. Content in the background.” -- Eve Adams
  • 11. Why does InfoSec play bass? "Easy, we pull it together. We keep the drums on tempo and support the band :)” -- Dave Lewis
  • 12. Doubts – do we really play bass? How could I be sure?
  • 15. Security Community/Worker Size Estimates Social Media Conferences Workforce How small is our bubble?
  • 16. FollowerWonk Results • Security + researcher = 5334 • Pentester = 1488 • Cybersecurity = 2996 • Hacker = 43571 • Ethical + hacker = 1581 • CISSP – 1605 • Infosec + bass –drum = 11 • Infosec + guitar = 27 Hmm…
  • 17. How accurate are my stats? What Statistics? Dead on balls accurate Accuracy Scale
  • 18. So what? Why does any of this matter? https://fsmontenegro.wordpress.com/2015/07/29/on-the-shortage-of-infosec-professionals/ @fsmontenegro  Follow this guy on Twitter 3561 just in the USAF (cyber command) 2170 just in US Army 1560 Booz Allen Hamilton 1407 Deloitte 1257 US Navy
  • 20. Would you like to take a survey? Attackers 45% Defenders 35% IR/Forensics 25% Male 90% Female 10% 1 – Robot Active on Social Media? Nope – 13% No, not allowed – 5% Option 5 – 10% Yes – 79% Yes, but under an alias– 17%
  • 21. I throw Information Security events 0% I work full-time in the information security industry 69% I work overtime/double time/too much time in Infosec. I need a vacation. 10% I work part-time in the information security industry 3% I'm a hacker, security researcher, or do something else in security, but it isn't my day job 15% Security student 1% SysAdmin 1% working toward 1% How are you connected to InfoSec?
  • 22. Who we are – trolls, pranksters, wiseasses 144 survey respondents, 2448 responses in total I wasn’t able to count the vast number of wiseass responses. • Getting kicked in the face by Jimmy Vo. • I beat up CISOs in dark alleys for fun • Option 5 typo was a favorite (x14) • What do you do in the industry? Space Hitler < Thanks!
  • 23. So, this bit about the bass…
  • 24. WELCOME TO OUR NEW MASCOT
  • 26. Survey results – Music 33% of respondents played an instrument 40% of those were multi-instrumentalists Guitar 28 Bass 8 Violin 5 Drums 4 Saxophone 4 TOP 5
  • 27. Survey Results – Martial Arts • Aikido • Boxing • BJJ • Karate • Kickboxing • Krav Maga • MMA • Tai Chi • Tang Soo Do • Goju • Tae Kwon Do • Muay Thai • Shaolin Kempo 19% of respondents practice martial arts
  • 28. Friends and strangers alike sent me photos of them doing their hobbies. Not a single photo scarred me for life or led me to need therapy!
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 40. Who are we? We’re a post-dystopian, neo-cyberpunk travelling ren faire!
  • 41. Conclusions – we see the world differently They see • A car • A door, a lock, a barrier • Retail environment • Trash bin • Gobbletygook We see • Potential 80mph brick of death • A challenge, a puzzle • Hilariously insecure playground • Intelligence • Something to be decoded, cracked, decrypted… Both a gift and a curse…
  • 42. Conclusions Security is a calling for many of us. It isn’t a career… it is who we are.
  • 43. Conclusions “It was an accident…” “Can’t remember when it started…” “I had to decide between jail or an honest paycheck.” “It's fun to break rules.” “I like thinking I’m helping”
  • 44. What’s Next? What do you want to see? Do you have anything else you’d like to share? What direction should I take this? Avery.Sawaba@gmail.com @sawaba

Notes de l'éditeur

  1. Ask if there are any bass players in the audience. Ask them to raise their hands. Look pensive and thoughtful for a moment to let the tension build At this point, I either get to say “See, I told you so!” or “Either you guys are lying, or I’ve just discovered a massive, critical flaw in my talk!”
  2. Agenda Intro/Expectations (without giving too much of #3 or #4 away) My Story Casual observations vs. big picture and why this matters Who we are – Survey results Making sense of all this Wrap-up, questions and feedback
  3. A few directions I could have gone with this talk. I envisioned it as something I could give several times, evolving over time. I decided to go lighthearted and entertaining the first time out. At a crossroads with this talk. That’s pretty. There were a few directions I could have gone with this talk. I could have gone serious: ADHD, Burnout, Alcohol – real issues affecting our industry. But I decided to go lighthearted and entertaining for this one. Let me know if you’re interested in the more serious side. Also, I’d love to update this talk and go deeper over time – let me know at the end if that is something you’d be interested in.
  4. *** Pic of Oprah giving stuff away on one side, hacker stickers on the other Anyone that participated in the survey, feel free to pick up your favorite hacker sticker (over on a table somewhere in the room)! Pass out puzzles – two old school iron puzzles and one rubik’s cube < Have someone help with this stuff Prizes will include two SNES carts and a Bsides Knoxville badge for whomever solves the puzzles. Anyone in addition to those, I’ll give an IOU for a tshirt or sticker once I’ve got them made
  5. Let me tell you a story about a boy. AWWW, isn’t this sweet… Tell the Sassy Ann’s story of me and Nick Morgan Fast forward to 2009, when Shack talked me into getting on Twitter – yes, the Twitter fun gauge is directly responsible for all my tweets. Go over the 10:1 Guitar:Bass rule and how I started to notice it seemed to be reversed for musicians in InfoSec. This intrigued me.
  6. Comment that there are some seriously pissed off clarinet players out there. “Why wasn’t my instrument included in his stupid survey!?!” Well, hang on angry clarinet player, and give me a chance to redeem myself! Oh, right, and there’s Dave Shackleford. Sorry, Dave. Seriously though, if you ever have Dave around a piano, try to convince him to play something for you. You won’t regret it!
  7. Why was I attracted to bass? #1 - Its electric cousin was no different – my actual plan if our old townhouse was ever broken into was to use my Hamer Cruisebass as a weapon.
  8. Why was I attracted to bass? #2 - If the electric guitar is a katana, the bass is a 2-handed axe. In Resident Evil, I prefer the shotgun. In Diablo 2 and 3, it was the Barbarian for me – dual-wielding giant fucking axes.
  9. I started asking others about this odd pattern – why did they think so many of us played bass? Put an image for each of them, with the quote, each in a different slide – 3 in all
  10. I started asking others about this odd pattern – why did they think so many of us played bass?
  11. I started asking others about this odd pattern – why did they think so many of us played bass?
  12. Does InfoSec really play bass? How could I find out? Ask for answers, opinions – what do you think? Bullshit? Put multi-instrumentalist tweets here Go go data scientist mode! I decided on a two-pronged approach Interwebs analytics Surveys/interviews
  13. What about everyone else? What about the non-musicians? We’ve all heard people talk about the echo chamber – having discussions within the “security bubble” – we’re in it now! Do I need this slide?
  14. Sorry for the shitty quality here – especially to you Apple Retina users out there, this must be torture. Getting this slide together pushed my graphic design and powerpoint skills to the limit. How big is our collective social media reach? When we bitch about something on Twitter, how far does it go? How many ears does it reach in the grand scheme of things? Note, there are some various discrepancies with this data, but I spent a long time making sure it was as accurate as I could get it. Sorry to those of you that are like vampires with sunlight when CISSP is mentioned…
  15. Well… On a scale from Donald Trump (who feels no need to use statistics) to Mona Lisa Vito (who, is dead-on-balls accurate), my stats are somewhere around the accuracy of Conan O’ Brien’s Clueless Gamer review system
  16. Job Shortages in InfoSec – people are hiring, hiring, hiring! Hiring and talent acquisition is HARD in InfoSec. EXPERIENCE doesn’t tell you if someone is passionate about security or if they’ll fit in with a tightly knit assessment team or incident response group, for example. CERTS don’t tell you a helluva lot, except for ones with practicals RESUMES are full of hopes, dreams and carefully crafted lies Basically, the only good way to find the people you’re looking for is by asking people you trust – networking. That’s really the most important benefit of a security conference, in my opinion. If we understand why great InfoSec/Hacker talent is great, perhaps it could be easier to find/train/retain the talent! Also vice versa – maybe we can make it easier for you to find your dream job! Great post by Fernando Montenegro here (@fsmontenegro)
  17. Jobs! Jobs! Jobs! People want to hire you! They want to throw money at your face! It’s like Oprah in here! You get a job! You get a job! You get a job!
  18. So I decided to do a survey to get a better idea of what was going on here Gender – Exactly the same as my twitter split
  19. How are you connected to InfoSec?
  20. What do you do in the industry? Space Hitler Do you actively discuss security/hacking-related stuff on social media? Option 5 (x14)
  21. So, why does InfoSec play bass?
  22. Ha, I wish! Just kidding. Well, it turns out that sample sizes matter, and I didn’t have a huge sample size when I collected all that anecdotal data I showed at the beginning of this talk. So, I did a survey. 144 of you wonderful people filled it out. Still a small sample size, but I intentionally made an attempt to get people outside the Twittersphere. Want to know what instrument infosec actually plays?
  23. The big reveal – infosec plays…. GUITAR. Cue sad trombone. However, it ISN’T a 10 to 1 ratio – more like 3 to 1 Also, half the bass players that responded were like, “BASS, YEAH!”, whereas half the Guitar players that responded were ‘MEH’ about it So, does the big reveal happen here? Or earlier, so that I can point out my mistake was all from this bubble I was in? Also, am I really, really correct here, or am I still wrong? Or is the point that certain aspects of our personalities just aren’t indicators of a greater whole?
  24. Survey stats – there are two hobbies I felt needed their own dedicated questions in my survey, because of how often they seem to show up – the first of those two is music. 33% of respondents played an instrument – exactly a third. Read some quotes “No, but I have a perfect ear. (Which makes karaoke VERY painful)” I own a bass that I promised my parents I would learn to play 15 years ago.  SIR YOU ARE A DISGRACE 40% of these musicians are multi-instrumentalists
  25. Summary of hobbies, stats
  26. Now THAT’S the Cavalry! Beau and Claus demonstrating non-hackable vehicles.
  27. Nurburgring
  28. Guillaume
  29. Walt reviewing his novel
  30. It’s okay, he’s at a stoplight 
  31. I think we’re all familiar with this sight…
  32. And another familiar sight… Whiskey hackers anyone? Some of us drink, and some of us can’t touch the stuff, but that’s a whole different potential talk, right?
  33. Anyone know what this is?
  34. The overwhelming majority of respondents are clearly passionate about this field – very few simply regard it as “just a job” This is what ties it back to the bass – everyone that played the bass was like, FUCK YEAH, BASS! The vast majority of guitarists were, “meh, a little guitar…”
  35. We stumble upon it < SO MANY! We can’t recall not doing it We had to make a choice We enjoy it Sense of service
  36. Lots of anecdotal stuff, hit on some interesting points, but haven’t gone too deep What’s next? Would like this to be the first in a series of talks about what makes us tick If I dive deeper, where do I go? Dark or light? More job/career-relevant stuff, or more psychological side?