SlideShare a Scribd company logo
1 of 51
Download to read offline
Cyber Education: Your Options & Resources Mapped Out 
Kelly Shortridge 
October 18, 2014
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Agenda 
Your burning questions: 
What careers are there? 
How do I learn more about the field? 
How do I meet people / network? 
How do I stay current on industry trends? 
2
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Who am I? 
Kelly Shortridge 
Currently an Entrepreneur in Residence 
Formerly advised InfoSec companies on M&A and private capital raises 
Absolutely no technical background 
Built an InfoSec knowledge base & professional network from scratch 
3
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
At first… 
4
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
And then… 
5
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
But mostly… 
6
Toward a Career
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Very General Advice 
No one can ever predict what they’ll be doing 5 years from now, let alone the rest of their lives 
Learn the “basics” and cross-over skills… 
…but make sure to learn about things you find interesting, too 
8
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Careers in InfoSec 
9 
Not just about hacking the mainframe.
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Careers in InfoSec 
10 
Also about hardening applications
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Careers in InfoSec 
11 
Also about developing security strategies
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Careers in InfoSec 
12 
Also about monitoring systems
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Careers in InfoSec 
13 
Also about responding to incidents
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Careers in InfoSec 
14 
As well as attack-centric R&D
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
InfoSec Jobs 
A career in InfoSec offers many options: 
Application Security 
Compliance & Policy 
Data Forensics & Incident Response 
Network Security Engineer / Ops & Monitoring 
Penetration Testing 
Security Architecture 
Vulnerability Research & Reverse Engineering 
15
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
The “Basics” 
16 
Roles often overlap and blend together 
Cover different aspects of the lifecycle of security operations 
Some areas of study are broadly applicable 
Network & System Architecture 
Math 
Software Development
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
The Future! 
17
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Skill Sets – Example #1 
Network Security Engineer / Ops & Monitoring 
Understand network design & architecture 
Familiarity with security tech – IDS/IPS, SIEM, firewalls, vulnerability detection & remediation 
Develop custom tooling for security monitoring 
Some knowledge on machine learning is a plus 
18
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Skill Sets – Example #2 
Vulnerability Research & Reverse Engineering 
Analyze malicious code, shellcode, packed & obfuscated code 
Identify attacker methodology 
Strong math abilities, particularly graph theory 
Familiarity with IDA Pro and user & kernel- mode debuggers 
Languages: Assembly (x86 & x64), C/C++, Python 
19
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Skill Sets – Example #3 
Application Security 
Audit applications for vulnerabilities (XSS, SQLI, logic flaws, etc.) 
Understanding of application architecture 
Help development teams implement SDL 
Build tooling to improve testing & auditing 
Languages: Java, PHP, C / C++, Python, Ruby 
20
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Potential Employers 
Major hubs include DC, SF & NYC – each city has its own “flavor” driven by employer base 
Government 
Fortune 500 
Industry 
Defense Contractors & Gov’t Agencies 
Tech, Finance, Media, eCommerce, etc. 
Security Vendors & Consultancies 
21
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Guiding Your Education 
Find a few areas of interest / passion 
Determine what abilities are required 
22
Learning the Field
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Where to Start 
24 
When I first started exploring InfoSec, someone told me Phrack was a leading industry publication. 
So I read every issue… 
Including the first 40, which are just about phones.
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Where to Start, continued 
25 
Diving in head-first actually isn’t a bad strategy; there is some truth to learning by osmosis. 
Luckily, there are both formal and informal channels to help you live and breathe InfoSec.
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Formal Education 
Academia 
Certifications 
Helpful if no other means of vetting abilities 
26
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Certifications 
27 
Provides professional certifications in InfoSec 
Covers a wide breadth of security topics 
$250 - $600 per examination 
Variable years of experience required: 
<1 year 
1 year 
2 years 
4 years 
5 years 
Years of Experience
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Informal Education 
Take advantage of valuable informal channels: 
Visit conferences (or find talks posted online) 
CTF competitions 
Trainings (usually expensive) 
Social events (usually exclusive) 
Academic papers (contact authors) 
28
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Conferences 
Cons are often how people stay in touch 
Check out talks, or find them online 
Social events – great for networking 
Parties requiring challenges (Caesar’s Challenge at Blackhat/DEFCON) 
29
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
CTFs 
Test your skills & gain recognition 
Industry – DEFCON, Ghost in the Shellcode (Shmoocon), company-sponsored CTFs 
Private – Smash the Stack, Over the Wire, others hosted by hacker groups 
Collegiate – CSAW CTF, NECCDC 
Government – DARPA, semi-public or 100% private IC-focused CTFs 
30
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Trainings – Roles 
Practical education for professional security roles 
Multi-week courses 
Both on-demand & in-person 
Expensive (typically $4,500 - $5,000) 
Value depends widely on the teacher 
31
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Trainings – Skills 
Expensive ($2,000 - $4,000), but can substantially improve your skills & teach you new techniques 
32 
Private 
Conferences
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Academic Papers 
Helps you find emerging areas of research 
IEEE 
Microsoft – Security & Privacy Research 
Reddit.com/r/NetSec 
USENIX 
ACM Digital Library (search by keywords, e.g. malware) 
33
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Academics 
Don’t be shy about contacting authors! 
They’ll most likely be flattered. 
34
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
How to Break In 
InfoSec is more open now than ever on how to find people – they just aren’t always welcoming… 
35
Meeting People & Networking
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
37
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
The Social Network 
InfoSec is a trust-based industry. 
A strong social network is critical. 
38
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Tl;dr on Networking 
Get as many “at bats” as possible 
Meet many people across various areas of expertise, employers & career stages 
Not everyone will respond, so need to maximize your hit rate by reaching out to more people 
Expand your network by asking new contacts (politely) if they know anyone you should meet 
39
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Persistence & Haters 
Don’t let someone convince you that you won’t be successful, or don’t belong 
40 
People like passion and want to “back winners” 
Persistence is key (true of most things)
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Social Events 
NYC – NYSec & iSec Open Forum 
Look @ “CitySec Meetups” on Reddit NetSec 
Non-Industry Events 
NYC – Hack Nite @ NYU 
Nationally, check out local OWASP events 
Niche (e.g. hardware) meetups (meetup.com is helpful) 
41
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Maintaining the Network 
Regularly follow-up, but be mindful of people’s time 
Coffees are generally quick & easy 
Even starting out, consider how you can be helpful 
Try to maintain a 50/50 ask to give ratio 
Keeping an eye out for potential hires, making introductions, etc. 
42
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
On Randomness 
43 
Life is random – you never know what opportunities will come from your connections.
Staying Up-to-Date
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Socializing 
45 
Staying in touch and meeting new people helps enormously in knowing the “latest” 
Not all research / projects are discussed online 
Gossip and chatter can also inform you of career opportunities or new, interesting companies 
Fills in gaps in news you might have missed
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
News – A Word of Caution 
46 
News is important, but not always directly beneficial to your learning & career development 
Hard to weed out signal from noise in the media 
Why???
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
News Sources 
CyberWire – aggregates InfoSec news daily 
Reddit NetSec – consistently updated content 
Twitter – where the industry “chatter” happens 
Plus individual sites: 
47
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
InfoSec Treadmill 
48 
As a (relatively) nascent industry, InfoSec evolves rapidly – exciting, but with the potential for burnout.
Conclusion
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Your Personal Brand 
50 
Consistently build your personal portfolio of skills, experience and industry connections.
Shortridge – Cyber Education 
NYU Poly Cyber Symposium 2014 
Take It from This Guy 
51 
Work as hard and as much as you want to on the things you like to do the best. Don't think about what you want to be, but what you want to do. 
– Richard P. Feynman

More Related Content

Similar to Cyber Education: Your Options & Resources Mapped Out

Purdue unal iron hacks 2018 spring - award ceremony
Purdue unal iron hacks 2018 spring - award ceremonyPurdue unal iron hacks 2018 spring - award ceremony
Purdue unal iron hacks 2018 spring - award ceremonyPurdue RCODI
 
Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020JayTymchuk
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414Stewart Benger
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security GuideIla Group
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestrationChadni Islam
 
Cybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdfCybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdfWestwp
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiShreedeep Rayamajhi
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Securitystjohns9
 
Full Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdfFull Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdfBytecode Security
 
Online eminence with Social Media & Systems of Engagement
Online eminence with Social Media & Systems of EngagementOnline eminence with Social Media & Systems of Engagement
Online eminence with Social Media & Systems of EngagementNico Chillemi
 
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskBeyondTrust
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”Moshiul Islam, CISSP, CISA, CFE
 
OISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for EveryoneOISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for EveryoneThreatReel Podcast
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...Segun Ebenezer Olaniyan
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015Security Innovation
 

Similar to Cyber Education: Your Options & Resources Mapped Out (20)

Purdue unal iron hacks 2018 spring - award ceremony
Purdue unal iron hacks 2018 spring - award ceremonyPurdue unal iron hacks 2018 spring - award ceremony
Purdue unal iron hacks 2018 spring - award ceremony
 
Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020Charting a Career in Information Security - August 2020
Charting a Career in Information Security - August 2020
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
Cyber security Guide
Cyber security GuideCyber security Guide
Cyber security Guide
 
Multi-vocal Review of security orchestration
Multi-vocal Review of security orchestrationMulti-vocal Review of security orchestration
Multi-vocal Review of security orchestration
 
Presentation
PresentationPresentation
Presentation
 
Cybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdfCybersecurity Courses, Tools and Tactics.pdf
Cybersecurity Courses, Tools and Tactics.pdf
 
Accessible Privacy and Security
Accessible Privacy and SecurityAccessible Privacy and Security
Accessible Privacy and Security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhiResearch paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
Research paper-a-synopsis-on-cyber-terrorism-and-warfare-by-shreedeep-rayamajhi
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Security
 
Full Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdfFull Ethical Hacking Course for Beginners in Delhi.pdf
Full Ethical Hacking Course for Beginners in Delhi.pdf
 
Online eminence with Social Media & Systems of Engagement
Online eminence with Social Media & Systems of EngagementOnline eminence with Social Media & Systems of Engagement
Online eminence with Social Media & Systems of Engagement
 
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
 
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
wannabe Cyberpunk; “I don’t know what I’m supposed to do.”
 
OISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for EveryoneOISF - Continuous Skills Improvement for Everyone
OISF - Continuous Skills Improvement for Everyone
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
 
The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015The Future of Cybersecurity - October 2015
The Future of Cybersecurity - October 2015
 
Uhmlg2011
Uhmlg2011Uhmlg2011
Uhmlg2011
 

More from Kelly Shortridge

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
 
The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of ResilienceKelly Shortridge
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKelly Shortridge
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactKelly Shortridge
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecKelly Shortridge
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Kelly Shortridge
 

More from Kelly Shortridge (7)

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
 
The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of Resilience
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec Autodidact
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosec
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
 

Recently uploaded

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 

Recently uploaded (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 

Cyber Education: Your Options & Resources Mapped Out

  • 1. Cyber Education: Your Options & Resources Mapped Out Kelly Shortridge October 18, 2014
  • 2. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Agenda Your burning questions: What careers are there? How do I learn more about the field? How do I meet people / network? How do I stay current on industry trends? 2
  • 3. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Who am I? Kelly Shortridge Currently an Entrepreneur in Residence Formerly advised InfoSec companies on M&A and private capital raises Absolutely no technical background Built an InfoSec knowledge base & professional network from scratch 3
  • 4. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 At first… 4
  • 5. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 And then… 5
  • 6. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 But mostly… 6
  • 8. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Very General Advice No one can ever predict what they’ll be doing 5 years from now, let alone the rest of their lives Learn the “basics” and cross-over skills… …but make sure to learn about things you find interesting, too 8
  • 9. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Careers in InfoSec 9 Not just about hacking the mainframe.
  • 10. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Careers in InfoSec 10 Also about hardening applications
  • 11. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Careers in InfoSec 11 Also about developing security strategies
  • 12. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Careers in InfoSec 12 Also about monitoring systems
  • 13. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Careers in InfoSec 13 Also about responding to incidents
  • 14. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Careers in InfoSec 14 As well as attack-centric R&D
  • 15. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 InfoSec Jobs A career in InfoSec offers many options: Application Security Compliance & Policy Data Forensics & Incident Response Network Security Engineer / Ops & Monitoring Penetration Testing Security Architecture Vulnerability Research & Reverse Engineering 15
  • 16. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 The “Basics” 16 Roles often overlap and blend together Cover different aspects of the lifecycle of security operations Some areas of study are broadly applicable Network & System Architecture Math Software Development
  • 17. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 The Future! 17
  • 18. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Skill Sets – Example #1 Network Security Engineer / Ops & Monitoring Understand network design & architecture Familiarity with security tech – IDS/IPS, SIEM, firewalls, vulnerability detection & remediation Develop custom tooling for security monitoring Some knowledge on machine learning is a plus 18
  • 19. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Skill Sets – Example #2 Vulnerability Research & Reverse Engineering Analyze malicious code, shellcode, packed & obfuscated code Identify attacker methodology Strong math abilities, particularly graph theory Familiarity with IDA Pro and user & kernel- mode debuggers Languages: Assembly (x86 & x64), C/C++, Python 19
  • 20. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Skill Sets – Example #3 Application Security Audit applications for vulnerabilities (XSS, SQLI, logic flaws, etc.) Understanding of application architecture Help development teams implement SDL Build tooling to improve testing & auditing Languages: Java, PHP, C / C++, Python, Ruby 20
  • 21. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Potential Employers Major hubs include DC, SF & NYC – each city has its own “flavor” driven by employer base Government Fortune 500 Industry Defense Contractors & Gov’t Agencies Tech, Finance, Media, eCommerce, etc. Security Vendors & Consultancies 21
  • 22. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Guiding Your Education Find a few areas of interest / passion Determine what abilities are required 22
  • 24. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Where to Start 24 When I first started exploring InfoSec, someone told me Phrack was a leading industry publication. So I read every issue… Including the first 40, which are just about phones.
  • 25. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Where to Start, continued 25 Diving in head-first actually isn’t a bad strategy; there is some truth to learning by osmosis. Luckily, there are both formal and informal channels to help you live and breathe InfoSec.
  • 26. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Formal Education Academia Certifications Helpful if no other means of vetting abilities 26
  • 27. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Certifications 27 Provides professional certifications in InfoSec Covers a wide breadth of security topics $250 - $600 per examination Variable years of experience required: <1 year 1 year 2 years 4 years 5 years Years of Experience
  • 28. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Informal Education Take advantage of valuable informal channels: Visit conferences (or find talks posted online) CTF competitions Trainings (usually expensive) Social events (usually exclusive) Academic papers (contact authors) 28
  • 29. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Conferences Cons are often how people stay in touch Check out talks, or find them online Social events – great for networking Parties requiring challenges (Caesar’s Challenge at Blackhat/DEFCON) 29
  • 30. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 CTFs Test your skills & gain recognition Industry – DEFCON, Ghost in the Shellcode (Shmoocon), company-sponsored CTFs Private – Smash the Stack, Over the Wire, others hosted by hacker groups Collegiate – CSAW CTF, NECCDC Government – DARPA, semi-public or 100% private IC-focused CTFs 30
  • 31. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Trainings – Roles Practical education for professional security roles Multi-week courses Both on-demand & in-person Expensive (typically $4,500 - $5,000) Value depends widely on the teacher 31
  • 32. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Trainings – Skills Expensive ($2,000 - $4,000), but can substantially improve your skills & teach you new techniques 32 Private Conferences
  • 33. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Academic Papers Helps you find emerging areas of research IEEE Microsoft – Security & Privacy Research Reddit.com/r/NetSec USENIX ACM Digital Library (search by keywords, e.g. malware) 33
  • 34. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Academics Don’t be shy about contacting authors! They’ll most likely be flattered. 34
  • 35. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 How to Break In InfoSec is more open now than ever on how to find people – they just aren’t always welcoming… 35
  • 36. Meeting People & Networking
  • 37. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 37
  • 38. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 The Social Network InfoSec is a trust-based industry. A strong social network is critical. 38
  • 39. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Tl;dr on Networking Get as many “at bats” as possible Meet many people across various areas of expertise, employers & career stages Not everyone will respond, so need to maximize your hit rate by reaching out to more people Expand your network by asking new contacts (politely) if they know anyone you should meet 39
  • 40. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Persistence & Haters Don’t let someone convince you that you won’t be successful, or don’t belong 40 People like passion and want to “back winners” Persistence is key (true of most things)
  • 41. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Social Events NYC – NYSec & iSec Open Forum Look @ “CitySec Meetups” on Reddit NetSec Non-Industry Events NYC – Hack Nite @ NYU Nationally, check out local OWASP events Niche (e.g. hardware) meetups (meetup.com is helpful) 41
  • 42. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Maintaining the Network Regularly follow-up, but be mindful of people’s time Coffees are generally quick & easy Even starting out, consider how you can be helpful Try to maintain a 50/50 ask to give ratio Keeping an eye out for potential hires, making introductions, etc. 42
  • 43. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 On Randomness 43 Life is random – you never know what opportunities will come from your connections.
  • 45. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Socializing 45 Staying in touch and meeting new people helps enormously in knowing the “latest” Not all research / projects are discussed online Gossip and chatter can also inform you of career opportunities or new, interesting companies Fills in gaps in news you might have missed
  • 46. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 News – A Word of Caution 46 News is important, but not always directly beneficial to your learning & career development Hard to weed out signal from noise in the media Why???
  • 47. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 News Sources CyberWire – aggregates InfoSec news daily Reddit NetSec – consistently updated content Twitter – where the industry “chatter” happens Plus individual sites: 47
  • 48. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 InfoSec Treadmill 48 As a (relatively) nascent industry, InfoSec evolves rapidly – exciting, but with the potential for burnout.
  • 50. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Your Personal Brand 50 Consistently build your personal portfolio of skills, experience and industry connections.
  • 51. Shortridge – Cyber Education NYU Poly Cyber Symposium 2014 Take It from This Guy 51 Work as hard and as much as you want to on the things you like to do the best. Don't think about what you want to be, but what you want to do. – Richard P. Feynman