SlideShare une entreprise Scribd logo
1  sur  38
Télécharger pour lire hors ligne
DIY Education in Cyber Security
Kelly Shortridge July 30, 2015
Agenda
My goal is to help you figure out where and how to
start your learning journey by answering:
 What careers are there?
 How do I learn more about the field?
 How do I meet people / network?
 How do I stay current on industry trends?
2
Who am I?
Hi, I’m Kelly Shortridge
 Currently doing exciting things on the business side
of infosec
 Previously advised infosec companies on M&A and
private capital raise deals
 No technical background
 Built a knowledge base and network within infosec
from scratch
3
Career Paths
5
The “You Can’t Sit With Us” Myth
InfoSec as a professional field can seem a bit opaque,
insular and unapproachable.
In reality, it’s a blossoming field offering exciting
opportunities for a variety of skill sets and
interests…and not just full of cliques of “mean nerds”
6
InfoSec = Opportunity
Diverse potential paths to follow within infosec:
 Application Security
 Compliance & Policy
 Data Forensics & Incident Response
 Network Security Engineer / Ops & Monitoring
 Penetration Testing
 Security Architecture
 Security Solution Development
 Vulnerability Research & Reverse Engineering
7
InfoSec = Flexibility
Roles often overlap and have fuzzy boundaries
 Cover different aspects of the lifecycle of security
operations
Some areas of study are broadly applicable
 Data Science
 Math
 Network & System Architecture
 Software Development
8
Current Hotness
9
Skill Sets – Example #1
Network Security Engineer / Ops & Monitoring
 Understand network design & architecture
 Familiarity with security tech – IDS/IPS, SIEM,
firewalls, vulnerability detection & remediation
 Develop custom tooling for security monitoring
 Some knowledge on machine learning is a plus
10
Skill Sets – Example #2
Vulnerability Research & Reverse Engineering
 Analyze malicious code, shellcode, packed &
obfuscated code
 Identify attacker methodology
 Strong math abilities, particularly graph theory
 Familiarity with IDA Pro and user & kernel-mode
debuggers
 Languages: Assembly (x86 & x64), C/C++, Python
11
Skill Sets – Example #2
Application Security
 Audit applications for vulnerabilities (XSS, SQLI, logic
flaws, etc.)
 Understanding of application architecture
 Help development teams implement SDL
 Build tooling to improve testing & auditing
 Languages: Java, PHP, C / C++, Python, Ruby
12
Potential Employers
Major hubs include SF, NYC & DC – each city has its
own “flavor” driven by employer base
Government Private Vendors
Defense Contractors &
Gov’t Agencies
Tech, Finance, Media,
eCommerce, etc.
Security Vendors &
Consultancies
13
Broader Applicability
Security can serve as a differentiator in non-sec roles
 Anyone in the development process (design, UX,
etc.) should have the ability to consider security
implications of their decisions
 PR, legal and finance personnel should understand
their organization’s security risk profile
14
Find Your Purpose
Intersection of what you love doing, what you’re good
at doing, what is paid for and what the market needs
 Talent shortage in + known need for infosec means
you can focus on what you love + where you excel
Learning More
16
Where to Start?
Regardless of whether you’re a complete beginner,
switching fields or already successfully entered the
field, there’s plenty of knowledge and skills to gain.
17
Formal Education
Academia
Certifications
 Helpful if no other means of vetting abilities
18
Online Education
There are now tons of online resources available for
learning languages, development and data science
 Some free, some paid (often you get a certificate)
 Consistency is key; set a daily goal for practicing
19
Old-School Resources
If you prefer the more traditional book approach, try:
 The Art of Software Security Assessment
 Hacking: The Art of Exploitation
 The Shellcoder's Handbook
 Android Hacker's Handbook
 iOS Hacker's Handbook
20
CTFs & Other Games
Allows you to improve & show off your skills
 CTFs: DEFCON CTF, CSAW CTF, Ghost in the
Shellcode, MITRE STEM CTF, NECCDC, picoCTF
 Wargames: Hack this Site, Over the Wire, Smash the
Stack
 Reference list: http://captf.com/practice-ctf/
21
Conferences
Cons are often how people stay in touch
 Check out talks, or find them online
 Social events – great for networking
 Parties requiring challenges (Caesar’s Challenge at
Blackhat/DEFCON)
22
Meetups & Local Events
 Meetup.com is a great aggregator of
different meetups in your locale
 Code as Craft: Engineering talks
sponsored by Etsy here in NYC
Find local events to explore different areas of interest,
learn or practice skills and meet new people
23
Trainings
 Practical education with focus on
specific professional roles in infosec
Training sessions can quickly bring you up the learning
curve, but typically are expensive ($2,000 - $5,000)
 Conferences aggregate trainings
from a variety of companies, though
additional trainings are generally held
year round as well
24
Academic Papers
Explore emerging areas of research
 arXiv
 IEEE
 Microsoft – Security & Privacy Research
 Reddit.com/r/NetSec
 USENIX
Make note of particular topics you find interesting and
don’t be shy in contacting the authors directly
Networking
26
Step 1: Trust
InfoSec is a trust-based industry.
Don’t violate trust and be wary of those who do.
27
Networking Strategy
Get as many “at bats” as possible
 Meet many people across various areas of
expertise, employers & career stages
 Not everyone will respond, so need to maximize
your hit rate by reaching out to more people
 Expand your network by asking new contacts
(politely) if they know anyone you should meet
Awkwardness is a Part of Life
28
29
#hatersgonnahate
Don’t let anyone convince you that you won’t be
successful or don’t belong in the industry
 People like passion and
want to support “winners”
 Persistence is key (true of
most things)
 Define your own measure
of success
30
Contact Maintenance
Regularly follow-up, but be mindful of people’s time
 People generally like getting a “free” coffee
Even starting out, consider how you can be helpful
 Try to maintain a 50/50 ask to give ratio
 Keep an eye out for potential hires, introductions /
connections or research they’d find interesting
Keeping Up to Date
32
Socializing
Staying in touch and meeting new people helps
enormously in knowing the “latest”
 Not all research / projects are discussed online
 Gossip and chatter can also inform you of career
opportunities or new, interesting companies
 Fills in gaps in news you might have missed
33
Mainstream News is Not Ideal
Mostly a lot of this:
34
Suggested News Sources
 Twitter – where the industry “chatter” happens
 CyberWire – aggregates InfoSec news daily
 Individual websites:
35
Short InfoSec Twitter List
 @0xcharlie
 @4Dgifts
 @alexstamos
 @aloria
 @bcrypt
 @c7zero
 @cBekrar
 @chrisrohlf
 @collinrm
 @crypt0ad
 @dinodaizovi
 @djrbliss
 @drraid
 @esizkur
 @halvarflake
 @haroonmeer
 @j4istal
 @justineboneait
 @k8em0
 @mattblaze
 @matthew_d_green
 @mdowd
 @msuiche
 @nils
 @nudehaberdasher
 @pencilsareneat
 @quine
 @runasand
 @s7ephen
 @semibogan
 @_snagg
 @snare
 @SwiftOnSecurity
 @thegrugq
 @WeldPond
 @window
Conclusions
37
You Do You
 Consistently build your personal portfolio of
skills, experience and industry connections
 The field is rich with options, so you’ll likely
find a role you enjoy and in which you excel
 On the infosec industry treadmill, remember
that it’s a marathon, not a sprint
38
A Closing Quote
“Work as hard and as much as you want to on
the things you like to do the best.
Don't think about what you want to be, but what
you want to do.”
– Richard P. Feynman

Contenu connexe

Tendances

コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜
コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜
コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜Retrieva inc.
 
Kerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraKerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraOmal Perera
 
CyberChefの使い方(HamaCTF2019 WriteUp編)
CyberChefの使い方(HamaCTF2019 WriteUp編)CyberChefの使い方(HamaCTF2019 WriteUp編)
CyberChefの使い方(HamaCTF2019 WriteUp編)Shota Shinogi
 
Linux KVM のコードを追いかけてみよう
Linux KVM のコードを追いかけてみようLinux KVM のコードを追いかけてみよう
Linux KVM のコードを追いかけてみようTsuyoshi OZAWA
 
Understanding the Event Log
Understanding the Event LogUnderstanding the Event Log
Understanding the Event Logchuckbt
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylifessuser98b1f71
 
Learn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAPLearn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAPPaul Ionescu
 
初心者向けCTFのWeb分野の強化法
初心者向けCTFのWeb分野の強化法初心者向けCTFのWeb分野の強化法
初心者向けCTFのWeb分野の強化法kazkiti
 
Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...
Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...
Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...milk hanakara
 
SSL/TLSの基礎と最新動向
SSL/TLSの基礎と最新動向SSL/TLSの基礎と最新動向
SSL/TLSの基礎と最新動向shigeki_ohtsu
 
Network miner 使ってみた
Network miner 使ってみたNetwork miner 使ってみた
Network miner 使ってみた彰 村地
 
Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...
Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...
Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...Google Cloud Platform - Japan
 
若手エンジニアのためのセキュリティ講座
若手エンジニアのためのセキュリティ講座若手エンジニアのためのセキュリティ講座
若手エンジニアのためのセキュリティ講座Hiroshi Tokumaru
 
Goの時刻に関するテスト
Goの時刻に関するテストGoの時刻に関するテスト
Goの時刻に関するテストKentaro Kawano
 
Reladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題など
Reladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題などReladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題など
Reladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題などなべ
 

Tendances (20)

HTTP/2, QUIC入門
HTTP/2, QUIC入門HTTP/2, QUIC入門
HTTP/2, QUIC入門
 
コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜
コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜
コンテナ仮想、その裏側 〜user namespaceとrootlessコンテナ〜
 
Kerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal PereraKerberos for Distributed System Security - Omal Perera
Kerberos for Distributed System Security - Omal Perera
 
CyberChefの使い方(HamaCTF2019 WriteUp編)
CyberChefの使い方(HamaCTF2019 WriteUp編)CyberChefの使い方(HamaCTF2019 WriteUp編)
CyberChefの使い方(HamaCTF2019 WriteUp編)
 
Linux KVM のコードを追いかけてみよう
Linux KVM のコードを追いかけてみようLinux KVM のコードを追いかけてみよう
Linux KVM のコードを追いかけてみよう
 
Understanding the Event Log
Understanding the Event LogUnderstanding the Event Log
Understanding the Event Log
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
 
WebSocket / WebRTCの技術紹介
WebSocket / WebRTCの技術紹介WebSocket / WebRTCの技術紹介
WebSocket / WebRTCの技術紹介
 
A1-6 ドメイン乗っ取られた!!
A1-6 ドメイン乗っ取られた!!A1-6 ドメイン乗っ取られた!!
A1-6 ドメイン乗っ取られた!!
 
Learn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAPLearn to pen-test with OWASP ZAP
Learn to pen-test with OWASP ZAP
 
初心者向けCTFのWeb分野の強化法
初心者向けCTFのWeb分野の強化法初心者向けCTFのWeb分野の強化法
初心者向けCTFのWeb分野の強化法
 
SQLite の暗号化
SQLite の暗号化SQLite の暗号化
SQLite の暗号化
 
Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...
Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...
Infiniband hack-a-thon #2 Windows班まとめ資料 Windows Server 2012 + FDR Infinibandで...
 
SSL/TLSの基礎と最新動向
SSL/TLSの基礎と最新動向SSL/TLSの基礎と最新動向
SSL/TLSの基礎と最新動向
 
Network miner 使ってみた
Network miner 使ってみたNetwork miner 使ってみた
Network miner 使ってみた
 
Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...
Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...
Spanner から GKE、Spinnaker、そして SRE まで、コロプラが今挑戦していること[Google Cloud INSIDE Games ...
 
若手エンジニアのためのセキュリティ講座
若手エンジニアのためのセキュリティ講座若手エンジニアのためのセキュリティ講座
若手エンジニアのためのセキュリティ講座
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Goの時刻に関するテスト
Goの時刻に関するテストGoの時刻に関するテスト
Goの時刻に関するテスト
 
Reladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題など
Reladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題などReladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題など
Reladomoを使ったトランザクション履歴管理をプロダクトに適用した際のメリット/デメリット/課題など
 

Similaire à DIY Education in Cyber Security

Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber securityVishal Singh
 
Talks submitted
Talks submittedTalks submitted
Talks submittedKim Minh
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutKelly Shortridge
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsRwik Kumar Dutta
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Phx-techtalk
Phx-techtalkPhx-techtalk
Phx-techtalkThinkful
 
Phxtech830
Phxtech830Phxtech830
Phxtech830Thinkful
 
PHXTECH830
PHXTECH830PHXTECH830
PHXTECH830Thinkful
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designNikita Lukianets
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant abnmi
 
Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...APMDonotuse
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeEC-Council
 
Fallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being DigitalFallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being DigitalAki Spicer
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck BrooksChuck Brooks
 
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019Resourceful Nonprofit
 
Blockchain Brochure - Open Reply
Blockchain Brochure - Open ReplyBlockchain Brochure - Open Reply
Blockchain Brochure - Open ReplyAusrine S.
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsediveGrace Chi
 
gtintpdx0816
gtintpdx0816gtintpdx0816
gtintpdx0816Thinkful
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfAngela Baxter
 

Similaire à DIY Education in Cyber Security (20)

Should i study cyber security
Should i study cyber securityShould i study cyber security
Should i study cyber security
 
Talks submitted
Talks submittedTalks submitted
Talks submitted
 
Cyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped OutCyber Education: Your Options & Resources Mapped Out
Cyber Education: Your Options & Resources Mapped Out
 
Ethical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its ProspectsEthical Hacking, Its relevance and Its Prospects
Ethical Hacking, Its relevance and Its Prospects
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
Phx-techtalk
Phx-techtalkPhx-techtalk
Phx-techtalk
 
Phxtech830
Phxtech830Phxtech830
Phxtech830
 
PHXTECH830
PHXTECH830PHXTECH830
PHXTECH830
 
Let's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational designLet's Talk: fundamentals of conversational design
Let's Talk: fundamentals of conversational design
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
So... you want to be a security consultant
So... you want to be a security consultant So... you want to be a security consultant
So... you want to be a security consultant
 
Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...Project professionals: Ready for the future? AI and Change Management, James ...
Project professionals: Ready for the future? AI and Change Management, James ...
 
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle LeeHacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
 
Fallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being DigitalFallon Brainfood x MNAMA: Being Digital
Fallon Brainfood x MNAMA: Being Digital
 
About Chuck Brooks
About Chuck BrooksAbout Chuck Brooks
About Chuck Brooks
 
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
Leveraging Blockchain for Impact Right Now - Amy Neumann - Dec 2019
 
Blockchain Brochure - Open Reply
Blockchain Brochure - Open ReplyBlockchain Brochure - Open Reply
Blockchain Brochure - Open Reply
 
Preparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - PulsedivePreparing for a New Career in Cyber - Pulsedive
Preparing for a New Career in Cyber - Pulsedive
 
gtintpdx0816
gtintpdx0816gtintpdx0816
gtintpdx0816
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 

Plus de Kelly Shortridge

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameKelly Shortridge
 
The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of ResilienceKelly Shortridge
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityKelly Shortridge
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKelly Shortridge
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactKelly Shortridge
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecKelly Shortridge
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Kelly Shortridge
 
Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Kelly Shortridge
 

Plus de Kelly Shortridge (8)

Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec GameBig Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
 
The Red Pill of Resilience
The Red Pill of ResilienceThe Red Pill of Resilience
The Red Pill of Resilience
 
Volatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive SecurityVolatile Memory: Behavioral Game Theory in Defensive Security
Volatile Memory: Behavioral Game Theory in Defensive Security
 
Know Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-MakingKnow Thyself: Optimizing Team Decision-Making
Know Thyself: Optimizing Team Decision-Making
 
How to Become an InfoSec Autodidact
How to Become an InfoSec AutodidactHow to Become an InfoSec Autodidact
How to Become an InfoSec Autodidact
 
The Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosecThe Art of Explanation: Behavioral models of infosec
The Art of Explanation: Behavioral models of infosec
 
Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off? Privacy vs. Security: A False Trade-Off?
Privacy vs. Security: A False Trade-Off?
 
Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...Behavioral Models of Information Security: Industry irrationality & what to d...
Behavioral Models of Information Security: Industry irrationality & what to d...
 

Dernier

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 

Dernier (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 

DIY Education in Cyber Security

  • 1. DIY Education in Cyber Security Kelly Shortridge July 30, 2015
  • 2. Agenda My goal is to help you figure out where and how to start your learning journey by answering:  What careers are there?  How do I learn more about the field?  How do I meet people / network?  How do I stay current on industry trends? 2
  • 3. Who am I? Hi, I’m Kelly Shortridge  Currently doing exciting things on the business side of infosec  Previously advised infosec companies on M&A and private capital raise deals  No technical background  Built a knowledge base and network within infosec from scratch 3
  • 5. 5 The “You Can’t Sit With Us” Myth InfoSec as a professional field can seem a bit opaque, insular and unapproachable. In reality, it’s a blossoming field offering exciting opportunities for a variety of skill sets and interests…and not just full of cliques of “mean nerds”
  • 6. 6 InfoSec = Opportunity Diverse potential paths to follow within infosec:  Application Security  Compliance & Policy  Data Forensics & Incident Response  Network Security Engineer / Ops & Monitoring  Penetration Testing  Security Architecture  Security Solution Development  Vulnerability Research & Reverse Engineering
  • 7. 7 InfoSec = Flexibility Roles often overlap and have fuzzy boundaries  Cover different aspects of the lifecycle of security operations Some areas of study are broadly applicable  Data Science  Math  Network & System Architecture  Software Development
  • 9. 9 Skill Sets – Example #1 Network Security Engineer / Ops & Monitoring  Understand network design & architecture  Familiarity with security tech – IDS/IPS, SIEM, firewalls, vulnerability detection & remediation  Develop custom tooling for security monitoring  Some knowledge on machine learning is a plus
  • 10. 10 Skill Sets – Example #2 Vulnerability Research & Reverse Engineering  Analyze malicious code, shellcode, packed & obfuscated code  Identify attacker methodology  Strong math abilities, particularly graph theory  Familiarity with IDA Pro and user & kernel-mode debuggers  Languages: Assembly (x86 & x64), C/C++, Python
  • 11. 11 Skill Sets – Example #2 Application Security  Audit applications for vulnerabilities (XSS, SQLI, logic flaws, etc.)  Understanding of application architecture  Help development teams implement SDL  Build tooling to improve testing & auditing  Languages: Java, PHP, C / C++, Python, Ruby
  • 12. 12 Potential Employers Major hubs include SF, NYC & DC – each city has its own “flavor” driven by employer base Government Private Vendors Defense Contractors & Gov’t Agencies Tech, Finance, Media, eCommerce, etc. Security Vendors & Consultancies
  • 13. 13 Broader Applicability Security can serve as a differentiator in non-sec roles  Anyone in the development process (design, UX, etc.) should have the ability to consider security implications of their decisions  PR, legal and finance personnel should understand their organization’s security risk profile
  • 14. 14 Find Your Purpose Intersection of what you love doing, what you’re good at doing, what is paid for and what the market needs  Talent shortage in + known need for infosec means you can focus on what you love + where you excel
  • 16. 16 Where to Start? Regardless of whether you’re a complete beginner, switching fields or already successfully entered the field, there’s plenty of knowledge and skills to gain.
  • 17. 17 Formal Education Academia Certifications  Helpful if no other means of vetting abilities
  • 18. 18 Online Education There are now tons of online resources available for learning languages, development and data science  Some free, some paid (often you get a certificate)  Consistency is key; set a daily goal for practicing
  • 19. 19 Old-School Resources If you prefer the more traditional book approach, try:  The Art of Software Security Assessment  Hacking: The Art of Exploitation  The Shellcoder's Handbook  Android Hacker's Handbook  iOS Hacker's Handbook
  • 20. 20 CTFs & Other Games Allows you to improve & show off your skills  CTFs: DEFCON CTF, CSAW CTF, Ghost in the Shellcode, MITRE STEM CTF, NECCDC, picoCTF  Wargames: Hack this Site, Over the Wire, Smash the Stack  Reference list: http://captf.com/practice-ctf/
  • 21. 21 Conferences Cons are often how people stay in touch  Check out talks, or find them online  Social events – great for networking  Parties requiring challenges (Caesar’s Challenge at Blackhat/DEFCON)
  • 22. 22 Meetups & Local Events  Meetup.com is a great aggregator of different meetups in your locale  Code as Craft: Engineering talks sponsored by Etsy here in NYC Find local events to explore different areas of interest, learn or practice skills and meet new people
  • 23. 23 Trainings  Practical education with focus on specific professional roles in infosec Training sessions can quickly bring you up the learning curve, but typically are expensive ($2,000 - $5,000)  Conferences aggregate trainings from a variety of companies, though additional trainings are generally held year round as well
  • 24. 24 Academic Papers Explore emerging areas of research  arXiv  IEEE  Microsoft – Security & Privacy Research  Reddit.com/r/NetSec  USENIX Make note of particular topics you find interesting and don’t be shy in contacting the authors directly
  • 26. 26 Step 1: Trust InfoSec is a trust-based industry. Don’t violate trust and be wary of those who do.
  • 27. 27 Networking Strategy Get as many “at bats” as possible  Meet many people across various areas of expertise, employers & career stages  Not everyone will respond, so need to maximize your hit rate by reaching out to more people  Expand your network by asking new contacts (politely) if they know anyone you should meet
  • 28. Awkwardness is a Part of Life 28
  • 29. 29 #hatersgonnahate Don’t let anyone convince you that you won’t be successful or don’t belong in the industry  People like passion and want to support “winners”  Persistence is key (true of most things)  Define your own measure of success
  • 30. 30 Contact Maintenance Regularly follow-up, but be mindful of people’s time  People generally like getting a “free” coffee Even starting out, consider how you can be helpful  Try to maintain a 50/50 ask to give ratio  Keep an eye out for potential hires, introductions / connections or research they’d find interesting
  • 32. 32 Socializing Staying in touch and meeting new people helps enormously in knowing the “latest”  Not all research / projects are discussed online  Gossip and chatter can also inform you of career opportunities or new, interesting companies  Fills in gaps in news you might have missed
  • 33. 33 Mainstream News is Not Ideal Mostly a lot of this:
  • 34. 34 Suggested News Sources  Twitter – where the industry “chatter” happens  CyberWire – aggregates InfoSec news daily  Individual websites:
  • 35. 35 Short InfoSec Twitter List  @0xcharlie  @4Dgifts  @alexstamos  @aloria  @bcrypt  @c7zero  @cBekrar  @chrisrohlf  @collinrm  @crypt0ad  @dinodaizovi  @djrbliss  @drraid  @esizkur  @halvarflake  @haroonmeer  @j4istal  @justineboneait  @k8em0  @mattblaze  @matthew_d_green  @mdowd  @msuiche  @nils  @nudehaberdasher  @pencilsareneat  @quine  @runasand  @s7ephen  @semibogan  @_snagg  @snare  @SwiftOnSecurity  @thegrugq  @WeldPond  @window
  • 37. 37 You Do You  Consistently build your personal portfolio of skills, experience and industry connections  The field is rich with options, so you’ll likely find a role you enjoy and in which you excel  On the infosec industry treadmill, remember that it’s a marathon, not a sprint
  • 38. 38 A Closing Quote “Work as hard and as much as you want to on the things you like to do the best. Don't think about what you want to be, but what you want to do.” – Richard P. Feynman