Your Cyber Path: How to Get Your Dream Cybersecurity Job

Follow Your Cyber Path: How to Get Your Dream Cybersecurity Job
Share on
Copy link to clipboard

Find out what it takes to get your dream cybersecurity job (from the hiring managers' perspective).

Kip Boyle


    • Feb 16, 2024 LATEST EPISODE
    • every other week NEW EPISODES
    • 6h 41m AVG DURATION
    • 116 EPISODES


    Search for episodes from Your Cyber Path: How to Get Your Dream Cybersecurity Job with a specific topic:

    Latest episodes from Your Cyber Path: How to Get Your Dream Cybersecurity Job

    EP 116 - What's next after season 2?

    Play Episode Listen Later Feb 16, 2024 36:49


    What's next after season 2? About this Episode In the grand wrap-up of season two of the podcast 'Your Cyber Path', hosts Kip Boyle and Jason Dion reflect on their four-year podcast journey. They also reveal that for the time being, there won't be a season three as originally planned. Several factors have influenced this decision, the primary being their venture Akylade – a cybersecurity certification organization. They're also experiencing increased demand for their time and energy due to factors involving Akylade and other projects. However, they highlight the intention of potentially doing a third season in the future based on the feedback and demand received. Kip Boyle will continue to mentor notes but change the frequency from weekly to monthly. Jason Dion urges listeners to check their cybersecurity course, 'Irresistible' on Udemy. They greatly encourage listeners to stay in touch and seek guidance on cybersecurity careers through email which is available at yourcyberpath.com. Relevant websites for this episode https://cr-map.com https://www.akylade.com https://www.yourcyberpath.com https://www.diontraining.com/udemy

    relevant udemy kip boyle
    EP 115 - SDP 10: Separation of Privileges

    Play Episode Listen Later Feb 6, 2024 15:46


    SDP 10: Separation of Privileges About this Episode In this episode of the Your CyberPath podcast, Kip Boyle and Jason Dion delve into the concept of the separation of privilege as a vital component of their series on security architecture and design principles. Jason and Kip talk about how the separation of privilege illustrates its significance through real-world examples. They also help showcase its application in technologies, military operations, and financial transactions. Jason also draws from his military experience to underscore the critical role of separation of privilege in SOVOT (System Operations Verification and Testing) environments. Finally, they underscore its importance in password management systems. They emphasize its pivotal role in upholding cybersecurity standards. Understanding these principles is essential for building robust security frameworks. Relevant websites for this episode The NIST Separation of Duty (SOD) - https://csrc.nist.gov/glossary/term/separation_of_duty Other relevant Episodes EP 94: Ten Security Design Principles (SDP) EP 96: SDP 1: Least Privilege EP 98: Security Design Principles 2: Psychological Acceptability EP 101: SDP 3: Economy of Mechanism EP 103: SDP 4 Compromise Recording EP 105: SDP 5: Work Factor EP 107: SDP 6: Failsafe Defaults EP 109: SDP 7: Complete Mediation EP 111: SDP 8 open Design EP 113: SDP 9 — Least Common Mechanism

    EP 114 - NIST CSF Versus The Top 18

    Play Episode Listen Later Jan 19, 2024 50:07


    About this episode In this episode, Kip Boyle and Jason Dion discuss the importance of cybersecurity in the current digital landscape and focus on comparing two different standards: The NIST Cybersecurity Framework and the CIS Top 18. The NIST Framework was created to assist organizations in becoming cyber resilient and offers an adaptable and comprehensive approach to cyber risks. The CIS Top 18, on the other hand, provides an actionable and practical checklist of controls that is prioritized and sequenced. Both of these frameworks provide us with cybersecurity measures that can be used for different applications. They can be used individually, or they can work together by complementing each other in a comprehensive cybersecurity strategy. It is important to realize that the CIS Top 18 can end up being quite expensive for smaller organizations to operate, though, which is why many people are choosing the NIST CSF instead. You should always consider various factors, such as organizational size and specific needs, the type of threats faced, and the budget available for implementation when selecting the framework for your organization. Relevant websites for this episode The NIST Cyber Security Framework (CSF) - https://www.nist.gov/cyberframework The 18 CIS Critical Security Controls - https://www.cisecurity.org/controls/cis-controls-list Other Relevant Episodes EP 62 – The NIST Cybersecurity Framework EP 79 – Mid-Career Transition Success Story with Steve McMichael EP 83 – Automating NIST Risk Management Frameowrk with Rebecca Onuskanich

    relevant nist cybersecurity framework nist csf kip boyle cis top
    EP 113 - SDP 9 Least common Mechanism

    Play Episode Listen Later Jan 5, 2024 13:43


    In this episode, Kip and Jason cover the Security Design Principle of “Least Common Mechanism”. The Lease Common Mechanism is the ninth security design principle and focuses on how you can best protect older, legacy systems in large organizations and within the government. Security Design Principle #9 is a crucial concept in the field of cybersecurity. It advocates for minimizing the amount of mechanisms shared by different users or processes, thereby reducing the chances of a security breach. This principle is rooted in the idea that shared resources or functionalities can become potential vulnerabilities, especially if they are used by multiple entities with varying levels of trustworthiness. The principle is based on the understanding that any shared mechanism or resource is a potential attack surface. When different programs or users rely on the same functionality or data paths, a breach in one can easily become a gateway to compromise the others. For instance, if a shared library has a vulnerability, every program using that library is at risk. Therefore, by reducing the number of shared components, the principle of Least Common Mechanism aims to limit the potential damage that can be caused by a security flaw or breach. Implementing this principle involves designing systems where the functionalities are as isolated as possible. This can be achieved through techniques like sandboxing, where programs run in isolated environments, or through the use of microservices architectures, where applications are broken down into smaller, independent services. Each service or program having its unique mechanisms greatly diminishes the risk of a widespread security incident. The principle also underlines the importance of not only securing shared resources but also constantly monitoring them. Regular audits and updates of shared components are vital to ensure they remain secure. In essence, the Least Common Mechanism principle is about understanding the risks associated with shared resources and proactively designing systems to minimize these risks. Relevant websites for this episode Akylade Certified Cyber Resilience Fundamentals (A/CCRF)Your Cyber Path Other Relevant Episodes Episode 96 – SDP 1 – Least PrivilegeEpisode 98 – SDP 2 – Psychological AcceptabilityEpisode 101 – SDP 3 – Economy of MechanismEpisode 103 – SDP 4 – Compromise RecordingEpisode 105 – SDP 5 – Work FactorEpisode 107 – SDP 6 – Failsafe DefaultsEpisode 109 – SDP 7 – Complete MediationEpisode 111 - SDP 8 – Open Design

    EP 112 - Listeners' Questions

    Play Episode Listen Later Dec 22, 2023 67:16


    https://www.yourcyberpath.com/112/ In this episode, Kip and Jason jump into answer questions directly from our listeners! We share valuable advice and insights into starting and advancing in the cybersecurity field by addressing ways to overcome some common challenges such as imposter syndrome, applying skills from diverse industries, and filling employment history gaps.  Further, you will get some guidance on gaining relevant experience, understanding job roles, tackling age bias, and displaying self-confidence to potential employers.  We will then culminate with some valuable tips on overcoming technical skill gaps and making successful career transitions, alongside with coverage of the HIRED course and its transition from a high-cost masterclass to a more accessible Udemy course that anyone can participate in. How do I get started in cybersecurity?How can I gain experience?How to I transition into cybersecurity later in life?How do I identify my desired job and current transferrable skills?How should I address a gap in my resume?How can I deal with imposter syndrome? Relevant websites for this episode Akylade Certified Cyber Resilience Fundamentals (A/CCRF)Your Cyber PathIRRESISTIBLE: How to Land Your Dream Cybersecurity PositionThe Cyber Risk Management Podcast Other Relevant Episodes Episode 90 - How to Get Your First Job as a Pentester with Chris HornerEpisode 45 - Live Resume ReviewEpisode 24 - How to Navigate a Skill GapEpisode 66 - How to Be Irresistible to Hiring Managers

    EP 111: SDP 8 Open Design

    Play Episode Listen Later Dec 8, 2023 21:46


    https://www.yourcyberpath.com/111/ In this episode, Kip and Jason delve into the specific security design principle of Open Design. Open Design does not equate to open-source software but refers to transparency in revealing the mechanisms and inner workings of security controls. The hosts discuss the misconceptions surrounding Open Design, emphasizing that it does not require disclosing source code but rather the transparency of security mechanisms. They also stress that Open Design encourages outsiders to review and provide feedback, ultimately enhancing the security of the system. Kip shares an example of an inadequate disclosure of a company's security architecture which prompted him to switch to another vendor, which offered more transparency. Jason mentions the concept of "security by obscurity," and explains that while obscurity can provide some level of protection, it is not sufficient, as attackers can easily bypass such measures with scanning tools. The hosts suggest that getting involved in Open Design initiatives can help individuals break into the cybersecurity field and gain recognition, urging interested parties to participate in open standards development processes, such as the creation of industry certifications, to establish credibility and build their careers. What You'll Learn ●    What is open design? ●    What are the common misconceptions surrounding open design? ●     What does the concept of “security by obscurity” mean? ●     How can you break into cybersecurity with open design? Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●  Your Cyber Path ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●   Episode 92 - Password Managers ●   Episode 89 - Getting My First Job in Cybersecurity ●   Episode 82 - From Truck Driver to Cybersecurity Analyst

    open design
    EP 110: Am I too old to work in Cybersecurity

    Play Episode Listen Later Nov 24, 2023 34:04


    https://www.yourcyberpath.com/110/ In this episode, hosts Kip Boyle and Jason Dion discuss the topic of ageism in cybersecurity careers. They address a listener's question about whether it is too late for a career change into cybersecurity at the age of 60-65. The hosts acknowledge that ageism does exist in the industry, but they provide tips and strategies for older individuals to overcome this challenge. First, they advise career changers to identify their transferable skills and highlight them on their resumes. They also recommend choosing job titles carefully, avoiding entry-level positions that may be more suited for younger candidates. Instead, older individuals should target higher-level positions that align with their experience and expertise. The hosts also discuss the importance of addressing ageism during the interview process. They suggest talking about new technologies and demonstrating a willingness to adapt and embrace change. Additionally, they advise older candidates to choose employers wisely, considering organizations that value and appreciate the skills and experience they bring to the table. Overall, the episode provides practical advice for older individuals looking to transition into cybersecurity careers and navigate the challenges of ageism in the industry. What You'll Learn ●    Am I too old to do a career change into cybersecurity? ●   What are some strategies to overcome age-related challenges when pursuing a career change into cybersecurity? ●    Should I highlight my transferable skills when changing careers? ●    What should older individuals consider when targeting job positions in the cybersecurity field? Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●  Your Cyber Path ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●  Episode 64 - How I got my first cybersecurity analyst job with Sebastian Whiting ●  Episode 66 - How to be irresistible to hiring Managers ●  Episode 38 -  Wes' Cybersecurity Job Hunt

    cybersecurity kip boyle
    EP 109: SDP 7: Complete Mediation

    Play Episode Listen Later Nov 10, 2023 20:42


    https://www.yourcyberpath.com/109/ In this episode, we are returning to the Security Design Principles series, this time with Complete Mediation. Complete mediation means the system checks the user trying to access a file or perform an action is authorized to access this file or perform this action. Complete mediation is also implemented in the security reference monitor (SRM) in Windows operating systems. The SRM checks fully and completely that a user has access to perform an action each time they try to perform it. It also ties back to one of the three As of cybersecurity, which is Authorization, since the user has to prove having access to something when they request it. Complete mediation can be a huge challenge to usability, and it might be something that interferes with your operations. That's where you need to understand that the security design principles are not a compliance list and that you should use them to enhance your systems. You should not be trying to get every principle to 100%. What You'll Learn ●    What is complete mediation? ●    What are some examples of complete mediation? ●     How is complete mediation implemented in Windows? ●     What are the challenges of complete mediation? Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●  Your Cyber Path ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●  Episode 103 - SDP 4: Compromise Recording ●  Episode 105 - SDB 5: Work Factor ●  Episode 107 -  SDP 6: Failsafe Defaults

    Episode 108: Self-Care

    Play Episode Listen Later Oct 27, 2023 46:27


    https://www.yourcyberpath.com/108/ In this episode, we discuss a critically important topic which is Selfcare. Cybersecurity is a great career, however it is not 100% stress free, burning out and working yourself into oblivion is very common. In this episode our hosts Jason and Kip give you some tips to make sure you have your selfcare in check. The first thing you should do is take time off. It's common to see people who don't take any time off, and over time it can easily get to you without you being able to realize how much your stress is building up. Next up, always have an emergency fund. It should be between 3 to 12 months of savings. Having this money on the side can help you get out of bad situations and maybe even have the chance to do something fun every once in a while. The last tip we have for you is to make sure you separate self compassion from self judgment. You need to realize that beating yourself up is really stressful and can easily drive you crazy. Always treat yourself with patience, empathy, warmth, and understanding that you would expect from a friend. You should always adopt a growth mindset, which can strengthen your abilities and give you much needed resilience to stress and burnout. What You'll Learn ●    Why is selfcare important? ●    How to handle your time off? ●    What strategy can you use to save money?  ●    How to avoid self judgment?     Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●  Your Cyber Path ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●   Episode 100 - Special with Kip and Jason ●  Episode 95 - The Cybersecurity Student Perspective with Sam Bodine ●  Episode 97 - Which Certification Roadmap Or Path Should I Use?

    EP 107: SDP 6: Fail-safe Defaults

    Play Episode Listen Later Oct 13, 2023 26:55


    https://www.yourcyberpath.com/107/ In this episode, we go back to the Security Design Principles series, this time we are discussing Failsafe Defaults. Failsafe defaults simply means that the default condition of a system should always be to deny. An example of a failsafe default is the security reference monitor (SRM) that has been implemented in Windows operating systems since Windows NT. The SRM prevents access to any actions like logging on, accessing a file, or printing something unless the user presents a token to prove that they should have access to a file or an action. There will always be two choices for failsafe defaults - to fail close or to fail open. The DoD and government organization side will tend toward using the fail close option, while the commercial and more streamlined companies will definitely prefer to fail open. There will always be this challenge between security and operations. More security means less operations and more inconveniences, while prioritizing operations means that security will not be the best. It all depends on your organization and its goals. Understanding failsafe defaults and other security design principles will help you become a better analyst and produce more secure, robust, and functional systems. What You'll Learn ●    What is Failsafe Defaults? ●    What are some examples for Failsafe defaults? ●     What is the Security Reference Monitor? ●     What is the difference between failing close and failing open? Relevant Websites For This Episode ●    Akylade Certified Cyber Resilience Fundamentals (A/CCRF) ●   Your Cyber Path ●   IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●   The Cyber Risk Management Podcast Other Relevant Episodes ●   Episode 103 - SDP 4: Compromise Recording ●   Episode 105 - SDB 5: Work Factor ●   Episode 101 -   SDP 3: Economy of Mechanism

    EP 106: All About Internships

    Play Episode Listen Later Sep 29, 2023 38:00


    https://www.yourcyberpath.com/106/ In this episode, we are discussing the much-anticipated topic of Internships! Internships are not that common in cybersecurity and that's because they are a huge long-term investment, which is risky for lots of organizations especially in the private sector. Some of the issues that come along with internships are the time and resources that must be invested, and on the side, the risk of all these resources being blown away when the intern decides to not continue with the organization. You can also expect not to see two internship programs that are similar to each other. They are always different and very customized to fit the organization providing these internships. Internships can also be a great help to break barriers that a lot of entry level workers face when trying to get a job for the first time in many different fields, not just cybersecurity. There are also other benefits to internships, including better networking opportunities and more improvements to your team's communication skills, and the way they work with different skill levels, which can enlighten you about areas of weaknesses and points of improvement. What You'll Learn ●    Why are internships hard to get? ●    What are the differences between paid and unpaid internships? ●     How do internships help break barriers in cybersecurity? ●     What are the benefits of internships? Relevant Websites For This Episode ●    Your Cyber Path  ●  IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●   Episode 95 - The Cybersecurity Student Perspective with Sam Bodine ●  Episode 99 - SDP 2: Psychological Acceptability ●  Episode 89 - SDP 3: Economy of Mechanism

    EP 105 : SDP 5 Work Factor

    Play Episode Listen Later Sep 15, 2023 34:29


    https://www.yourcyberpath.com/105/ In this episode, we are returning to the Security Design Principles series, this time with Work Factor. Work factor refers to how much work it's going to take an adversary to attack your assets and succeed in doing so. This is coming directly from the world of physical security that was imported into the cybersecurity realm. What you need to understand is you don't need perfect security. You don't have to create an impregnable system (if that even existed) to be able to protect yourself from most dangers. You just need to become a more difficult target than other organizations. And this is where work factor comes in. While you need to make it difficult for attackers to consider you as a target, you also need to make sure you are not spending too much time and money doing so, to the point where you are building a $1000 fence to protect a $100 horse. Balancing security and business value is a critical aspect when planning out your security posture. Another important aspect that a lot of people usually ignore is the anticipated resources available to the attacker. Understanding how your adversary works and what kind of resources they might be able to utilize can help you determine how much protection you need to put in. What You'll Learn ●    What is Work Factor? ●    Do you need perfect security? ●     How do you value how much protection you need? ●     What kind of attacks endanger small to mid-sized businesses? Relevant Websites For This Episode ●    Your Cyber Path  ●   IRRESISTIBLE: How to Land Your Dream Cybersecurity Position ●  The Cyber Risk Management Podcast Other Relevant Episodes ●   Episode 103 - SDP 4: Compromise Recording ●   Episode 98 - SDP 2: Psychological Acceptability ●   Episode 101 - SDP 3: Economy of Mechanism

    EP 104: Confidently Presenting with Meredith Grundei

    Play Episode Listen Later Sep 1, 2023 49:43


    https://www.yourcyberpath.com/104/ In this episode, our awesome host Jason Dion is back again with another episode of the Your Cyber Path podcast. This time, he's accompanied by an amazing guest, Meridith Grundei. Meridith is a renowned public speaking coach and owner of Grundei Coaching who specializes in public speaking and presentation skills. Meridith explains that understanding your client and doing your due diligence of research and studying will help you immensely in your attempts to simplify any complex concept to any level of audience. You need to figure out your objective, point out all the key takeaways, and choose the ones that support your argument. It is crucial for you to find out what sets you apart as a presenter and understanding that will help you be more engaging during your presentations. Starting with a story or an open-ended question usually tends to make people lean in and give more attention, and finding an emotional connection with your audience will get them to invest more cognitive attention to your talk. It's also important to not try to be different for the sake of being different, but to try to innovate to be better. One example of being different is trying to adapt your stories to different audiences. Make sure you always try to make the audience feel like they're the hero, because most of the time, the audience doesn't care about the speaker but about themselves, and so shifting the focus towards the audience really helps keep them engaged and invested in your presentation. Meridith also emphasizes that if you are going to practice only two things, these should be your introduction and call to action, as your introduction will give you a good boost into your presentation and the call to action makes sure your talk is well concluded. Moving to a different point, recognizing that anxiety and fear is a natural reaction can help you significantly. Doing things like breathing exercises and turning the anxiety into excitement in any way can drastically ease out any anxiety and fear you might have. Finally, you need to realize that with more practice, you are going to understand yourself better, and understand how you can improvise with different situations that can happen during your presentations. What You'll Learn ●   How do you communicate complex concepts in a simple way ●   How to give engaging and interactive presentations ●   How to keep your audience invested? ●   How can you deal with fear and anxiety of presentations? Relevant Websites For This Episode ●  Grundei Coaching LLC Other Relevant Episodes ●  Episode 72 - DISC Profiles ●  Episode 64 - Can You Demonstrate Too Much Passion for Cybersecurity? ●  Episode 47 - How to Use Your Transferable Skills

    EP 103: SDP 4 Compromise Recording

    Play Episode Listen Later Aug 18, 2023 30:43


    https://www.yourcyberpath.com/103/ In this episode, we are back with our Security Design Principles series, this time discussing Compromise. In the constantly evolving tech world, we are constantly bombarded with new products, updates, and software changes. To navigate through this ever-changing landscape, we require a foundation of stability. This is precisely where the Security Design Principles step in. In simple words, Compromise Recording simply refers to the logging and alerting. If you are familiar with the three As of security - Authorization, Authentication, and Accounting, Compromise Recording refers to the Accounting part of security. It is important to note that you can log all the details and events you want, but if you are not looking at those logs and analyzing through them, they are just a waste of storage space. You also must make sure that you are logging the important data, not just burying yourself in a mountain of data. Finding that balance of what to log and how much to log is crucial for your work as a cybersecurity practitioner. This is how you can utilize the Security Design Principles to effectively analyze a new product. By doing this, you will fully understand how it works and make sure you have a good understanding of your organization's security. What You'll Learn ●    What is Compromise Recording? ●    What is a mid market company? ●    What is the practical value of Compromise Recording? ●     How are the Security Design Principles beneficial in the real world? Relevant Websites For This Episode ●    Your Cyber Path  ●   IRRESISTIBLE: How to Land Your Dream Cybersecurity Position Other Relevant Episodes ●   Episode 96 - SDP 1: Least Privilege ●   Episode 98 - SDP 2: Psychological Acceptability ●   Episode 101 - SDP 3: Economy of Mechanism

    EP 102: Passing CISSP and CISM exams with Ed Skipka

    Play Episode Listen Later Aug 4, 2023 39:38


    https://www.yourcyberpath.com/102/ In this episode, we are back with one of our favorite guests, Ed Skipka, to talk about his latest achievements, studying and passing both CISSP and CISM exams. To start, Ed goes on about how you should find your own way of studying and figure out the most efficient way to digest information, whether that is online video training, reading books, or attending bootcamps. Finding a study route that you enjoy is one of the easiest ways to ensure you stay on track. He then goes on to explain how he approached the study materials and how he used multiple resources and figured out a way to grade himself and pinpoint his weaknesses to be able to work on them without spending too much time on topics he already had good experience and knowledge with. Ed also mentions that it's crucial that you don't go into studying for the exam being afraid of it. It's indeed a tough exam. However, staying consistent day in and day out and being methodical about how you study should help you break down those fears. After that, Kip and Ed discuss how he approached studying for CISM and why he chose to tackle that certification right after CISSP, highlighting that due to the overlap of information between the two certifications, he was able to conserve a lot of time and energy. In the end, Ed mentions that you should not just take the certification for the sake of taking them, but you should use them to widen your knowledge and to know why and how things are happening and how to relate that to your current job and future positions. What You'll Learn ●    How long do you have to study before taking the test? ●    How to organize your time to study for the exam? ●    How to approach the study Materials? ●    What are the differences and similarities between CISM and CISSP? ●    What are some tips of success for the CISSP and CISM exams? Relevant Websites For This Episode ●    https://www.cyberriskopportunities.com/cyber-risk-resources/cyber-risk-management-podcast/ ●   https://www.udemy.com/course/better-testing/ ●   https://www.certmike.com/ ●   https://thorteaches.com/ Other Relevant Episodes ●   Episode 55 - Which cybersecurity certifications should you get? ●  Episode 58 - How to Get Hired With No Experience ●  Episode 81 - How to Negotiate a Pay Raise with Edward Skipka

    EP 101: SDP 3 Economy of Mechanism

    Play Episode Listen Later Jul 21, 2023 23:58


    https://www.yourcyberpath.com/101/ In this short episode, we are back discussing the Security Design Principles, with the third principle, Economy of Mechanism. Jason and Kip explain the principle of Economy of Mechanism and how you want to apply it in your career as a cybersecurity professional without falling into the trap of overcomplicating things and most importantly, staying within the limits of your budget. You should always keep things simple and practical and focus on providing value instead of following tedious complex processes. Economy of Mechanism can be simplified in the following, “You don't want to build a $100,000 fence to protect a $1000 horse”. Context is everything here, you need to understand what you are protecting and how your protections should be relevant to that. What You'll Learn ●   What is the Economy of Mechanism? ●   What happens when you overcomplicate technical controls? ●   What are some examples of Economy of Mechanism? Relevant Websites For This Episode ●  https://www.yourcyberpath.com/ ●  https://www.udemy.com/course/irresistible-cybersecurity/ ●  https://www.yourcyberpath.com/ask/ Other Relevant Episodes ●  Episode 94 - Ten Security Design Principles (SDP) ●  Episode 96 - SDP 1: Least Privilege ●  Episode 98 - SDP 2: Psychological Acceptability

    Episode 100 - Best of YCP

    Play Episode Listen Later Jul 7, 2023 103:42


    https://www.yourcyberpath.com/100/ We're celebrating the 100th episode of Your Cyber Path podcast with a special edition episode. It's going to be a little different this time. We are going to sit back and reflect on all our 100 previous episodes and take in the things that we learned, so basically welcome to the highlight reel of the Your Cyber Path podcast! Our hosts are Kip Boyle, a cybersecurity hiring manager who started in the Air Force, and Jason Dion, who has over 20 years of experience in the defense industry, including positions at the Navy and NSA. Ayub Yusuf, also known as the WhiteCyberDuck, stresses the significance of tailoring your resume to align with the specific job requirements you are interested in. Doing so will enhance your prospects of advancing through the initial stage of the recruitment process. With the help of ChatGPT and Bard, you can take advantage of the latest AI technologies to effortlessly create resumes and streamline the task of resume making. Our next tip comes from Episode 45, with experienced hiring manager, Glenn Sorensen. Demonstrate enthusiasm and interest in your job applications. This is what hiring managers seek. Also, connect your previous roles and present a complete picture of your experience. Clip three features Ed Skipka, a favorite guest on the show, discussing how he entered cybersecurity without a background in IT. He emphasizes the importance of networking and showing a desire to learn to excel in your career. John Strand, owner of Black Hills Information Security, discusses the pay-what-you-can model in the fourth clip. He emphasizes how this model contributes to the expansion of diversity within the cybersecurity sector and how diversity, in turn, enhances the growth of cybersecurity. Ultimately, this fosters higher quality problem-solving abilities within our cybersecurity teams. After that we discuss a clip from Episode 74, Top Five Mistakes People Make When Negotiating. Negotiating for the right package can be difficult, but having more information can give you an advantage. Kip suggests that it would be a smart strategy to not disclose your salary history. Instead, you should inquire with your potential employer about the job's market value. This will equip you with valuable knowledge and give you a stronger stance to discuss your salary. The next clip discusses how to succeed in your first 90 days of a job, specifically in cybersecurity. It emphasizes the importance of programming skills in this field. Some jobs require high-end coding skills, while others do not require any coding skills at all. To determine the requirements for the positions you are interested in, research the specific roles. Our guest in the last video, Arthurine Brown, talked about her daily routine and shared some of the lessons she learned while working as a business information security officer at Altria Client Services. Arthurine works in a unique role that combines being an information security analyst with understanding how this information is used to accomplish tasks. This shows how the way we add value to businesses is changing due to fast technological advancements. What You'll Learn ●   Who are our Hosts, Kip and Jason? ●   What do hiring managers look for in a resume? And how to relate your previous experience to Cybersecurity? ●   How do I get experience If I can't get hired? ●   What is the role of Certification, Degrees, and Experience? ●    How can diversity help Cybersecurity grow? ●    How can you approach salary negotiations? ●    Is programming important in Cybersecurity? ●    How can we add business value as cybersecurity practitioners? ●    What are some things to keep in mind during your career as a cybersecurity practitioner?

    EP 99: How to use ChatGPT in your Job Search with Sean Melis

    Play Episode Listen Later Jun 23, 2023 48:01


    https://www.yourcyberpath.com/99/ In this episode, we are going over the latest trend in AI and NLP, ChatGPT, with our guest, Sean Melis, seasoned multi-modal developer and designer and the founder of bot•hello. In the beginning, Sean explains how chatbots work and the main difference between them and ChatGPT, explaining that ChatGPT leverages a huge dataset, unlike chatbots that use canned responses. However, it is worthy of mention that although ChatGPT is very beneficial and could prove useful to a lot of people, it is still a computer. It might not always understand the context or the intonation behind a question and that's the reason why it generates responses that sometimes don't make much sense. After that, Sean and Jason go over how you can use ChatGPT to tailor your resume and make it suitable for specific jobs and how you can understand and work around its limitations. In the end, Sean highlights some advice on how to use ChatGPT and encourages everyone to experiment with it as it could be very helpful to save money and time. What You'll Learn ●   What is ChatGPT? How does it work? ●    Is ChatGPT perfect? What are its limitations? ●    How can you use ChatGPT on your job hunt?  ●   What is prompt engineering? Relevant Websites For This Episode ● https://www.bothello.io/ ● https://www.udemy.com/course/chatgpt-101-supercharge-your-work-life-500-prompts-inc/ ● https://chat.openai.com/ Other Relevant Episodes ●  Episode 56 - Cybersecurity careers in the Defense sector ●  Episode 58 - How to Get Hired with No Experience ●  Episode 89 - Getting My First Job in Cybersecurity with Ayub Yusuf

    Episode 98: SDP2, Psychological Acceptability

    Play Episode Listen Later Jun 9, 2023 28:47


    https://www.yourcyberpath.com/98/ In this episode, we are back discussing Security Design Principles, and this time we are focusing on Psychological Acceptability. The Security design principles are crucial for your work as a cybersecurity professional, they will not only help you do really well, they will also help your work stand out. Psychological Acceptability is defined as “the protection mechanism should be easy to use, at least as easy as not using it” and here comes the struggle of wanting to make controls easier to use while still providing high level security. Kip mentions the term “False sense of security” which is really common in the field where you as a cybersecurity professional are under the impression that you have everything under control while in fact you are missing a lot of risks due to your workforce not psychologically accepting the high level controls put in place and trying to find workarounds to make their jobs more convenient. In the end, Jason discusses Password Managers, which is a great example of Psychological Acceptability, and how it can be one of the few controls in cybersecurity where you can increase security and productivity at the same time. What You'll Learn ●   What is Psychological Acceptability? ●   What are the challenges that come with Psychological Acceptability? ●   What is a False sense of security? And how can it be dangerous? ●    What is a good example of Psychological Acceptability? Relevant Websites For This Episode ●   https://www.udemy.com/course/irresistible-cybersecurity/ Other Relevant Episodes ●   Episode 57 - Best time of the year to get hired ●   Episode 80 - Risk Management Framework with Drew Church ●   Episode 92 - Password Managers

    security false psychological password managers acceptability risk management framework
    EP 97: Passwordless Authentication with James Azar

    Play Episode Listen Later May 26, 2023 52:51


    https://www.yourcyberpath.com/97/ In today's episode, we discuss the emerging topic of passwordless authentication with our guest James Azar, CTO and CSO of AP4 group who are well known for their work in critical infrastructure. Passwords have been here for decades, but with the ever-changing nature of the technology industry, passwords are becoming a little weak for our needs. Our hosts take the time to discuss what passwordless authentication is, how it can be implemented, and why there is a move towards passwordless. After that, they go over the issue of balancing security and user experience and making sure our customers are satisfied and provided with solutions that fix their problems without sacrificing security. Following that, they discuss some of the challenges that are associated with utilizing passwordless authentication, including different organization policies, user acceptance, and the lack of usability it could pose. James then goes on to highlight that passwordless authentication is only as good as the user, and it always goes back to the human factor - it only changes the sophistication of the attack. In the end, James highlights that the biggest decisive factor on whether an organization will move to passwordless authentication is going to be cost. What You'll Learn ●    What is passwordless authentication? And why is it relevant? ●    How is passwordless authentication implemented? ●    How to balance security and good user experience? ●    What are the challenges of using passwordless authentication? ●    What is Zero Trust? Relevant Websites For This Episode ●  https://www.udemy.com/course/irresistible-cybersecurity/ ●  https://www.cyberhubpodcast.com/ Other Relevant Episodes ●  Episode 88 - The CIA Triad – The Basis of Cybersecurity (Authentication) ●  Episode 91 - Mobile Device Security with Haseeb Awan ●  Episode 92 - Password Managers

    EP 96: SDP 1 (Least Privilege)

    Play Episode Listen Later May 12, 2023 31:01


    https://www.yourcyberpath.com/96/ In this episode, we unpack the first of the Security Design Principles, Least Privilege. If you have never heard of it before, Least Privilege is the act of giving a person the most minimal amount of privilege for them to be able to do their job. Our hosts take the time in this short episode to discuss the ups and downs of Least Privilege and why it's not utilized as widely as it should be. Then they go over how Least Privilege should be implemented at home and at work and how much it affects your personal and professional Cyber Hygiene. In the end, Jason discusses how Least Privilege can affect Software Development and the importance of setting different accesses and permissions for different users to improve your security posture. What You'll Learn ●   What is a CR-MAP? ●   What is Least Privilege? ●   What are the costs of using Least Privilege? ●   How does Least Privilege affect you as a user? ●   How can software utilize Least Privilege? Relevant Websites For This Episode ●  https://www.akylade.com/ ●  https://www.yourcyberpath.com/podcasts/ Other Relevant Episodes ●  Episode 80 - Risk Management Framework with Drew Church ●  Episode 83 - Automating NIST Risk Management Framework with Rebecca Onuskanich ●  Episode 94 - Ten Security Design Principles (SDP)

    software development risk management framework least privilege
    EP 95: The Cybersecurity Student Perspective with Sam Bodine

    Play Episode Listen Later Apr 28, 2023 44:49


    https://www.yourcyberpath.com/95/ In the beginning, our hosts Jason Dion and Kip Boyle talk a little bit about their new company Akylade, which is going to provide affordable cybersecurity training. They discuss their initial motivations to start the company, what the plan for the company is, and what's the road map for Akylade. Then, we get into the topic of our episode, introducing our guest, Samuel Bodine, a cybersecurity sophomore, and the leader of the cyber defense team at Liberty University in Virginia. Sam discusses the different aspects of the competitions they get into, where they simulate a business environment and bring in hackers to test their cyber defense team's abilities to protect said environments. Sam also mentions that one of the hugest benefits that he finds in college is networking and that you can make lots of connections that could really help you down the road. On the other hand, sometimes you just have to start from nothing as he tells the story of how he walked into Lockheed Martin with a resume asking for an internship and how he got it a week later. Jason then goes over internships, how they work, and how they can be very useful for both the company and the intern. In the end, Sam mentions his trifecta for the perfect cybersecurity advancement, which is certifications, hands on practice, and real-life job experience. When you combine these three, you can have a great holistic understanding of cybersecurity. To cap it off, Jason highlights that it is crucial to show initiative and how you need to show how much you want something and how it can help you achieve it. What You'll Learn ●   What is Akylade? ●   What is it like to be on a collegiate cyber defense team? ●   How to build your network? ●    How useful is an internship? ●    What is the trifecta of cybersecurity education? Other Relevant Episodes ●   Episode 80 - Risk Management Framework with Drew Church ●   Episode 54 - New Cohost Jason Dion ●   Episode 62 - The NIST Cybersecurity Framework

    EP 94: Ten Security Design Principles (SDP)

    Play Episode Listen Later Apr 14, 2023 33:10


    https://www.yourcyberpath.com/94/ To start off this episode, our hosts go on a short chat about ChatGPT and how it can be useful for cybersecurity professionals and job hunters. They also highlight the difference between transitional and transformational tech. Then, they get into the episode topic which is an introduction for a 10-part series that is going to come out in the following months which is Security Design Principles. Kip mentions in the beginning how these design principles are not laws, but they are very important guardrails for the safety of any system, while Jason highlights that they are best practices that every organization should aim to implement to avoid future implications. Defense in depth is like layering your protections, and it has become extremely important to do since the deperimeterization of our networks where we have devices all over the place, and not just in separate perimeters. Security Design Principles are independent of technology. They are about strategies that can be applied to guide your work in many aspects. Then, our hosts go over some simple examples of the Security Design Principles like Fail-safe Defaults and Least Privilege. In the end, you must realize that when you plan for implementations ahead of time, it is always a huge time, money, and effort-saver for you and your organization. What You'll Learn ●    Is AI going to take over jobs? ●   What certifications mention Security Design Principles? ●   What is defense in depth? ●   What is the principle of fail-safe defaults? Relevant Websites For This Episode ●   Saltzer and Schroeder's Design Principles ●   www.YourCyberPath.com

    EP 93: CyberWIDE Panel - LevelUp - InfoSec Certifications Soup

    Play Episode Listen Later Mar 31, 2023 87:52


    https://www.yourcyberpath.com/93/ In this special episode, we are going to share with you a live webinar hosted by the North Texas Information Systems Security Association. They invited our own Jason Dion and Kip Boyle for the CyberWIDE Panel's InfoSec Certification Soup to discuss careers, hiring, resumes, and of course, certifications. We begin the episode with a brief discussion of how Jason and Kip got into the world of cybersecurity, moving over to some valuable information about how you should go about starting your cyber career and how to know which career is fit for you. Jason also shares an important tip, which is to always keep your resume short and only include your most important certifications relevant to the job posting. Hiring managers will usually spend 6 to 60 seconds looking at your resume, so keep it concise and to the point, 2 pages at most. Then, Kip and Jason discuss their opinions on how important programming is for your cybersecurity career, mentioning that it might be very important for some roles while for other roles you might just need to know basic scripting. In the end, Jason and Kip go over some viewer questions and discussions, like how important soft skills are, how to show up for the interview, and how to get a mentor - highlighting that being coachable is the most important thing as your attitude will affect how beneficial mentorship is going to be for you. What You'll Learn ●    How to know if you are fit for cybersecurity ●   Are all certifications valued equally? ●   Do you need programming skills to work in cybersecurity? ●   How important are your soft skills and getting mentored? ●   How is AI going to affect cybersecurity analyst jobs? Relevant Websites For This Episode ●     AASLR: Tailor Your Resume to Get Noticed, with Kip Boyle ●     CTF Time ●     John Strand's Antisyphon Training ●     Wild West Hackin' Fest ●     SANS Cyber Diversity Academy ●     SANS VetSuccess Academy ●     Divergence Academy ●     Hack the Box ●     MetaCTF ●     SANS Holiday Hack Challenge Connect with Kip ●     https://twitter.com/KipBoyle ●     https://www.linkedin.com/in/kipboyle/ ●     Fire Doesn't Innovate by Kip Boyle   Connect with Jason ●     https://twitter.com/JasonDion ●     https://www.linkedin.com/in/jasondion/ ●     https://www.diontraining.com/home   YourCyberPath ●     https://www.yourcyberpath.com/ ●     https://www.youtube.com/@YourCyberPath/streams ●     https://www.facebook.com/YourCyberPath/   Connect with ISSA and North Texas ISSA ●     https://www.issa.org/ ●     https://www.linkedin.com/company/information-systems-security-association-issa-/ ●     https://www.ntxissa.org/ ●     https://www.linkedin.com/company/north-texas-issa/ ●     https://www.linkedin.com/company/cyberwide/ ●     https://www.linkedin.com/in/adelinamariegarcia/ ●     https://www.linkedin.com/in/richat/ Other Relevant Episodes ●   Episode 58 - How to Get Hired With No Experience ●  Episode 81 - How to Negotiate a Pay Raise with Edward Skipka ●  Episode 82 - From Truck Driver to Cybersecurity Analyst with Mike Hillman

    EP 92: Password Managers

    Play Episode Listen Later Mar 17, 2023 34:11


    https://www.yourcyberpath.com/92/ In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers. In the beginning, Jason quickly describes password managers, their use cases and how they work, highlighting both the security and convenience aspects of using a password manager. Then, Kip goes over how to choose a password manager and what criteria you should consider when choosing the best software, emphasizing that attack resistance comes first, and all other criteria comes second to it. After that, our hosts discuss the different features of different password managers, why they utilize them, and the best ways to make sure you have great security and productivity online. In the end, Jason makes some notes about paid versus free password managers and VPNs, and discusses the newest trend of passwordless authentication. What You'll Learn ●   What is a password manager? ●   How do you choose a password manager? ●   What is the difference between free password managers and paid ones? ●    What is passwordless authentication? Relevant Websites For This Episode ●  https://1password.com/ ●  https://bitwarden.com/ Other Relevant Episodes ●  Episode 40 - Security Awareness & Training ●  Episode 84 - The CIA Triad – The Basis of Cybersecurity (Confidentiality)

    EP 91: Mobile Device Security with Haseeb Awan

    Play Episode Listen Later Mar 3, 2023 38:09


    https://www.yourcyberpath.com/91/ Haseeb Awan is the Founder & CEO at EFANI Secure Mobile. In this episode, we'll hear about Haseeb's cyber path, and we'll explore some of the biggest mobile phone risks and what you can do about them. In the beginning, Haseeb tells the story of how his phone number was compromised not once, not twice, but three times, with basically the same type of attack and how that forced him into cybersecurity. Then, Kip and Haseeb go over some of the risks that mobile users can be a victim of and the ways your mobile number could be compromised from social engineering, bribery of account executives, to SIM swapping, and man-in-the-middle attacks. In the end, Haseeb finishes off by discussing how cybersecurity is growing and that cyber risk is greater than ever and that more countries and organizations are building cyber armies. What You'll Learn ●    How did Haseeb get into Cybersecurity? ●   What is SIM swapping? ●    What is an IMSI catcher? ●    What is location tracking? ●    Who should worry about their mobile security? Relevant Websites For This Episode ●   https://www.efani.com/ ●   https://www.nsogroup.com/ ●   https://www.amazon.com/This-They-Tell-World- Ends/dp/1635576059 ●   https://www.linkedin.com/in/haseebawan/ Other Relevant Episodes ●   Episode 59 - Five things to know before you get into cybersecurity ●   Episode 78 - Current State of the Cybersecurity Industry with Deidre Diamond of CyberSN

    ceo founders cybersecurity sim current state mobile devices awan haseeb imsi mobile device security deidre diamond cybersn
    EP 90: How to Get Your First Job as a Pentester with Chris Horner

    Play Episode Listen Later Feb 17, 2023 36:09


    https://www.yourcyberpath.com/90/ In this episode our host Jason Dion goes over the very exciting topic of how to get your first job as a Pentester with Chris Horner, banking expert turned Security engineer and Penetration tester and together they go through Chris's background, how he got into banking and why he made the switch to Cybersecurity. Chris discusses his transition story and how it's not the cliche zero to hero in 90 days, explaining that it took him a long time to transition where he is today, highlighting that his networking experience and soft skills were a huge aid on his job hunting journey. Jason then shares his opinion on Chris's journey highlighting many important parts, like how to deal with time limitations during your studies and how to choose the right path to start you Cyber career. Chris then shares his experience with the eJPT certification exam and how he was able to pass it, giving us examples of the training he used and how he prepared for it. Then Chris and Jason go over Chris's Job responsibilities and how he goes about every one of them, what he enjoys, what he finds tedious and what parts of the job he finds challenging. In the end Jason and Chris discuss the hiring process from two different perspectives, the hiring manager perspective and the applicant perspective discussing the different challenges that both people go through. What You'll Learn ●    How important are soft skills for someone in the cybersecurity industry? ●   How to choose the right certifications to start your pentesting career? ●   What is the eJPT test like? ●    What is it like working as a Pentester? ●    How long does it take to get your first Job in Pentesting? ●    How to fight self doubt and continue your cyber career journey? Relevant Websites For This Episode ●    https://www.offensive-security.com/labs/ ●    https://www.vulnhub.com/ ●    https://ctftime.org/ ●  https://www.linkedin.com/ in/chrismhorner/ ●  https://www.diontraining.com/courses Other Relevant Episodes ●   Episode 82 - From Truck Driver to Cybersecurity Analyst with Mike Hillman ●  Episode 79 - Mid-Career Transition Success Story with Steve McMichael ●  Episode 76 - Which Certification Roadmap Or Path Should I Use?

    EP 89: Getting My First Job in Cybersecurity with Ayub Yusuf

    Play Episode Listen Later Feb 3, 2023 30:01


    https://www.yourcyberpath.com/89/ In this episode our host, Jason, interviews Ayub (@WhiteCyberDuck) about how he got into the Cybersecurity industry This time we go over a very common case where people tend to study something in college that does not relate to Cybersecurity and then shift over to the Cyber world after graduation. Ayub mentions that you are going to have to deal with a lot of silence and rejections when applying for your first job and that it took him 134 applications to get only 5 interviews. A CTF or Capture the Flag is a special kind of information security competition. There are three common types of CTFs: Jeopardy, Attack-Defence and mixed. Those can be really useful to hone your practical skills as well as your teamwork abilities and can show your future employer that you are able of working alone as well as in a team Jason and Ayub go over resumes and how you should go about creating a master resume and then tailoring this template to suit each job application. You should always make sure to do a lot of networking and show interest in the community to be able to build a network of people who could be future employers or simply just help you throughout your cybersecurity careers. Ayub also mentions that a lot of people make the mistake of paying lots of money for very expensive boot camps when they could easily learn these skills on youtube or other free platforms. In the end You should always remember to not get frustrated especially when trying to get your first job, because it always gets easier as you progress your experience. What You'll Learn ●    What kind of CTFs should you do? ●    Should you use the same resume for all your job applications? ●    How can you make a name for yourself in the Cybersecurity world? ●    What are some examples for low cost training? Relevant Websites For This Episode ●   https://ctftime.org/ ●   https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ ●   https://www.meetup.com/topics/cybersecurity/ Other Relevant Episodes ●   Episode 61 - Skills-based Certification and Training with John Strand ●   Episode 64 - How I Got My First Cybersecurity Analyst Job with Sebastian Whiting

    EP 88: The CIA Triad - The Basis of Cybersecurity (Authentication)

    Play Episode Listen Later Jan 20, 2023 37:12


    https://www.yourcyberpath.com/88/ In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication. Authentication is always associated with passwords and how you can prove that you are who you say you are. When you hear Authentication, always have things like tokens, digital certificates, multi factor authentication or two factor authentication in mind but remember that Authentication will keep changing and evolving over the years and new ways, techniques or protocols could be introduced to the field. Jason and Kip go over the different authentication factors and how you might be asked about them, on a job interview. Then they go over different concepts and protocols like SSO, SSL, TLS and how they relate or can be used for authentication. In the End, Kip goes over password managers and what is the criteria for choosing a good password manager. What You'll Learn ●   What is Authentication and how does it look like in the real world? ●   What is Zero trust? ●   What is the difference between the different availability options? ●   What are the five factors of authentication? ●   What is SSO? Relevant Websites For This Episode ●   https://www.yourcyberpath.com/ Other Relevant Episodes ●  Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality) ●  Episode 85 - The CIA Triad - The Basis of Cybersecurity (Integrity) ●  Episode 86 - The CIA Triad - The Basis of Cybersecurity (Availability) ●  Episode 87 - The CIA Triad - The Basis of Cybersecurity (Nonrepudiation)

    EP 87: The CIA Triad - The Basis of Cybersecurity (Nonrepudiation)

    Play Episode Listen Later Jan 6, 2023 25:19


    https://www.yourcyberpath.com/87/ In the fourth video of this five-part series discussing the CIA-NA pentagram, Kips and Jason talk about nonrepudiation. In simple terms, nonrepudiation means you can't say you didn't do the thing that you did. Jason and Kip go over some examples of nonrepudiation in both the physical realm and the digital world highlighting that you should always use some type of example when you're asked about a specific term like nonrepudiation. They also dive deep into digital signatures, public keys, and how these are utilized in software companies and the reasons they are used. In the end, they discuss some hashing algorithms, how they work, and what are the best practices when using them - emphasizing that you can't have all the security and usability at the same time and you're always going to have to balance these two with each other and find something which works best for you. What You'll Learn ●   What is nonrepudiation? ●   What kinds of interview questions could you get related to repudiation? ●   What is the difference between the different availability options? ●   How can a software company provide repudiation for their code? ●   How do you calculate a hash value? Relevant Websites For This Episode ●   https://www.yourcyberpath.com/ Other Relevant Episodes ●   Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality) ●   Episode 85 - The CIA Triad - The Basis of Cybersecurity (Integrity) ●   Episode 86 - The CIA Triad - The Basis of Cybersecurity (Availability)

    EP 86: The CIA Triad - The Basis of Cybersecurity (Availability)

    Play Episode Listen Later Dec 23, 2022 42:17


    https://www.yourcyberpath.com/86/ In this episode, Kip and Jason discuss everything that makes the A in the CIA Triad, Availability. Availability is when you like to use a system and it's there ready for you to use, because no matter how secure a system is, if you cannot access it when you need to, it serves no purpose. Kip explains how the way you think about availability is also going to change depending on the industry you're in and the niche you interact with the most. Jason mentions some terms associated with availability in certification exams like redundancy, failover, business continuity, and disaster recovery, highlighting that availability is not an all or nothing pillar, because you can't always have 100% redundancy. For the third time, Jason and Kip go over some interview questions on availability to make sure you are a little more prepared for your interviews. What You'll Learn ●   Why is availability important in cybersecurity? ●   What is an impact business analysis? ●   What is the difference between the different availability options? ●   How can you prevent a DoS attack against an ecommerce website ●   How to increase power availability in an organization? Relevant Websites For This Episode ●   https://www.yourcyberpath.com/ Other Relevant Episodes ●   Episode 80 - Risk Management Framework with Drew Church ●   Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality) ●   Episode 85 - The CIA Triad - The Basis of Cybersecurity (Integrity)

    cybersecurity basis availability triad risk management framework
    EP 85: The CIA triad - The basis of cyber security (Integrity...and how these are used in our daily careers)

    Play Episode Listen Later Dec 9, 2022 40:05


    https://www.yourcyberpath.com/85/ In this episode, Kip and Jason discuss the second pillar of the CIA pentagram, Integrity.  The whole idea of integrity is making sure any entity that you interact with has not been modified after creation and exists where it needs to be.  Jason mentions how it's not always a perfect balance between all the pillars of the pentagram but depending on the real-world situation, the solution tends to lean towards one or more of the pillars.  Kip explains how digital signatures work and what are the best use cases for them, while Jason dives in deep explaining how hashes work and how to best utilize them.  Again, Kip and Jason go over some interview questions to give you an idea of what kind of questions you might encounter, and what a good answer sound like.  Jason then finalizes the episode with a great reminder to always make sure you to test restore backups every few weeks when setting up integrity and backups in your organization. What You'll Learn ●     What are some real-world examples of integrity? ●     What is hashing? and how do we use it? ●    What are digital signatures? ●    How can you verify a file's integrity? Relevant Websites For This Episode ●     www.YourCyberPath.com Other Relevant Episodes ●     Episode 62 - The NIST Cybersecurity Framework ●      Episode 84 - The CIA Triad - The Basis of Cybersecurity (Confidentiality)

    EP 84: The CIA triad - The Basis of Cyber Security (Confidentiality...and How These Are Used in Our Daily Careers)

    Play Episode Listen Later Nov 25, 2022 28:53


    https://www.yourcyberpath.com/84/ In this short episode, Jason and Kip discuss the first aspect of the CIA Triad which is Confidentiality.  They break down the critically important confidentiality point and how it works in the real world, highlighting that it's not about the information itself but more likely about where that information is in the flow.  They also mention how confidentiality is brought up in certification exams and how it's always connected to encryption.  They finish up by doing some mock interview questions about things like secure erase, encryption, and secure file transfer to simulate situations that you could face when applying for cybersecurity jobs. What You'll Learn ●    What are the three states of data? ●    What questions related to confidentiality could you meet in your certification exams? ●    What interview questions could you get on confidentiality and how to answer them perfectly? ●     What is the difference between SFTP and FTPS? Relevant Websites For This Episode ●   https://www.yourcyberpath.com/ Other Relevant Episodes ●    Episode 62 - The NIST Cybersecurity Framework ●    Episode 56 - Cybersecurity careers in the Defense sector ●   Episode 80 - Risk Management Framework with Drew Church

    EP 83: Automating NIST Risk Management Framework with Rebecca Onuskanich

    Play Episode Listen Later Nov 11, 2022 44:52


    https://www.yourcyberpath.com/83/ In this episode, we go more in depth with the NIST RMF, answering extremely important questions about the different steps of the process and the checklist mentality that can be developed when implementing RMF. Rebecca Onuskanich, CEO of the International Cyber Institute, is here to share with us some of her knowledge gained throughout her 20 years of experience with security compliance and how eMASS is used to implement RMF and its real-world adaptation. Alongside Kip, Rebecca goes over her experience with RMF discussing how different backgrounds can influence the implementation and that a lot of people will have to get over the rigid mentality of RMF in favor of a more technical, real-world, viable approach. Especially when facing the challenge of implementing RMF with different systems, including legacy systems. They also unpack eMASS, who can use it, what are the requirements to use eMASS, what are its limitations, how it helps support the process, and if there are any other ways to implement RMF, highlighting that the current direction is to emphasize resilience and survivability and always put the mission first. What You'll Learn ● How is RMF adapted in the real world? ● How to make the best use of RMF? ●     How do the NIST CSF and the RMF compare to one another? ●     What is eMASS? Relevant Websites For This Episode ●     www.YourCyberPath.com ●    www.nist.gov Other Relevant Episodes ●    Episode 80 - Risk Management Framework with Drew Church ●    Episode 62 - The NIST Cybersecurity Framework ●  Episode 56 - Cybersecurity careers in the Defense sector

    ceo defense cybersecurity automating nist rmf nist csf risk management framework
    EP 82: From Truck Driver to Cybersecurity Analyst with Mike Hillman

    Play Episode Listen Later Oct 28, 2022 36:04


    https://www.yourcyberpath.com/82/ In this episode, we get to learn about our guest's inspirational story as he went from truck driver to Cybersecurity Analyst in less than 15 months. Mike Hillman, former truck driver and current SOC Analyst, goes over his exact roadmap to transition into Cybersecurity without any previous experience, the certifications he acquired, and the courses he took. Jason and Kip share with us how hiring managers think when they are looking for a new hire, and highlight some of their tips to get hired with no experience. You will also learn that it takes more than just certifications to have a successful career in Cybersecurity. Having hands-on experience, as Mike mentions, is helpful and that if he could turn back time he would start hands-on practice from Day 1. What You'll Learn ●     Why choose Cybersecurity of all IT fields? ●     How did Mike Transition from Truck driving to Cybersecurity Analysis? ●     How to get hired with no experience? Relevant Websites For This Episode ●   https://www.stationx.net/ ●     https://www.antisyphontraining.com/soc-core-skills-w-john-strand/ Other Relevant Episodes ●     Episode 64 - How I Got My First Cybersecurity Analyst Job with Sebastian Whiting ●     Episode 59 - Five things to know before you get into Cybersecurity ●     Episode 58 - How to Get Hired With No Experience

    EP 81: How to Negotiate a Pay Raise with Ed Skipka

    Play Episode Listen Later Oct 14, 2022 46:54


    https://www.yourcyberpath.com/81/ In this episode, we listen to Kip and Ed go over how Ed managed to get a 25% pay raise in a very short period of time and the whole details of his situation. Edward Skipka, a vulnerability management analyst, goes over his experience and how he managed to double his pay in just over two and a half years. He highlights that doing your best and solving problems can take you to another level within your company. Kip mentions how some skills, like curiosity, can't be taught and that people with such skills are able to progress in their careers much faster than they think. You will also learn how important it is to leverage yourself in your current position, how to be able to not take anything personally, and how to know your value and be able to get paid what you're worth in the industry. What You'll Learn ●     Can you get into cybersecurity without a technology background? ●     How to make yourself valuable to hiring managers and recruiters ●     How to leverage your position to get paid more Relevant Websites For This Episode ●     www.YourCyberPath.com Other Relevant Episodes ●     Episode 74 - Top Five Mistakes People Make When Negotiating ●     Episode 73 - Top Five Things That Will Separate You From Other Applicants ●    Episode 58 - How to Get Hired With No Experience

    EP 80: Risk Management Framework with Drew Church

    Play Episode Listen Later Sep 30, 2022 66:26


    https://www.yourcyberpath.com/80/ In this episode, Kip and Jason, along with special guest Drew Church, take a closer look at the NIST risk management framework to help facilitate selecting the right kind of security for your system and help clarify how to direct resources towards the right controls. Drew Church, RMF expert and global security strategist at Splunk, is here to talk about the different steps of RMF, the importance of preparation work, and understanding the bigger picture of what you want your system to accomplish. They also go through the seven steps of RMF in detail: prepare, categorize, select, implement, assess, authorize, and monitor, highlighting the best procedures and ways of going about completing each step, as RMF is highly structured. They also call attention to soft skills and how invaluable they are throughout your cybersecurity career. Drew and Jason also explain different terms, including STIGS, DIKW pyramid, and POAM, and their importance while developing the RMF. Finally, they go over various tips and tricks to make sure you are ready for your assessment, like knowing what your system is going to be graded on and maybe also testing beforehand, as well as having in mind that the assessors are not going to be experts in your system.  What You'll Learn ●     What is RMF (and what it's not)? ●     Are RMF and CSF the same? ●     What are the seven steps of the RMF? ●     How important is the DIKW pyramid in RMF? ●     What is the secret to success of system assessments against RMF controls? Relevant Websites For This Episode ●     www.YourCyberPath.com ●     www.nist.gov ●   www.splunk.com Other Relevant Episodes ●     Episode 62 - The NIST Cybersecurity Framework ●     Episode 56 - Cybersecurity Careers in the Defense Sector ●    Episode 22 - Impress Us with Your Resume Skills Section

    church nist splunk csf rmf stigs risk management framework dikw
    EP 79: Mid-Career Transition Success Story with Steve McMichael

    Play Episode Listen Later Sep 16, 2022 40:56


    https://www.yourcyberpath.com/79/ In this episode, Kip and Jason are joined by Steve McMichael who has rapidly climbed the cybersecurity career ladder. Within 2 years, Steve was able to move up to the position of Director of Governance, Risk, and Compliance for a large, publicly traded company after transitioning from a position in accounting and financing. They talk about governance, risk, and compliance (GRC) and how those are applied within enterprise-level organizations. Steve also talks about how GRC is conducted at his organization and how they work across numerous departments to achieve their goals. In general, getting into a governance, risk, and compliance position can get you exposure across a large breadth of your organization. Compliance positions also give you direct access to a lot of the executives within the company, allowing you to rapidly scale upward in your career. Also, Kip discusses what skills are required of a good Chief Information Officer (CIO) and how working in a governance, risk, and compliance role can help you get to a CIO role in your career.  What You'll Learn ●     What is governance, risk, and compliance (GRC)? ●     Are GRC positions underrated? ●     How to get a job as a Chief Information Officer (CIO)? ●    ·What are some key success factors required in a GRC role? ●    ·What is digital transformation versus automation? Relevant Websites For This Episode ●     www.YourCyberPath.com ●     www.securetalkpodcast.com/moving-into-cybersecurity-industry-kip-boyle Other Relevant Episodes ●     Episode 69 - Breaking into Cybersecurity with Nancy Hunter ●     Episode 60 - Top Five Jobs to Two-Step Your Way Into the Cybersecurity Industry ●     ·Episode 35 - GRC Overview

    EP 78 : Current State of the Cybersecurity Industry with Deidre Diamond of CyberSN

    Play Episode Listen Later Sep 2, 2022 47:29


    https://www.yourcyberpath.com/podcast/78/ In this episode, Kip and Jason, with special guest Deidre Diamond from CyberSN, talk about the current state of the cybersecurity industry in regards to hiring. CyberSN is a digital platform that aims to match potential employers with skilled candidates in order to help close the cybersecurity talent gap.  Deidre Diamond, the founder of CyberSN, has spent decades as a cybersecurity staffing and leadership expert. She is a passionate advocate for building diverse, multi-talented teams, and her company works hard to match the right candidates with their dream employers.  CyberSN is a platform that allows you to create an online profile that is used to instantly match you to potential cybersecurity jobs around the world that would be a good fit for you. Currently, CyberSN has over 100,000 active cybersecurity positions available as part of their platform. CyberSN also has created a unique cybersecurity role taxonomy to identify positions based on 45 different functional roles across 10 different categories. This taxonomy helps to ensure that the right candidates are being placed against the right positions for better long-term success.  Kip, Jason, and Diedre also explore the current state of the industry after the unique situations caused by the global pandemic. As Diedre points out, she has seen a growing upward trend in new cybersecurity roles, which demonstrates that employers are adding additional cybersecurity positions to their organizations. These positions are focused on leadership and education, which is a sign of a future increase in entry-level positions, since these positions require more leadership/management and training that do higher level positions. Another interesting trend noticed by CyberSN is that the salary gap between leadership and individual contributor roles has again shrunk, leading to similar pay ranges for both types of positions. This means that employees no longer have to move into management to receive higher pay. Instead, we are currently seeing both leadership and individual contributors breaking the $200,000/year mark in terms of their compensation packages.  Finally, we will cover the concept of recruitment of individuals into different cybersecurity positions, and how the recruiters are compensated by your future employer when they place you into a role.  What You'll Learn ●    What kind of job roles exist in cybersecurity? ●    What is the average salary for various cybersecurity roles? ●   How do recruiters get compensated for placing you into a position? Relevant Websites For This Episode: ●    www.YourCyberPath.com ●   www.cybersn.com Other Relevant Episodes ●    Episode 60 - Top five jobs to two step your way into the cybersecurity industry ●   Episode 32 – Cybersecurity Service Catalog & Your Dream Job ●    Episode 13 - Landing Your Dream Cybersecurity Job 

    cybersecurity current state diedre your dream job deidre diamond cybersn
    EP 77: Get Into the Talent Pipeline With Max Shuftan and Winnie Yung

    Play Episode Listen Later Aug 19, 2022 40:11


    https://www.yourcyberpath.com/podcast/77/ In this episode, Kip and Jason, with special guests Max Shuftan and Winnie Yung, talk about what a talent pipeline is and why hiring managers should be using a solid talent pipeline in order to bring in new people into the cybersecurity industry to meet their staffing needs.  Max Shuftan, director of Mission Programs and Partnerships at the SANS institute, is here to talk about how their organization helps people get into cybersecurity through the use of their talent pipeline. Our other guest, Winnie Yung, is a graduate of SANS Institute's Diversity Cyber Academy who has now broken into the cybersecurity industry.  A talent pipeline is used to take somebody, either “off the street” or with little/lower skill levels, and then develops those people's skills for a particular position. Once the person gains an initial foothold into the cybersecurity industry, they can then continue to build their skills and move upward to other higher level positions.  These talent pipelines may exist within a single company or organization, such as how the military implements their talent pipelines, or those talent pipelines can be spread across multiple organizations using external training as part of their overall talent pipeline.  Talent pipelines often help give the worker the skills they need to be able to move forward either at the place they are already working at, or it can help them land a position with a new company once they have gained the required skills.  What You'll Learn ●   What is a talent pipeline? ●    How do you get into a talent pipeline? ●    How to network while in a talent pipeline? Relevant Websites For This Episode: ●    www.YourCyberPath.com ●   www.sans.org ●   www.sans.org/scholarship-academies/diversity-academy/ Other Relevant Episodes ●   Episode 70 - How Can the Same Cybersecurity Job Be So Different Depending on Who You Work For  ●   Episode 69 – Breaking into Cybersecurity with Nancy Hunter ●    Episode 61 - Skills-based Certification and Training with John Strand 

    EP 76: Which Certification Roadmap or Path Should I Use?

    Play Episode Listen Later Aug 5, 2022 24:54


    https://www.yourcyberpath.com/podcast/76/ In this episode of Your Cyber Path, Kip and Jason discuss the world of cybersecurity certifications and how you can determine the proper path for you to follow. We bust the myth that the Security Certification Roadmap by Paul Jerimy is a proper roadmap from left to right to follow…but it isn't! A certification roadmap or pathway should be something that allows you to outline the skills and certifications you will need in your career for the next few years. A roadmap gives you a plan to follow and allows you to not try and “collect them all” when it comes to certifications. After all, certifications are expensive, and you don't need to collect them like Pokémon cards. Jason personally prefers the CompTIA Certs Roadmap, which presents the roadmap based on 5 different jobs within cybersecurity. This will allow you to pick a position, such as cybersecurity analyst, and then it will outline which certifications you should take. Note, this isn't just CompTIA certifications, but they also include competitor certifications that are applicable to the career and positions you are working towards. Remember, when it comes to certifications, you don't need 20 or 30 of them to be competitive, but instead you need 3-5 key certifications based on the job role you are trying to fulfill in the marketplace. For example, if you want to be a cybersecurity analyst, you should only have a handful of certifications, such as CompTIA Network+ or CCNA, CompTIA Security+, CompTIA Cybersecurity Analyst+, and ITIL 4 Foundation. With these 4-5 certifications, you would be well qualified to join a Security Operations Center as a cybersecurity analyst. By having these certifications under your belt, you will have a better chance of getting through the HR job filtering process, landing an interview, and then impressing the hiring manager with your knowledge and skills. In addition to all of that, you will be much better prepared to do value added work in a large SOC on day 1, too, because you have the foundational knowledge needed to succeed! What You'll Learn ●     How to determine which certifications you should earn ●    How to create a roadmap for your future career ●     Where to find data on which certifications employers are asking for ●     How to use certification roadmaps Relevant Websites For This Episode: ●    www.YourCyberPath.com ●   www.CyberSeek.org ●   CompTIA IT Certification Roadmap ●   Paul Jerimy's Security Certification Progression Chart Other Relevant Episodes ●   Episode 55 - Which cybersecurity certifications should you get?

    EP 75: The Value of University Degrees in Cybersecurity

    Play Episode Listen Later Jul 22, 2022 32:22


    https://www.yourcyberpath.com/podcast/75/ In this episode, Kip and Jason talk about the value of university degrees in the cybersecurity career. This topic does come up all the time in discussions or when people come up to Kip or Jason and ask them the same thing. And there really is no single answer that would fit everyone because a degree can either hurt or help, depending on the context. Some people ask whether certifications are better than degrees and vice versa, or whether they need a degree or not. But it really depends on what job it is you are trying to get, which sector this job belongs to, and where in the world you are located. Some have even made the mistake of "over-degreeing" and have become the proverbial "guy with more degrees than a thermometer", which some hiring managers also avoid. A prevailing frame of thought in the US, as well as in most countries, is that a college degree will be a "ticket" to get you places. In cybersecurity, this is not a true thing because no such guarantee exists.  What You'll Learn ●     Where is the value in a college degree ●     Where is a college degree important ●     What type of positions are important ●     Where do you hit a level that needs a degree to get to the next step Relevant Websites For This Episode: ●     www.YourCyberPath.com Other Relevant Episodes ●   Episode 55 – Which cybersecurity certifications should you get? ●   Episode 58 - How to Get Hired With No Experience ●   Episode 73 - Top Five Things That Will Separate You From Other Applicants

    EP 74: Top Five Mistakes People Make When Negotiating

    Play Episode Listen Later Jul 8, 2022 44:56


    https://www.yourcyberpath.com/74/ In this episode, the discussion between Kip and Jason is about the top five mistakes people are making when it comes to negotiating their pay. You need to know what mistakes to avoid when discussing your compensation because it can set you up for a bad experience and affect you for years. When you start a new position, this is usually when you can take advantage of negotiating your salary. It is important to note that when it comes to annual raises, the likelihood of you receiving a high percentage pay raise isn't likely. That is why negotiating your pay from the beginning is your best bet. While June and July are traditionally not considered hiring season, in the US and Canada, this week's topic is good preparation for the coming fall when hiring may start to pick back up and you are applying and negotiating your pay. What You'll Learn ●     Why salary information from publicly available sources are not reliable ●     Who should throw out the number first ●       Why you shouldn't tell your prospective employer your current salary ●       Why you should factor in the whole compensation package ●      Why you don't immediately accept the first number thrown out Relevant Websites For This Episode ●     www.YourCyberPath.com Other Relevant Episodes ●    Episode 14 – Your Salary is Off-Limits ●    Episode 49 - Why Entry Level Jobs Aren't Really Entry Level ●    Episode 57 - Best time of the year to get hired 

    EP 73: Top Five Things That Will Separate You From Other Applicants

    Play Episode Listen Later Jun 24, 2022 36:27


    https://www.yourcyberpath.com/73/ In this episode, the discussion between Kip and Jason is about the top five things that will make you stand out from other applicants. These tips will definitely help you get ahead of the pack and have an edge in your job application. In your job hunting, you want to be an irresistible candidate from the hiring manager's perspective. These top five things will separate you from other applicants. These will make the hiring manager want to have you on their team. What You'll Learn ●     Why who you know matters ●     Why you need soft skills/people skills ●     Why it is important to have practical experience ●     Why solving real-world problems will help ●     Which technical skills/profiles will make you stand out Relevant Websites For This Episode ●     www.YourCyberPath.com ●     www.DionTraining.com Other Relevant Episodes ●     Episode 22 - Impress Us with Your Resume Skills Section ●     Episode 28 - Five Principles to Help You Get Your Dream Cybersecurity Job ●     Episode 66 - How to be Irresistible to Hiring Managers

    EP 72: DISC Profiles

    Play Episode Listen Later Jun 10, 2022 35:49


    https://www.yourcyberpath.com/72/ In this episode, the discussion between Kip and Jason is about DISC profiles. You need to understand how important it is to choose the right job for you based on your personality. These are some of the questions you might want to ponder to help you decide what you want. Do you like to interact with people throughout the day? Do you just want to sit in front of your computer and be left alone all day long? Are you a team player? Do you get tired of talking to people?  A Dominance Influence Steadiness Compliance personality test is what you need to take to understand what type of personality you have, and what kind of job would work for you. Kip and Jason discuss the details of each profile and how they play in an organization. What You'll Learn ●     Why is it important to think through what job suits your personality ●     What are some of the useful questions I can ask myself ●     What does DISC stand for ●     How do these varied personalities play in the organization I belong to Relevant Websites For This Episode ●     www.YourCyberPath.com ●     Disc Personality Test Other Relevant Episodes ●     Episode 21 - Your Reputation Matters to Us ●     Episode 25 - Evaluating Team Fit and Shared Direction ●     Episode 30 - A Cybersecurity Job That Fits You Like A Glove

    EP 71: What Does a Cybersecurity Hiring Manager Really Want From You on Day 1?

    Play Episode Listen Later May 27, 2022 30:54


    https://www.yourcyberpath.com/71/ In this episode, we are focused on how to make a good impression on your first day at work. Kip and Jason talk about what you can do to impress the organization that you will be working with. Show the hiring manager who you are while on the job and make a good impression. Know that it's not just your people skills that matter, but also your professionalism, like showing up on time, dressing appropriately, being courteous, and being friendly to everyone. Demonstrate your technical skills and be results-driven. Know where to look and be self-sufficient. Kip and Jason also discuss how people work in cybersecurity; that people might be working more with technology instead of working with the people in the team. Listen to what they say about this. What You'll Learn ●     How to make a good impression on day one ●     Why professionalism is important ●     What other things to know aside from professionalism ●     How to function when working with a team Relevant Websites For This Episode ●     www.YourCyberPath.com Other Relevant Episodes ●     Episode 39 - It All Begins with Policy ●     Episode 49 - Why Entry Level Jobs Aren't Entry Level ●     Episode 66 - How to be Irresistible to Hiring Managers

    EP 70: How Can The Same Cybersecurity Job Be So Different Depending On Who You Work For?

    Play Episode Listen Later May 13, 2022 38:32


    https://www.yourcyberpath.com/70/ In this episode, we are focused on job titles. It is important to know the job you are doing, but the job title doesn't really matter that much. Do realize that there's not just one type of cybersecurity job out there. Even if you know the job by title, it doesn't mean that it is any different from another cybersecurity job. If you are keen on details, you will know what the differences are between job titles. Kip and Jason talk about five cybersecurity positions so that you will be able to identify how they are different from each other. The discussion includes various keywords to look out for, basic requirements and experience required for the job title, as well as company background to keep an eye out for. Job titles mean everything. Job titles mean nothing. ~Kip What You'll Learn ●      Why are job titles important ●      Why do you have to be keen on job descriptions ●      What are the basic requirements and experience to look out for ●      Why is it important to know how large the organization is Relevant Websites For This Episode ●      www.YourCyberpath.com ●      www.LinkedIn.com

    EP 69: Breaking into Cybersecurity with Nancy Hunter

    Play Episode Listen Later Apr 29, 2022 40:26


    https://www.yourcyberpath.com/69/ In this episode, the focus of discussion is what Nancy Hunter, the Vice President, Chief Information Officer, and Data Privacy Officer of the Federal Reserve Bank of Philadelphia looks for in a cybersecurity job seeker at the entry level. According to her, there are transferable skills and personality traits that they find relevant that a job seeker must have. The discussion also includes what traits and experience to look up to in a mentor, where to look for a job at entry level and several affiliates that you can work with who can share transferable skills that will be relevant to your cybersecurity job   What You'll Learn ●       What skills do small to medium companies look for at entry level ●       What transferable skills and personality traits are relevant to your cybersecurity job ●       What to look for in a mentor ●       Why is it important to have a mentor Relevant Websites For This Episode ●       Your Cyber Path (https://www.yourcyberpath.com/) Other Relevant Episodes ●       Episode 22 - Impress Us with Your Resume Skills Section ●      Episode 25 - Five Principles to Help You Get Your Dream Cybersecurity Job ●  Episode 35 - GRC Overview

    EP 68: Can You Demonstrate Too Much Passion for Cybersecurity?

    Play Episode Listen Later Apr 15, 2022 33:53


    https://www.yourcyberpath.com/68 In this episode, Jason and Kip are focused on how you can demonstrate true passion for cybersecurity. They discuss the six things that you must avoid as they are considered red flags by a hiring manager. These red flags must be avoided at all costs, otherwise they will instantly land you in a hiring manager's “reject” pile. Don't tell me about all the organizations you've hacked beforeDon't tell me what you think I want to hearStating you have experience or certifications that you don't havePretending to be someone you are not to try and fit inDon't pretend you have never failed at somethingDon't describe cybersecurity as an absolute must have at all cost function in a company Make sure you avoid doing these six things during your next interview, because hiring managers are listening to see if you fall into any of these common traps. What You'll Learn ●     What not to say or do during an interview ●     What questions hiring managers ask to know if you are being honest or not ●     How hiring managers know if you are indeed certified or have the training you say you do Relevant Websites For This Episode ●     www.YourCyberPath.com Other Relevant Episodes ●     Episode 21 - Your Reputation Matters to Us ●     Episode 25 - Evaluating Team Fit and Shared Direction ●     Episode 30 - A Cybersecurity Job That Fits You Like A Glove

    EP 67: Why Location Matters When Looking for Your First Cybersecurity Role

    Play Episode Listen Later Apr 1, 2022 43:37


    https://www.yourcyberpath.com/67 In this episode, we are focused on what the real world looks like in cybersecurity supply and demand and the role of geography and location when looking for a cybersecurity job. Jason Dion will walk us through cyberseek.org for a cybersecurity job. He will discuss how to explore the heatmap of the site so that you will understand why you need to consider the location, given data about a certain position, and even certifications when hunting for a job. For those who don't want to relocate but would want to be hired, Jason also advised how to figure out first what kind of company you want to join. He mentioned three company dynamics that you might need to consider - remote only, remote-first company, and remote eligible. He and Kip will then discuss the differences between the three. What You'll Learn ●     Why take advantage of cyberseek.org when job hunting ●     How to use the heatmap ●     What data is available in the heatmap ●     Which certifications are most relevant to cybersecurity Relevant Websites For This Episode ●     www.CyberSeek.org ●     www.YourCyberPath.com Other Relevant Episodes ●     Episode 16 - Cybersecurity Jobs and Covid-19 ●     Episode 18 - Cybersecurity Job Market During Covid-19 Quarantine ●     Episode 49 - Why Entry Level Jobs Aren't Really Entry Level

    EP 66: How to Be Irresistible to Hiring Managers

    Play Episode Listen Later Mar 18, 2022 42529:58


    https://www.yourcyberpath.com/66 In this episode, we are focused on how to make yourself into an irresistible candidate for hiring managers. Today, Naomi Buckwalter, another hiring manager, joins Kip and Jason. What do hiring managers really look for candidates? What makes them irresistible to hire? All the hiring managers in this episode are saying that soft skills, aptitude, and integrity matter. Hence, to be irresistible, you should be the person you have written on your resume. Experience is also important. If you want to be a penetration tester, then you need to collect some experience (either paid or unpaid) in this field so that a hiring manager will take a chance on bringing you onto their team. From day one, you need to bring value to the company through your existing knowledge and experience, which is why hiring managers primarily value your past experience.  What You'll Learn ●     What qualities hiring managers are looking for ●     What soft skills are ●     How important integrity is in the hiring process Relevant Websites For This Episode ●     www.YourCyberPath.com Other Relevant Episodes ●     Episode 19 - Fascinate Us with Your Resume Summary Statement ●     Episode 21 - Your Reputation Matters to Us ●     Episode 25 - Evaluating Team Fit & Direction

    Claim Your Cyber Path: How to Get Your Dream Cybersecurity Job

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel