-
Continue reading →: Starting an InfoSec Career – The Megamix – Chapters 1-3
Even once a person realizes he or she has a passion for information security, moving in the field can seem a daunting task. The education market is oversaturated with degrees, certifications, and training programs. Meanwhile, many prominent hackers mock those programs publicly. Although I’ve touched on security education and training…
-
How to become a hacker… now with 80% more pictures.
Published by
on
Continue reading →: How to become a hacker… now with 80% more pictures.Around con time, I’m frequently asked ‘how to become a computer hacker’. Since it’s a delightfully non-specific question, I have decided to illustrate my response for posterity: The most critical things when getting into infosec are the right attitude, curiosity, and interest, a solid foundation of technical knowledge, and the…
-
Continue reading →: Community
One of my friends commented today as the infosec community broke into another quabble that, If nothing else, today we learned how fragile the InfoSec community is. — Robert Olson (@NerdProf) September 9, 2015 Okay. Let’s step back for a moment. Disagree or agree with me, but kindly let me…
-
Continue reading →: Better GIAC Testing with Pancakes
It’s no secret that as well as being a SANS instructor myself, I’m a long-time fan of SANS and their associated GIAC infosec certifications. Some certifications aren’t worth a ton of credibility in the information security arena, but the SANS training and testing mechanisms really do ensure that students have…
-
Continue reading →: Gen Con 2015 – A Big “Thank You!” from Us to You!Wow! I can’t believe Gen Con is already over. We had an amazing time at the con and giving our Hacking in Fiction panel for 43 lovely people on Thursday night. I want to extend a big thanks to my co-speakers, Johnny and Beltface. We ended up going over our…
-
Continue reading →: Gen Con 2015 Preview – Hacking in Media: The Good, The Bad, and The Ugly (2015 Edition)
It’s almost that time again! Johnny Xmas, Beltface, and myself will be returning next week to Gen Con 2015 in Indianapolis (under the Circle City Con flag) to begin the yearly rotation of our panel on the state of hacking in fiction. Something I hear repeatedly mourned by infosec professionals…
-
Continue reading →: The Gamemaster’s Guide to Incident ResponseI had the honor and pleasure of being asked to teach a four hour incident response class at last month’s Circle City Con in Indianapolis, IN (you can watch a recording, here). The subject was preestablished based on attendee interest: building an incident response program in small, medium, and large…
-
Continue reading →: What is ‘DFIR’? And how do ‘Digital Forensics’ roles vary?I had a discussion today with a particular charming infosec pop star about what differentiates ‘DFIR‘ from other infosec job roles and how it relates to them. This is a question I get asked a lot by ladies and gents interested in making a jump into information security careers, so…
-
Continue reading →: Lesley’s Rules of SOC. I tweeted these out of frustration quite some time ago and I’ve since been repeatedly asked for a blog post condensing and elaborating on them. So, without further ado, here are Lesley’s Rules of SOC, in their unabridged form.




