Sign up for Career Mentoring

Lesley Carhart's Cybersecurity Blog

[Public Universal Cyber-Pal]

  • Home
  • GIAC Test Advice
  • InfoSec Careers & Education
  • SOC & IR
  • DFIR
  • OT / ICS
  • PancakesCon
  • About Lesley
  • ask lesley

    Ask Lesley InfoSec Advice Column: 2017-03-16

    Published by

    hacks4pancakes

    on

    March 17, 2017

    This week, I address some burning questions about education and training.  As always, submit your problems here!   Dear Lesley, Let’s cut to the chase. I hate coding. I don’t enjoy building things from scratch. I do, however, love taking things apart, and would probably be able to learn to…

    Continue reading →: Ask Lesley InfoSec Advice Column: 2017-03-16
  • security operations

    Phishing Exercises, without the “Ish”

    Published by

    hacks4pancakes

    on

    March 1, 2017
    Phishing Exercises, without the “Ish”

    Much like open offices and outsourcing in business, information security is subject to trends. One you probably saw in your vendor spam folder over the past couple of years is phishing awareness exercises. The premise sounds simple – phish your employees before the bad guys do, monitor how they respond,…

    Continue reading →: Phishing Exercises, without the “Ish”
  • ask lesley, infosec

    Ask Lesley InfoSec Advice Column: 2017-02-26

    Published by

    hacks4pancakes

    on

    February 27, 2017

    This week, we discuss red team and blue team self-study, getting kids interested in security, and security paranoia. As always, submit your problems here! Dear Lesley, I am a threat intelligence analyst who is currently underutilized in my current job, and feel like my skills and tradecraft are slipping because…

    Continue reading →: Ask Lesley InfoSec Advice Column: 2017-02-26
  • hacking, infosec

    Is Digital Privacy a Privilege Of The Wealthy?

    Published by

    hacks4pancakes

    on

    February 8, 2017
    Is Digital Privacy a Privilege Of The Wealthy?

    Through a series of eight scenarios, I’ve invited seven security and digital privacy professionals to weigh in on the fundamental question of how much of a privilege digital privacy, and the abilities to “restrict” or “remove” our digital footprint, really are.

    Continue reading →: Is Digital Privacy a Privilege Of The Wealthy?
  • infosec, security education

    Lesley on SheNomads Podcast

    Published by

    hacks4pancakes

    on

    February 8, 2017

    I had a absolutely fabulous time chatting with fellow Chicagoan @HashtagLaToya (of shenomads.com) about information security careers, OPSEC, the Chicago security community, and the accuracy of the Mr. Robot TV show. I highly recommend checking out her outreach and education work!

    Continue reading →: Lesley on SheNomads Podcast
  • ask lesley, infosec

    Ask Lesley InfoSec Advice Column: 2017-01-30

    Published by

    hacks4pancakes

    on

    January 30, 2017

    Thanks for another wonderful week of submissions to my “Ask Lesley” advice form. Today, we’ll discuss digital forensics methodology, security awareness, career paths, and hostile workplaces.   Dear Lesley, I’m a recent female college graduate that didn’t study computer science but is working in technical support at a software company.…

    Continue reading →: Ask Lesley InfoSec Advice Column: 2017-01-30
  • infosec, osint

    Thwart my OSINT Efforts while Binging TV!

    Published by

    hacks4pancakes

    on

    January 25, 2017
    Thwart my OSINT Efforts while Binging TV!

    There’s been a bit of a social media uproar recently about the data collection practices of people search service FamilyTreeNow. However, it’s certainly not the first, only, (or last) service to provide potentially uncomfortable private information about people on the internet without their knowledge or consent. Even the most technologically…

    Continue reading →: Thwart my OSINT Efforts while Binging TV!
  • ask lesley, infosec

    Ask Lesley InfoSec Advice Column: 2017-01-19

    Published by

    hacks4pancakes

    on

    January 19, 2017

    Thanks for your interesting question submissions to “Ask Lesley”! This column will repeat, on no specific schedule, when I receive interesting questions that are applicable to multiple people. See further details or submit a question, here. Without further ado, today we have OS debates, management communication issues, nation state actors,…

    Continue reading →: Ask Lesley InfoSec Advice Column: 2017-01-19
  • infosec

    How do security professionals study threat actors, & why do we do it?

    Published by

    hacks4pancakes

    on

    December 12, 2016
    How do security professionals study threat actors, & why do we do it?

    I receive a lot of great questions about my work in Digital Forensics and Incident Response (DFIR), and while I’ve written a bit on the topic of threat actors and attribution, I’ve been repeatedly asked some interesting questions about this in specific. In the interest of not answering the same…

    Continue reading →: How do security professionals study threat actors, & why do we do it?
  • infosec, security education

    Lesley on Cigital’s Silver Bullet Podcast

    Published by

    hacks4pancakes

    on

    December 1, 2016

    Listen as Gary and Lesley discuss incident response, digital forensics, security engineering, security certifications, and more. Source: Show 128: Lesley Carhart Discusses Incident Response and Digital Forensics | Cigital

    Continue reading →: Lesley on Cigital’s Silver Bullet Podcast
Previous Page Next Page

Hello,

I’m Lesley, aka Hacks4Pancakes

Nice to meet you. I’m a long-time digital forensics and incident response professional, specializing in industrial control and critical infrastructure environments. I teach, lecture, speak, and write about cybersecurity.

I’m from Chicago, living in Melbourne.

Follow Me on Social!

  • Bluesky
  • LinkedIn
  • Instagram
  • Threads
  • Mastodon
  • Reddit

ai career careers certification cfp challenge coins conferences cybersecurity cybersecurity careers dfir digital forensics education featured ff giac hacking health and wellness ics incident response information security infosec infosec education iot management mastodon mentoring nation state attacks off topic osint phishing podcast privacy security security education security operations self study social media talks technology threat attribution threat intelligence university video volatility women in tech

Recent posts

  • Podcast – GirlsTalkCyber – Episode 24

    Podcast – GirlsTalkCyber – Episode 24

  • Smashing Security – 449: How to scam someone in seven days

    Smashing Security – 449: How to scam someone in seven days

  • My Top 5 Recommendations on OT Cybersecurity Student Upskilling

    My Top 5 Recommendations on OT Cybersecurity Student Upskilling

  • Destination Cyber Podcast on OT

    Destination Cyber Podcast on OT

  • Reasonable Expectations for Cybersecurity Mentees

    Reasonable Expectations for Cybersecurity Mentees

  • The Top 10 Things I’d Like to See in University OT Cybersecurity Curriculum (2025 Edition)

    The Top 10 Things I’d Like to See in University OT Cybersecurity Curriculum (2025 Edition)

Join the fun!

Stay up-to-date with my recent posts, podcasts, and blogs!

Copyright Lesley Carhart, 2025

Content Credit & Legal

Create a website or blog at WordPress.com

  • Subscribe Subscribed
    • Lesley Carhart's Cybersecurity Blog
    • Join 512 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Lesley Carhart's Cybersecurity Blog
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar

Notifications