Creating Community for Female Security Practitioners with Larci Robertson

Creating Community for Female Security Practitioners with Larci Robertson

Larci Robertson, Sales Engineer at Cyberreason and Board President of Women of Security, brings her expertise and experience in cyber threat analysis, community building, and networking to the pod this week. Larci talks about her time in the Navy, her desire for female friends, and how the combination of those two things led to her joining Women of Security (WoSec). In this episode, Larci walks through the importance of women-led cyber spaces and how mentoring gives back to the community in a ripple effect.

Timecoded Guide:

[00:00] Searching for friendship in Women of Security spaces

[06:56] Diving into the Dallas cyber community with WoSec

[14:00] Finding mission-focused purpose in threat intelligence analysis

[17:57] Transitioning from the military into security and technology

[24:10] Encouraging women to stay motivated in the cyber industry

Sponsor Links:

Thank you to our sponsor Axonius for bringing this episode to life!

The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley

How did you get introduced to Women of Security?

After leaving the Navy and moving to Dallas, Larci struggled to find community amongst other women in tech. She worried the women she knew outside of the industry wouldn’t understand her unique struggles, but the women she was meeting in cyber felt few and far between. Reaching out to Women of Security felt like an encounter with destiny, which inspired Larci to start her own WoSec chapter in Plano and find her voice as a community leader.

“I wanted to find those women and get more women into security, but also have somebody to hang out with that was in the same industry, same page, we're all kind of going at the same pulse of what we've got going on in our lives.”

What are the challenges for women transitioning into the technology field, whether they're coming from the military or from another industry?

As a woman in threat defense analysis, Larci understands the hurdles and complications that come with transitioning into the field. Originally gaining her security experience in the Navy, Larci explains that she, along with many women she meets in the industry, undermine their past experiences and doubt their full potential. This often leads to less job applications from women when positions open up, perpetuating the gap for women in tech.

“I want to tell women, and I do tell them all the time, don't look at that job title. Read through the actual like, what they want you to do, and maybe you understand it in a different way. Don't worry about that stuff. Let them tell you you're not qualified, don't do it to yourself.”

What comes to the top of your mind about the power of community when thinking about WoSec?

Community inspired Larci to be a part of WoSec, but it also left a lasting impact on her friends and her family. Not only has Larci witnessed many female friends achieve career heights they never dreamed possible, she’s also seen Women of Security inspire her own daughter. Initially believing her job was “too technical,” Larci’s daughter now better understands her own potential to succeed in cyber and tech, which has given her so much confidence in her future.

“I'm seeing people get their first jobs in cybersecurity, and it's really exciting. And then, they'll turn around and help somebody else. I feel like that's happening a lot more. I see it because my group is doing it, I think we're all emulating each other in that way.”

For any women listening right now, what would be that piece of advice that you have for them to keep them energized while they're in the field?

Money is a motivator for many individuals transitioning into the cyber industry. While Larci understands why she meets many women looking to make more money in cyber, she also encourages those women— and anyone else listening to this week’s show— to find a purpose and passion for their work. Money motivation doesn’t last forever, and Larci wants to build a community of women who understand and enjoy their purpose in tech.

“I feel like no matter what you do, if you have purpose in what you're doing, you're going to stay and you're going to have that drive. On top of that, you gotta have fun with this. If you're not having fun at what you're doing every day, I think you're doing it wrong.”

---------------

Links:

Keep up with our guest Larci Robertson on LinkedIn and Twitter

Learn more about Cyberreason on LinkedIn and the Cyberreason website

Connect with Ron Eddings on LinkedIn and Twitter

Connect with Chris Cochran on LinkedIn and Twitter

Purchase a HVS t-shirt at our shop

Continue the conversation by joining our Discord

Check out Hacker Valley Media and Hacker Valley Studio

Jaksot(409)

QuickQ: What is Social Networking? Hacker Summer Camp FOMO

QuickQ: What is Social Networking? Hacker Summer Camp FOMO

In this episode of Hacker Valley, Chris and Ron tackle a quick question. The question of the day is, “what is social networking?” Together they discuss different aspects of social media and how it facilitates connections and careers. Ron’s perspective is that social networking empowers folks to find like minded people, learn new things, self advocate and learn about others. Chris shares how social networking on LinkedIn put him in a position to build a community in cybersecurity. Timecodes 01:53 - The difference between networking and social networking and polishing profiles. 04:00 - How Ron engages with social networking mindfully. 06:30 - How LinkedIn helped Chris and Ron find their community. 08:46 - How social networks can elevate cybersecurity practitioners, researchers and businesses. 10:00 - Threat intelligence, open source intelligence and finding family on social networks 13:00 - Perspectives on the future of social networks and digital interaction. 15:45 - Making the most of social networks   Links Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon

8 Elo 202117min

Episode 160 - Creating Valuable Tech Content with Ken Underhill

Episode 160 - Creating Valuable Tech Content with Ken Underhill

Ken Underhill is an award-winning cyber security executive, entrepreneur, and teacher. His mission is to help others find their value and share it; ultimately leading to success both professionally and personally. Ken’s courses offer an intuitive approach to help start a career in cyber security. Whether you’re a budding cyber security professional or a seasoned veteran, Ken’s perspective can serve a purpose in your life.  Join Ron, Chris and Ken to dive into what it takes to create content, help others, and thrive in your career!   01:30 Guest Intro 02:14 Bio  11:30 Ken’s journey in content creation 13:22 Why focusing on giving value first matters 16:15 Ken’s future plan for content 23:50 The path to making an impact 29:40 Connecting with your audience 37:58 Get in touch with Ken    Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Ken Underhill: Courses | YouTube | Website | LinkedIn  Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs

4 Elo 202139min

QuickQ: What is Threat Hunting?

QuickQ: What is Threat Hunting?

In this episode of Hacker Valley, Chris and Ron are joined by a familiar friend, Valentina Palacín, who you might have heard on HVS Blue season 1. Valentina is an author, public speaker, self-taught developer, and Threat Operations lead at Marqeta Incorporated, armed with a background in translation and interpretation.  Join Chris, Ron and Valentina for this round-table masterclass in all things Threat Hunting to discuss the questions you may be asking yourself: What is Threat Hunting? How do you become a Threat Hunter? What’s it like to be in the shoes of a Threat Hunter? Or work with one?    Key Takeaways:   0:00 Welcome to the podcast! 1:10 Introduction/ Bio 2:55 What is Threat Hunting? 5:25 Chris’ take on working with a Threat Hunter (Ron) 7:08 Valentina’s Threat Hunting flow 9:18 Ron and Valentina talk about progressions in Threat Intelligence 12:20 The group talks about the ideal characteristics of a Threat Hunter in both junior and senior level positions 18:00 How to get into Threat Hunting 20:55 Get in touch with Valentina!   Valentina Palacín: Book | LinkedIn | Twitter Hacker Valley Studio: Swag | LinkedIn | Twitter | Instagram | Email Ron & Chris | Website Support Hacker Valley Studio on Patreon. Join our monthly mastermind group via Patreon

30 Heinä 202122min

Episode 158 - Wild Adventures with Chef Bri Van Scotter

Episode 158 - Wild Adventures with Chef Bri Van Scotter

In this episode, Chris, Ron, and their special guest going to be talking about your table. Not the table itself, but what is on it. They are talking about food and following our passions. They've brought in Bri Van Scotter, professional Chef, author, hunter, and host of the TV series Wilderness to Table. Bri is so unbelievably talented in so many areas. Everyone is going to love this episode and learn a little bit about the food we eat.    Key Moments 00:56 - Intro to Bri 02:41 - Bri’s Background 03:59 - The darker side of food production 04:57 - The hunt begins 06:13 - For the love of food 11:41 - On going deep with your craft 16:10 - Getting more in touch with your food 21:33 -  Eating for Health 22:52 - Honoring our food sources 25:28 - Knowledge is power   Visit Bri at her website Follow Bri on Instagram Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram Join our monthly mastermind group via Patreon Visit our friends and sponsor Panther Labs

28 Heinä 202127min

QuickQ: What is Security Architecture?

QuickQ: What is Security Architecture?

Ron and Chris are the hosts and guests for this episode! This episode answers fundamental questions about Security Architecture. Learning about security architecture is absolutely essential for anyone on the path of becoming a cyber security expert just looking to learn more about a cybersecurity topic. Security Architecture is the foundation, the fabric and the process used to help secure your data, your privacy, and even your money. Now for a second, Imagine that you are an architect and your biggest strength is your ability to build banks. And a new client reaches out to you... We'll name this client Ray. And Ray asks you to build his company a new bank with all the bells and whistles. You're going to need to build Ray and his company something spectacular! This bank you build is going to need to serve as an office and boost productivity for the bank staff. The bank is also going to serve as a place where customers can deposit and withdraw money. But most importantly, Ray is going to want you to protect his crown jewel, his money! (Think of all those gold bricks and bars that Ray is going to want to keep under his possession )   Key Takeaways: 0:00 - Welcome back to the Hacker Valley Studio 1:10 - Ron's favorite topic! Security Architecture 1:45 - Security architecture is the foundation  2:21 - Where a security architecture starts and stops 4:00 - A security architect is playing a game of Tower Defense 6:27 - Using EASY Framework as a security architect 10:04 - Prerequisites for becoming a security architect 13:55 - Differences between security architect and security engineers 16:55 - Resources for learning more about security architecture 19:21 - Stay in touch with Hacker Valley Studio!   Keep in touch with Hacker Valley Studio on LinkedIn, Twitter, and Instagram Join our monthly mastermind group via Patreon Learn more about our fantastic sponsor Upytcs

22 Heinä 202120min

Episode 156 - Detection as Code with Nick Hakmiller

Episode 156 - Detection as Code with Nick Hakmiller

In this episode, we speak to a Detection and Response expert! Our guest is Nick Hakmiller, Senior Engineering Manager at Panther Labs. Nick was first exposed to technology in High School where he took an introduction to Visual Basic programming course. When learning about multi-threaded applications Nick became curious and began exploring how to open too many threads to crash a computer. Throughout Nick’s career he’s maintained an interest and focus on attack techniques and building defensive security programs. On occasions, security controls may fail to catch an attacker. A detection is logic that is applied to logs, security controls, and alerts to notify teams and automated processes. Nick describes Python as an exceptional programming language to apply detections and create detections as code. Nick describes many aspects of security as an engineering problem. As organizations transform and adopt new technologies, security issues arise and evolve. Nick describes that the team’s that are most successful with applying detection as code have chosen to view security as a function that engineering should participate in and help solve. As an organization’s security program matures, Nick mentions that the most impactful detections will likely be written and created by someone within the organization. For instance, creating a detection that defines which users should have access to sensitive data is likely to be created by a member of the organization with knowledge of team structure. Towards the end of the episode, Nick shares his wisdom to any practitioner that wants to step into the role of creating detections and providing impact while doing so.   Key Takeaways 0:00 - Welcome Back to the Hacker Valley Studio Podcast! 2:29 - Nick Hakmiller, Senior Engineering Manager at Panther Labs 4:20 - How Nick became interested in technology 6:00 - What is a detection? 7:25 - How detection as code applies to cybersecurity and software engineering 10:11 - Prerequisites to consider before applying detection as code 12:27 - Thinking beyond out of the box solutions and applying detections 15:54 - Categories of detections and which are most impactful 23:45 - Reducing alerts by engineering efforts 27:40 - Is it possible to automate everything for security? 32:56 - Advice on getting started with creating detections   Keep in touch with Nick Hakmiller on LinkedIn Reach out to Nick on Panther’s Community Slack Stay up to date with Nick’s work by viewing Panther Analysis Learn more about Panther Labs

20 Heinä 202138min

QuickQ: What is Threat Intelligence?

QuickQ: What is Threat Intelligence?

Today’s guests are our very own hosts!  Ron and Chris.  Together they tackle everything that surrounds threat intelligence by answering both the hard and easy questions. Between the stories they share about past experiences, and the facts behind threat intelligence, you will learn something new, and that’s a promise! In essence, threat intelligence is taking the information about threats or things that can go wrong and applying it to their network and company.  It’s the processing, collection and analyzation of data to understand threat actors, motives, targets and attack behaviors.    Key Takeaways   1:10 Episode starts 2:39 Threat intelligence 3:00 Ron & Chris share what threat intelligence means to them 6:33 Organizations and threat intelligence 8:39 Back in the day 12:54 Benefits of threat intelligence 15:08 Skills needed to be in threat intelligence 19:22 Networking 23:34 E.A.S.Y.   Links: Email Ron & Chris Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter. Follow hosts Ron Eddings and Chris Cochran on Twitter. Hacker Valley Merch!

15 Heinä 202126min

Episode 154 - Equity in Technology with Olivia Herriford

Episode 154 - Equity in Technology with Olivia Herriford

Today in the studio, we have Olivia Herriford, whose great and exceptional work is focused on equity in technology.  Olivia is the Regional Director and Employer Engagement at Bay Area Community College Consortium.   Olivia’s background is in technology, and with the Bay Area Community College Consortium, they support 28 community colleges in the San Francisco Bay region.  She often tells people she has what one would call an “ancient” computer science degree which she earned in 1973.  Olivia takes us back to what it was like to be a black woman in the mid-70s working with hardware and software engineers in the area of hardware design.  Sadly, she experienced a rather hostile work environment.   In today’s world, Olivia believes one of the best things we can do for reaching out to younger people is instill confidence.  These young people do not need to be swayed by comparing themselves to others, but rather realize we all bring something unique to the table.  Everyone needs to understand their own capabilities and power.   Key Takeaways: 2:26 Olivia’s background 6:38 How Olivia ended up where she is 15:45 How do we change the environment 17:17 Progress & future 20:42 Making an impact 23:04 Cultivating conversations 26:22 Equity in technology 29:08 Advice for awareness 32:35 Connecting with Olivia   Links: Olivia on LinkedIn Olivia on YouTube Support Hacker Valley Studio on Patreon.  Follow Hacker Valley Studio on Twitter. Follow hosts Ron Eddings and Chris Cochran on Twitter. Sponsored by Panther Labs

13 Heinä 202133min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
psykopodiaa-podcast
rss-valo-minussa-2
adhd-podi
psykologia
rss-narsisti
rss-niinku-asia-on
rss-duodecim-lehti
aamukahvilla
kesken
rss-uskonto-on-tylsaa
rss-luonnollinen-synnytys-podcast
rahapuhetta
jari-sarasvuo-podcast
rss-liian-kuuma-peruna
rss-laadukasta-ensihoitoa
rss-ai-mita-siskopodcast
rss-vapaudu-voimaasi
mielipaivakirja