Sharing Cyber Outside of the Security Bubble with Lesley Carhart
Hacker Valley Studio22 Marras 2022

Sharing Cyber Outside of the Security Bubble with Lesley Carhart

Lesley Carhart, Director of Incident Response at Dragos, takes some time off mentoring cybersecurity practitioners, responding to OT incidents, and training in martial arts to hop on the mics this week. Named Hacker of the Year in 2020, Lesley’s impact on the industry stretches far and wide. As an incredible content creator for cybersecurity, Lesley advises listeners on how to find their niche and who to be willing to educate along the way. Be sure to subscribe to Hacker Valley Studio, the premiere cybersecurity podcast for cybersecurity professionals.

Timecoded Guide:

[00:00] Giving back to the community through martial arts & cyber education

[06:13] Being excluded from the cyber industry & turning to content creation instead

[12:33] Comparing incident response in IT vs OT environments

[19:46] Dealing with post-COVID problems with the wrong OT systems online

[26:51] Finding your cyber niche & exploring education options within it

Sponsor Links:

Thank you to our sponsors Axonius and NetSPI for bringing this episode to life!

Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone

For more than 2 decades, NetSPI has helped companies discover and remediate critical security issues through its platform-driven, human-delivered security test. NetSPI is much more than a pentesting company, bringing you the most comprehensive suite of offensive security solutions. Visit netspi.com/HVM to learn more.

What inspired you to start creating cybersecurity content?

Lesley’s cybersecurity content has vastly influenced and impacted many cyber practitioners in the industry, including Ron and Chris. Unfortunately, Lesley’s journey into content creation was inspired by the lack of mentorship they received from other professionals when they were starting out. Never wanting anyone to feel the way they did, Lesley created an online world of resources to warmly welcome and educate new practitioners.

“It's not a really glamorous story. When I got into cybersecurity, I wanted to do digital forensics and nobody would help me, nobody would actually take me seriously and give me a shot. Everybody should have a chance to get into cybersecurity if it's something they want to do.”

How has teaching cyber to a general audience been appealing to you?

When not educating new cyber practitioners or tearing it up in the martial arts studio, Lesley likes to reach out to their community and give talks to audiences outside of typical tech and security groups. From churches to universities, Lesley loves meeting people outside of the cyber industry. These individuals always offer them a new perspective and a feeling of accomplishment for showing someone something new.

“It's enjoyable to me to find other people out there who want to learn about an entirely new topic and expose themselves to its problems and how it impacts society and things like that. I appreciate that. Cybersecurity is important and it impacts everything around us all the time.”

In your world, where does incident response start, and where does it stop?

Like many of cyber’s most complicated concepts, the answer to where incident response starts and ends is subjective to certain resources and elements of an organization. Lesley explains that incident response has to be planned and that the planning process has to involve when to declare an incident and when to close the said incident. Without proper planning in advance, an organization is at risk for a crisis that could’ve been responded to quickly turning into an out-of-control attack.

“There's no perfect defense against an incident, everybody's vulnerable. You do your best to mitigate and avoid having a cybersecurity incident, but there's only so much you can do. Eventually, you have to assume that you're gonna have an incident.”

What piece of advice do you have for anyone looking to share more knowledge and make the cyber industry better?

Although everything in cybersecurity can seem daunting, expansive, and interesting to everyone, Lesley’s recommendation to new practitioners is to find a niche in cyber and stick to it for a while. Finding a niche doesn’t have to be permanent, but Lesley believes that niche will help you carve out extensive knowledge worth sharing and creating content around. When you discover that niche, don’t be afraid to reach out to other industry experts along the way.

“Pick an area and then find mentorship in that and try to focus for a couple of years on a particular area. You can always change your mind later on, just like degrees, just like training programs, but it's going to help you a lot to focus for a little while.”

---------------

Links:

Keep up with our guest Lesley Carhart on LinkedIn, Twitter, and their blog

Learn more about Dragos, Inc on LinkedIn and the Dragos website

Connect with Ron Eddings on LinkedIn and Twitter

Connect with Chris Cochran on LinkedIn and Twitter

Purchase Hacker Valley swag at our shop

Continue the conversation by joining our Discord

Check out Hacker Valley Media and Hacker Valley Studio

Jaksot(406)

Episode 14 - Quality Time with ITSP: A Podcaster's Podcast

Episode 14 - Quality Time with ITSP: A Podcaster's Podcast

In this episode, Ron and Chris are joined by Sean Martin and Marco Ciappelli from ITSPMagazine.com. Both set of podcasters have ambitious goals to start unique conversations and bring more diversity to Cybersecurity. Tune in and hear about the vision of both SecDevOps.AI and ITSP Magazine.

20 Elo 201929min

Episode 13 - A Journey Through Venture Capitalism: Mentoring and Leading in Silicon Valley

Episode 13 - A Journey Through Venture Capitalism: Mentoring and Leading in Silicon Valley

Mentors and Leaders help shape our profession and our future. In this episode, Didi Dayton from Wing Venture Capital joins the podcast to discuss the importance of mentoring and leadership. Didi has scaled and shaped successful channel programs - She's now shaping and scaling to a greater magnitude in her new role as Partner at Wing VC. Didi Dayton https://www.linkedin.com/in/didi-dayton-8204501/

14 Elo 201927min

Episode 12 - Physical Red Teaming: No Lock Left Secured

Episode 12 - Physical Red Teaming: No Lock Left Secured

Robert Pingor is the equalizer to Physical and Network Red Teaming. Chris has had the opportunity to moonlight his career with Robert and witness him obtain mastery at his craft. During this interview, Chris, Ron, and Robert share red team stories and resources for Red Team Alliance.

13 Elo 201915min

Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World

Episode 11 - Selling Cybersecurity: Doing Business in an Increasingly Connected World

Information Security vendors offer a wide variety of products and services that can enable success for organizations. Derek Eid joins us this episode to share wisdom in selling products and services. Derek is an expert communicator and leverages technical and non-technical conversations to capture necessities for existing and potential customers. Derek's most effective tool in his repertoire is his ability to listen. Tune in and learn how he uses this powerful tool to help enable his success.

23 Heinä 201937min

Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings

Episode 10 - Breaking Barriers, Gatekeepers, and Glass Ceilings

Neelima Rustagi joins Chris and Ron in this episode to share her experiences creating valuable work to dissolve barriers, gatekeepers, and glass ceilings. While transitioning from Software Engineer to Cybersecurity Product Manager, Neelima provided value to her stakeholders, mentors and advocates to position herself as a key resource in the industry. Neelima celebrates a decorated background in startups and Fortune cybersecurity companies.

16 Heinä 201939min

Episode 9 - The Intelligence Easy Button

Episode 9 - The Intelligence Easy Button

In this Episode, Ron and Napoleon put Chris in the hot seat and reviewed his EASY framework for making an impact in threat intelligence.   - Elicit Requirements - Assess Collection - Plan Strive for Impact - Yield to Feedback   All four pillars are vital for ensuring success during each phase of providing threat intelligence as a service

7 Heinä 201919min

Episode 8 - Serverless Threat Intel Bot

Episode 8 - Serverless Threat Intel Bot

New Member Alert 🚨! Napoleon Bing joins forces with Chris and Ron and present a Serverless Threat Intel Bot. As organizations mature and scale their security infrastructure, it's vital that analysts, engineers, and other team members are able to query and enrich data on demand. Additionally, application features are being introduced at an increasing rate, creating the need for software defined infrastructure. In this project, we'll be exploring scaling automation efforts - with a focus on Threat Intelligence. This project can serve as a guide for when to leverage an interactive bot, creating API endpoints, serverless architecture, and applying actionable threat intelligence.

7 Heinä 201913min

Episode 7 - Layer 8 - Vulnerability And Diversity

Episode 7 - Layer 8 - Vulnerability And Diversity

How important is being vulnerable in life and in your career? In Episode 7, our guest of honor - Charles Nwatu (https://www.linkedin.com/in/cnwatu/) joins Ron and Chris in starting the conversation about vulnerability and diversity. Charles Nwatu celebrates a decorated infosec career - and has built security teams at companies such as Twilio, Stitch Fix, and Netflix.

7 Heinä 201944min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
psykopodiaa-podcast
voi-hyvin-meditaatiot-2
rss-duodecim-lehti
aloita-meditaatio
jari-sarasvuo-podcast
rss-psykalab
psykologia
rss-vapaudu-voimaasi
adhd-podi
rss-narsisti
rss-niinku-asia-on
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-liian-kuuma-peruna
aamukahvilla
kesken
rss-monarch-talk-with-alexandra-alexis
rss-koira-haudattuna
rss-anteeks-etukateen
tohtorin-vuoro